Feb 2 01:37:05 localhost kernel: Linux version 5.14.0-284.11.1.el9_2.x86_64 (mockbuild@x86-vm-09.build.eng.bos.redhat.com) (gcc (GCC) 11.3.1 20221121 (Red Hat 11.3.1-4), GNU ld version 2.35.2-37.el9) #1 SMP PREEMPT_DYNAMIC Wed Apr 12 10:45:03 EDT 2023 Feb 2 01:37:05 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Feb 2 01:37:05 localhost kernel: Command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Feb 2 01:37:05 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 2 01:37:05 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 2 01:37:05 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 2 01:37:05 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 2 01:37:05 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 2 01:37:05 localhost kernel: signal: max sigframe size: 1776 Feb 2 01:37:05 localhost kernel: BIOS-provided physical RAM map: Feb 2 01:37:05 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 2 01:37:05 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 2 01:37:05 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 2 01:37:05 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Feb 2 01:37:05 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Feb 2 01:37:05 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 2 01:37:05 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 2 01:37:05 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000043fffffff] usable Feb 2 01:37:05 localhost kernel: NX (Execute Disable) protection: active Feb 2 01:37:05 localhost kernel: SMBIOS 2.8 present. Feb 2 01:37:05 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Feb 2 01:37:05 localhost kernel: Hypervisor detected: KVM Feb 2 01:37:05 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 2 01:37:05 localhost kernel: kvm-clock: using sched offset of 2876412506 cycles Feb 2 01:37:05 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 2 01:37:05 localhost kernel: tsc: Detected 2799.998 MHz processor Feb 2 01:37:05 localhost kernel: last_pfn = 0x440000 max_arch_pfn = 0x400000000 Feb 2 01:37:05 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 2 01:37:05 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Feb 2 01:37:05 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Feb 2 01:37:05 localhost kernel: Using GB pages for direct mapping Feb 2 01:37:05 localhost kernel: RAMDISK: [mem 0x2eef4000-0x33771fff] Feb 2 01:37:05 localhost kernel: ACPI: Early table checksum verification disabled Feb 2 01:37:05 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Feb 2 01:37:05 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 2 01:37:05 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 2 01:37:05 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 2 01:37:05 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Feb 2 01:37:05 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 2 01:37:05 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 2 01:37:05 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Feb 2 01:37:05 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Feb 2 01:37:05 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Feb 2 01:37:05 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Feb 2 01:37:05 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Feb 2 01:37:05 localhost kernel: No NUMA configuration found Feb 2 01:37:05 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000043fffffff] Feb 2 01:37:05 localhost kernel: NODE_DATA(0) allocated [mem 0x43ffd3000-0x43fffdfff] Feb 2 01:37:05 localhost kernel: Reserving 256MB of memory at 2800MB for crashkernel (System RAM: 16383MB) Feb 2 01:37:05 localhost kernel: Zone ranges: Feb 2 01:37:05 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 2 01:37:05 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 2 01:37:05 localhost kernel: Normal [mem 0x0000000100000000-0x000000043fffffff] Feb 2 01:37:05 localhost kernel: Device empty Feb 2 01:37:05 localhost kernel: Movable zone start for each node Feb 2 01:37:05 localhost kernel: Early memory node ranges Feb 2 01:37:05 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 2 01:37:05 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Feb 2 01:37:05 localhost kernel: node 0: [mem 0x0000000100000000-0x000000043fffffff] Feb 2 01:37:05 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000043fffffff] Feb 2 01:37:05 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 2 01:37:05 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 2 01:37:05 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Feb 2 01:37:05 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Feb 2 01:37:05 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 2 01:37:05 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 2 01:37:05 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 2 01:37:05 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 2 01:37:05 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 2 01:37:05 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 2 01:37:05 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 2 01:37:05 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 2 01:37:05 localhost kernel: TSC deadline timer available Feb 2 01:37:05 localhost kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Feb 2 01:37:05 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Feb 2 01:37:05 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Feb 2 01:37:05 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Feb 2 01:37:05 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Feb 2 01:37:05 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Feb 2 01:37:05 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Feb 2 01:37:05 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Feb 2 01:37:05 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Feb 2 01:37:05 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Feb 2 01:37:05 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Feb 2 01:37:05 localhost kernel: Booting paravirtualized kernel on KVM Feb 2 01:37:05 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 2 01:37:05 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Feb 2 01:37:05 localhost kernel: percpu: Embedded 55 pages/cpu s188416 r8192 d28672 u262144 Feb 2 01:37:05 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Feb 2 01:37:05 localhost kernel: Fallback order for Node 0: 0 Feb 2 01:37:05 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 4128475 Feb 2 01:37:05 localhost kernel: Policy zone: Normal Feb 2 01:37:05 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Feb 2 01:37:05 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64", will be passed to user space. Feb 2 01:37:05 localhost kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 2 01:37:05 localhost kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 2 01:37:05 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 2 01:37:05 localhost kernel: software IO TLB: area num 8. Feb 2 01:37:05 localhost kernel: Memory: 2826284K/16776676K available (14342K kernel code, 5536K rwdata, 10180K rodata, 2792K init, 7524K bss, 741268K reserved, 0K cma-reserved) Feb 2 01:37:05 localhost kernel: random: get_random_u64 called from kmem_cache_open+0x1e/0x210 with crng_init=0 Feb 2 01:37:05 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Feb 2 01:37:05 localhost kernel: ftrace: allocating 44803 entries in 176 pages Feb 2 01:37:05 localhost kernel: ftrace: allocated 176 pages with 3 groups Feb 2 01:37:05 localhost kernel: Dynamic Preempt: voluntary Feb 2 01:37:05 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Feb 2 01:37:05 localhost kernel: rcu: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Feb 2 01:37:05 localhost kernel: #011Trampoline variant of Tasks RCU enabled. Feb 2 01:37:05 localhost kernel: #011Rude variant of Tasks RCU enabled. Feb 2 01:37:05 localhost kernel: #011Tracing variant of Tasks RCU enabled. Feb 2 01:37:05 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 2 01:37:05 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Feb 2 01:37:05 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Feb 2 01:37:05 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Feb 2 01:37:05 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Feb 2 01:37:05 localhost kernel: random: crng init done (trusting CPU's manufacturer) Feb 2 01:37:05 localhost kernel: Console: colour VGA+ 80x25 Feb 2 01:37:05 localhost kernel: printk: console [tty0] enabled Feb 2 01:37:05 localhost kernel: printk: console [ttyS0] enabled Feb 2 01:37:05 localhost kernel: ACPI: Core revision 20211217 Feb 2 01:37:05 localhost kernel: APIC: Switch to symmetric I/O mode setup Feb 2 01:37:05 localhost kernel: x2apic enabled Feb 2 01:37:05 localhost kernel: Switched APIC routing to physical x2apic. Feb 2 01:37:05 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 2 01:37:05 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Feb 2 01:37:05 localhost kernel: pid_max: default: 32768 minimum: 301 Feb 2 01:37:05 localhost kernel: LSM: Security Framework initializing Feb 2 01:37:05 localhost kernel: Yama: becoming mindful. Feb 2 01:37:05 localhost kernel: SELinux: Initializing. Feb 2 01:37:05 localhost kernel: LSM support for eBPF active Feb 2 01:37:05 localhost kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 2 01:37:05 localhost kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 2 01:37:05 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 2 01:37:05 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 2 01:37:05 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 2 01:37:05 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 2 01:37:05 localhost kernel: Spectre V2 : Mitigation: Retpolines Feb 2 01:37:05 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 2 01:37:05 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 2 01:37:05 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 2 01:37:05 localhost kernel: RETBleed: Mitigation: untrained return thunk Feb 2 01:37:05 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 2 01:37:05 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Feb 2 01:37:05 localhost kernel: Freeing SMP alternatives memory: 36K Feb 2 01:37:05 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 2 01:37:05 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues. Feb 2 01:37:05 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Feb 2 01:37:05 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Feb 2 01:37:05 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Feb 2 01:37:05 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 2 01:37:05 localhost kernel: ... version: 0 Feb 2 01:37:05 localhost kernel: ... bit width: 48 Feb 2 01:37:05 localhost kernel: ... generic registers: 6 Feb 2 01:37:05 localhost kernel: ... value mask: 0000ffffffffffff Feb 2 01:37:05 localhost kernel: ... max period: 00007fffffffffff Feb 2 01:37:05 localhost kernel: ... fixed-purpose events: 0 Feb 2 01:37:05 localhost kernel: ... event mask: 000000000000003f Feb 2 01:37:05 localhost kernel: rcu: Hierarchical SRCU implementation. Feb 2 01:37:05 localhost kernel: rcu: #011Max phase no-delay instances is 400. Feb 2 01:37:05 localhost kernel: smp: Bringing up secondary CPUs ... Feb 2 01:37:05 localhost kernel: x86: Booting SMP configuration: Feb 2 01:37:05 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Feb 2 01:37:05 localhost kernel: smp: Brought up 1 node, 8 CPUs Feb 2 01:37:05 localhost kernel: smpboot: Max logical packages: 8 Feb 2 01:37:05 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Feb 2 01:37:05 localhost kernel: node 0 deferred pages initialised in 22ms Feb 2 01:37:05 localhost kernel: devtmpfs: initialized Feb 2 01:37:05 localhost kernel: x86/mm: Memory block size: 128MB Feb 2 01:37:05 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 2 01:37:05 localhost kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Feb 2 01:37:05 localhost kernel: pinctrl core: initialized pinctrl subsystem Feb 2 01:37:05 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 2 01:37:05 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Feb 2 01:37:05 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 2 01:37:05 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 2 01:37:05 localhost kernel: audit: initializing netlink subsys (disabled) Feb 2 01:37:05 localhost kernel: audit: type=2000 audit(1770014224.020:1): state=initialized audit_enabled=0 res=1 Feb 2 01:37:05 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Feb 2 01:37:05 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 2 01:37:05 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Feb 2 01:37:05 localhost kernel: cpuidle: using governor menu Feb 2 01:37:05 localhost kernel: HugeTLB: can optimize 4095 vmemmap pages for hugepages-1048576kB Feb 2 01:37:05 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 2 01:37:05 localhost kernel: PCI: Using configuration type 1 for base access Feb 2 01:37:05 localhost kernel: PCI: Using configuration type 1 for extended access Feb 2 01:37:05 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 2 01:37:05 localhost kernel: HugeTLB: can optimize 7 vmemmap pages for hugepages-2048kB Feb 2 01:37:05 localhost kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 2 01:37:05 localhost kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 2 01:37:05 localhost kernel: cryptd: max_cpu_qlen set to 1000 Feb 2 01:37:05 localhost kernel: ACPI: Added _OSI(Module Device) Feb 2 01:37:05 localhost kernel: ACPI: Added _OSI(Processor Device) Feb 2 01:37:05 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 2 01:37:05 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 2 01:37:05 localhost kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 2 01:37:05 localhost kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 2 01:37:05 localhost kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 2 01:37:05 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 2 01:37:05 localhost kernel: ACPI: Interpreter enabled Feb 2 01:37:05 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Feb 2 01:37:05 localhost kernel: ACPI: Using IOAPIC for interrupt routing Feb 2 01:37:05 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 2 01:37:05 localhost kernel: PCI: Using E820 reservations for host bridge windows Feb 2 01:37:05 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 2 01:37:05 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 2 01:37:05 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Feb 2 01:37:05 localhost kernel: acpiphp: Slot [3] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [4] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [5] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [6] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [7] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [8] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [9] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [10] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [11] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [12] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [13] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [14] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [15] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [16] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [17] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [18] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [19] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [20] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [21] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [22] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [23] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [24] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [25] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [26] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [27] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [28] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [29] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [30] registered Feb 2 01:37:05 localhost kernel: acpiphp: Slot [31] registered Feb 2 01:37:05 localhost kernel: PCI host bridge to bus 0000:00 Feb 2 01:37:05 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 2 01:37:05 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 2 01:37:05 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 2 01:37:05 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Feb 2 01:37:05 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x440000000-0x4bfffffff window] Feb 2 01:37:05 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 2 01:37:05 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 2 01:37:05 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 2 01:37:05 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 2 01:37:05 localhost kernel: pci 0000:00:01.1: reg 0x20: [io 0xc140-0xc14f] Feb 2 01:37:05 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 2 01:37:05 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 2 01:37:05 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 2 01:37:05 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 2 01:37:05 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Feb 2 01:37:05 localhost kernel: pci 0000:00:01.2: reg 0x20: [io 0xc100-0xc11f] Feb 2 01:37:05 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 2 01:37:05 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 2 01:37:05 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 2 01:37:05 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Feb 2 01:37:05 localhost kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Feb 2 01:37:05 localhost kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Feb 2 01:37:05 localhost kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Feb 2 01:37:05 localhost kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Feb 2 01:37:05 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 2 01:37:05 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Feb 2 01:37:05 localhost kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Feb 2 01:37:05 localhost kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Feb 2 01:37:05 localhost kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Feb 2 01:37:05 localhost kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Feb 2 01:37:05 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 2 01:37:05 localhost kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 2 01:37:05 localhost kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Feb 2 01:37:05 localhost kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 2 01:37:05 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Feb 2 01:37:05 localhost kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Feb 2 01:37:05 localhost kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 2 01:37:05 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Feb 2 01:37:05 localhost kernel: pci 0000:00:06.0: reg 0x10: [io 0xc120-0xc13f] Feb 2 01:37:05 localhost kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Feb 2 01:37:05 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 2 01:37:05 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 2 01:37:05 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 2 01:37:05 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 2 01:37:05 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 2 01:37:05 localhost kernel: iommu: Default domain type: Translated Feb 2 01:37:05 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 2 01:37:05 localhost kernel: SCSI subsystem initialized Feb 2 01:37:05 localhost kernel: ACPI: bus type USB registered Feb 2 01:37:05 localhost kernel: usbcore: registered new interface driver usbfs Feb 2 01:37:05 localhost kernel: usbcore: registered new interface driver hub Feb 2 01:37:05 localhost kernel: usbcore: registered new device driver usb Feb 2 01:37:05 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Feb 2 01:37:05 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 2 01:37:05 localhost kernel: PTP clock support registered Feb 2 01:37:05 localhost kernel: EDAC MC: Ver: 3.0.0 Feb 2 01:37:05 localhost kernel: NetLabel: Initializing Feb 2 01:37:05 localhost kernel: NetLabel: domain hash size = 128 Feb 2 01:37:05 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Feb 2 01:37:05 localhost kernel: NetLabel: unlabeled traffic allowed by default Feb 2 01:37:05 localhost kernel: PCI: Using ACPI for IRQ routing Feb 2 01:37:05 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 2 01:37:05 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 2 01:37:05 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 2 01:37:05 localhost kernel: vgaarb: loaded Feb 2 01:37:05 localhost kernel: clocksource: Switched to clocksource kvm-clock Feb 2 01:37:05 localhost kernel: VFS: Disk quotas dquot_6.6.0 Feb 2 01:37:05 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 2 01:37:05 localhost kernel: pnp: PnP ACPI init Feb 2 01:37:05 localhost kernel: pnp: PnP ACPI: found 5 devices Feb 2 01:37:05 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 2 01:37:05 localhost kernel: NET: Registered PF_INET protocol family Feb 2 01:37:05 localhost kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 2 01:37:05 localhost kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Feb 2 01:37:05 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 2 01:37:05 localhost kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 2 01:37:05 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 2 01:37:05 localhost kernel: TCP: Hash tables configured (established 131072 bind 65536) Feb 2 01:37:05 localhost kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Feb 2 01:37:05 localhost kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Feb 2 01:37:05 localhost kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Feb 2 01:37:05 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 2 01:37:05 localhost kernel: NET: Registered PF_XDP protocol family Feb 2 01:37:05 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 2 01:37:05 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 2 01:37:05 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 2 01:37:05 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Feb 2 01:37:05 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x440000000-0x4bfffffff window] Feb 2 01:37:05 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 2 01:37:05 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 2 01:37:05 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 2 01:37:05 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x140 took 27053 usecs Feb 2 01:37:05 localhost kernel: PCI: CLS 0 bytes, default 64 Feb 2 01:37:05 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 2 01:37:05 localhost kernel: Trying to unpack rootfs image as initramfs... Feb 2 01:37:05 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Feb 2 01:37:05 localhost kernel: ACPI: bus type thunderbolt registered Feb 2 01:37:05 localhost kernel: Initialise system trusted keyrings Feb 2 01:37:05 localhost kernel: Key type blacklist registered Feb 2 01:37:05 localhost kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Feb 2 01:37:05 localhost kernel: zbud: loaded Feb 2 01:37:05 localhost kernel: integrity: Platform Keyring initialized Feb 2 01:37:05 localhost kernel: NET: Registered PF_ALG protocol family Feb 2 01:37:05 localhost kernel: xor: automatically using best checksumming function avx Feb 2 01:37:05 localhost kernel: Key type asymmetric registered Feb 2 01:37:05 localhost kernel: Asymmetric key parser 'x509' registered Feb 2 01:37:05 localhost kernel: Running certificate verification selftests Feb 2 01:37:05 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Feb 2 01:37:05 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Feb 2 01:37:05 localhost kernel: io scheduler mq-deadline registered Feb 2 01:37:05 localhost kernel: io scheduler kyber registered Feb 2 01:37:05 localhost kernel: io scheduler bfq registered Feb 2 01:37:05 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Feb 2 01:37:05 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Feb 2 01:37:05 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Feb 2 01:37:05 localhost kernel: ACPI: button: Power Button [PWRF] Feb 2 01:37:05 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 2 01:37:05 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 2 01:37:05 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 2 01:37:05 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 2 01:37:05 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 2 01:37:05 localhost kernel: Non-volatile memory driver v1.3 Feb 2 01:37:05 localhost kernel: rdac: device handler registered Feb 2 01:37:05 localhost kernel: hp_sw: device handler registered Feb 2 01:37:05 localhost kernel: emc: device handler registered Feb 2 01:37:05 localhost kernel: alua: device handler registered Feb 2 01:37:05 localhost kernel: libphy: Fixed MDIO Bus: probed Feb 2 01:37:05 localhost kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Feb 2 01:37:05 localhost kernel: ehci-pci: EHCI PCI platform driver Feb 2 01:37:05 localhost kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver Feb 2 01:37:05 localhost kernel: ohci-pci: OHCI PCI platform driver Feb 2 01:37:05 localhost kernel: uhci_hcd: USB Universal Host Controller Interface driver Feb 2 01:37:05 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Feb 2 01:37:05 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Feb 2 01:37:05 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Feb 2 01:37:05 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Feb 2 01:37:05 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Feb 2 01:37:05 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Feb 2 01:37:05 localhost kernel: usb usb1: Product: UHCI Host Controller Feb 2 01:37:05 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-284.11.1.el9_2.x86_64 uhci_hcd Feb 2 01:37:05 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Feb 2 01:37:05 localhost kernel: hub 1-0:1.0: USB hub found Feb 2 01:37:05 localhost kernel: hub 1-0:1.0: 2 ports detected Feb 2 01:37:05 localhost kernel: usbcore: registered new interface driver usbserial_generic Feb 2 01:37:05 localhost kernel: usbserial: USB Serial support registered for generic Feb 2 01:37:05 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 2 01:37:05 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 2 01:37:05 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 2 01:37:05 localhost kernel: mousedev: PS/2 mouse device common for all mice Feb 2 01:37:05 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Feb 2 01:37:05 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Feb 2 01:37:05 localhost kernel: rtc_cmos 00:04: registered as rtc0 Feb 2 01:37:05 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Feb 2 01:37:05 localhost kernel: rtc_cmos 00:04: setting system clock to 2026-02-02T06:37:04 UTC (1770014224) Feb 2 01:37:05 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Feb 2 01:37:05 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Feb 2 01:37:05 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Feb 2 01:37:05 localhost kernel: usbcore: registered new interface driver usbhid Feb 2 01:37:05 localhost kernel: usbhid: USB HID core driver Feb 2 01:37:05 localhost kernel: drop_monitor: Initializing network drop monitor service Feb 2 01:37:05 localhost kernel: Initializing XFRM netlink socket Feb 2 01:37:05 localhost kernel: NET: Registered PF_INET6 protocol family Feb 2 01:37:05 localhost kernel: Segment Routing with IPv6 Feb 2 01:37:05 localhost kernel: NET: Registered PF_PACKET protocol family Feb 2 01:37:05 localhost kernel: mpls_gso: MPLS GSO support Feb 2 01:37:05 localhost kernel: IPI shorthand broadcast: enabled Feb 2 01:37:05 localhost kernel: AVX2 version of gcm_enc/dec engaged. Feb 2 01:37:05 localhost kernel: AES CTR mode by8 optimization enabled Feb 2 01:37:05 localhost kernel: sched_clock: Marking stable (791040782, 176485413)->(1093085381, -125559186) Feb 2 01:37:05 localhost kernel: registered taskstats version 1 Feb 2 01:37:05 localhost kernel: Loading compiled-in X.509 certificates Feb 2 01:37:05 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Feb 2 01:37:05 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Feb 2 01:37:05 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Feb 2 01:37:05 localhost kernel: zswap: loaded using pool lzo/zbud Feb 2 01:37:05 localhost kernel: page_owner is disabled Feb 2 01:37:05 localhost kernel: Key type big_key registered Feb 2 01:37:05 localhost kernel: Freeing initrd memory: 74232K Feb 2 01:37:05 localhost kernel: Key type encrypted registered Feb 2 01:37:05 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Feb 2 01:37:05 localhost kernel: Loading compiled-in module X.509 certificates Feb 2 01:37:05 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Feb 2 01:37:05 localhost kernel: ima: Allocated hash algorithm: sha256 Feb 2 01:37:05 localhost kernel: ima: No architecture policies found Feb 2 01:37:05 localhost kernel: evm: Initialising EVM extended attributes: Feb 2 01:37:05 localhost kernel: evm: security.selinux Feb 2 01:37:05 localhost kernel: evm: security.SMACK64 (disabled) Feb 2 01:37:05 localhost kernel: evm: security.SMACK64EXEC (disabled) Feb 2 01:37:05 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Feb 2 01:37:05 localhost kernel: evm: security.SMACK64MMAP (disabled) Feb 2 01:37:05 localhost kernel: evm: security.apparmor (disabled) Feb 2 01:37:05 localhost kernel: evm: security.ima Feb 2 01:37:05 localhost kernel: evm: security.capability Feb 2 01:37:05 localhost kernel: evm: HMAC attrs: 0x1 Feb 2 01:37:05 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Feb 2 01:37:05 localhost kernel: Freeing unused decrypted memory: 2036K Feb 2 01:37:05 localhost kernel: Freeing unused kernel image (initmem) memory: 2792K Feb 2 01:37:05 localhost kernel: Write protecting the kernel read-only data: 26624k Feb 2 01:37:05 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Feb 2 01:37:05 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Feb 2 01:37:05 localhost kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 2 01:37:05 localhost kernel: usb 1-1: Product: QEMU USB Tablet Feb 2 01:37:05 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 60K Feb 2 01:37:05 localhost kernel: usb 1-1: Manufacturer: QEMU Feb 2 01:37:05 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Feb 2 01:37:05 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Feb 2 01:37:05 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Feb 2 01:37:05 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Feb 2 01:37:05 localhost kernel: Run /init as init process Feb 2 01:37:05 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 2 01:37:05 localhost systemd[1]: Detected virtualization kvm. Feb 2 01:37:05 localhost systemd[1]: Detected architecture x86-64. Feb 2 01:37:05 localhost systemd[1]: Running in initrd. Feb 2 01:37:05 localhost systemd[1]: No hostname configured, using default hostname. Feb 2 01:37:05 localhost systemd[1]: Hostname set to . Feb 2 01:37:05 localhost systemd[1]: Initializing machine ID from VM UUID. Feb 2 01:37:05 localhost systemd[1]: Queued start job for default target Initrd Default Target. Feb 2 01:37:05 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Feb 2 01:37:05 localhost systemd[1]: Reached target Local Encrypted Volumes. Feb 2 01:37:05 localhost systemd[1]: Reached target Initrd /usr File System. Feb 2 01:37:05 localhost systemd[1]: Reached target Local File Systems. Feb 2 01:37:05 localhost systemd[1]: Reached target Path Units. Feb 2 01:37:05 localhost systemd[1]: Reached target Slice Units. Feb 2 01:37:05 localhost systemd[1]: Reached target Swaps. Feb 2 01:37:05 localhost systemd[1]: Reached target Timer Units. Feb 2 01:37:05 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Feb 2 01:37:05 localhost systemd[1]: Listening on Journal Socket (/dev/log). Feb 2 01:37:05 localhost systemd[1]: Listening on Journal Socket. Feb 2 01:37:05 localhost systemd[1]: Listening on udev Control Socket. Feb 2 01:37:05 localhost systemd[1]: Listening on udev Kernel Socket. Feb 2 01:37:05 localhost systemd[1]: Reached target Socket Units. Feb 2 01:37:05 localhost systemd[1]: Starting Create List of Static Device Nodes... Feb 2 01:37:05 localhost systemd[1]: Starting Journal Service... Feb 2 01:37:05 localhost systemd[1]: Starting Load Kernel Modules... Feb 2 01:37:05 localhost systemd[1]: Starting Create System Users... Feb 2 01:37:05 localhost systemd[1]: Starting Setup Virtual Console... Feb 2 01:37:05 localhost systemd[1]: Finished Create List of Static Device Nodes. Feb 2 01:37:05 localhost systemd-journald[282]: Journal started Feb 2 01:37:05 localhost systemd-journald[282]: Runtime Journal (/run/log/journal/6c83142304a14f0097ee9f6cf76a2be3) is 8.0M, max 314.7M, 306.7M free. Feb 2 01:37:05 localhost systemd-modules-load[283]: Module 'msr' is built in Feb 2 01:37:05 localhost systemd[1]: Started Journal Service. Feb 2 01:37:05 localhost systemd[1]: Finished Load Kernel Modules. Feb 2 01:37:05 localhost systemd[1]: Finished Setup Virtual Console. Feb 2 01:37:05 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Feb 2 01:37:05 localhost systemd[1]: Starting dracut cmdline hook... Feb 2 01:37:05 localhost systemd[1]: Starting Apply Kernel Variables... Feb 2 01:37:05 localhost systemd-sysusers[284]: Creating group 'sgx' with GID 997. Feb 2 01:37:05 localhost systemd-sysusers[284]: Creating group 'users' with GID 100. Feb 2 01:37:05 localhost systemd-sysusers[284]: Creating group 'dbus' with GID 81. Feb 2 01:37:05 localhost systemd-sysusers[284]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Feb 2 01:37:05 localhost systemd[1]: Finished Create System Users. Feb 2 01:37:05 localhost systemd[1]: Finished Apply Kernel Variables. Feb 2 01:37:05 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Feb 2 01:37:05 localhost systemd[1]: Starting Create Volatile Files and Directories... Feb 2 01:37:05 localhost dracut-cmdline[287]: dracut-9.2 (Plow) dracut-057-21.git20230214.el9 Feb 2 01:37:05 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Feb 2 01:37:05 localhost dracut-cmdline[287]: Using kernel command line parameters: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Feb 2 01:37:05 localhost systemd[1]: Finished Create Volatile Files and Directories. Feb 2 01:37:05 localhost systemd[1]: Finished dracut cmdline hook. Feb 2 01:37:05 localhost systemd[1]: Starting dracut pre-udev hook... Feb 2 01:37:05 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 2 01:37:05 localhost kernel: device-mapper: uevent: version 1.0.3 Feb 2 01:37:05 localhost kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Feb 2 01:37:05 localhost kernel: RPC: Registered named UNIX socket transport module. Feb 2 01:37:05 localhost kernel: RPC: Registered udp transport module. Feb 2 01:37:05 localhost kernel: RPC: Registered tcp transport module. Feb 2 01:37:05 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 2 01:37:05 localhost rpc.statd[408]: Version 2.5.4 starting Feb 2 01:37:05 localhost rpc.statd[408]: Initializing NSM state Feb 2 01:37:05 localhost rpc.idmapd[413]: Setting log level to 0 Feb 2 01:37:05 localhost systemd[1]: Finished dracut pre-udev hook. Feb 2 01:37:05 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Feb 2 01:37:05 localhost systemd-udevd[426]: Using default interface naming scheme 'rhel-9.0'. Feb 2 01:37:05 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Feb 2 01:37:05 localhost systemd[1]: Starting dracut pre-trigger hook... Feb 2 01:37:05 localhost systemd[1]: Finished dracut pre-trigger hook. Feb 2 01:37:05 localhost systemd[1]: Starting Coldplug All udev Devices... Feb 2 01:37:05 localhost systemd[1]: Finished Coldplug All udev Devices. Feb 2 01:37:05 localhost systemd[1]: Reached target System Initialization. Feb 2 01:37:05 localhost systemd[1]: Reached target Basic System. Feb 2 01:37:05 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Feb 2 01:37:05 localhost systemd[1]: Reached target Network. Feb 2 01:37:05 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Feb 2 01:37:05 localhost systemd[1]: Starting dracut initqueue hook... Feb 2 01:37:05 localhost kernel: virtio_blk virtio2: [vda] 838860800 512-byte logical blocks (429 GB/400 GiB) Feb 2 01:37:05 localhost kernel: scsi host0: ata_piix Feb 2 01:37:05 localhost kernel: scsi host1: ata_piix Feb 2 01:37:05 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 Feb 2 01:37:05 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 Feb 2 01:37:05 localhost kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 2 01:37:05 localhost kernel: GPT:20971519 != 838860799 Feb 2 01:37:05 localhost kernel: GPT:Alternate GPT header not at the end of the disk. Feb 2 01:37:05 localhost kernel: GPT:20971519 != 838860799 Feb 2 01:37:05 localhost kernel: GPT: Use GNU Parted to correct GPT errors. Feb 2 01:37:05 localhost kernel: vda: vda1 vda2 vda3 vda4 Feb 2 01:37:05 localhost systemd-udevd[445]: Network interface NamePolicy= disabled on kernel command line. Feb 2 01:37:05 localhost systemd[1]: Found device /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Feb 2 01:37:05 localhost systemd[1]: Reached target Initrd Root Device. Feb 2 01:37:06 localhost kernel: ata1: found unknown device (class 0) Feb 2 01:37:06 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 2 01:37:06 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 2 01:37:06 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Feb 2 01:37:06 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 2 01:37:06 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 2 01:37:06 localhost systemd[1]: Finished dracut initqueue hook. Feb 2 01:37:06 localhost systemd[1]: Reached target Preparation for Remote File Systems. Feb 2 01:37:06 localhost systemd[1]: Reached target Remote Encrypted Volumes. Feb 2 01:37:06 localhost systemd[1]: Reached target Remote File Systems. Feb 2 01:37:06 localhost systemd[1]: Starting dracut pre-mount hook... Feb 2 01:37:06 localhost systemd[1]: Finished dracut pre-mount hook. Feb 2 01:37:06 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a... Feb 2 01:37:06 localhost systemd-fsck[511]: /usr/sbin/fsck.xfs: XFS file system. Feb 2 01:37:06 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Feb 2 01:37:06 localhost systemd[1]: Mounting /sysroot... Feb 2 01:37:06 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Feb 2 01:37:06 localhost kernel: XFS (vda4): Mounting V5 Filesystem Feb 2 01:37:06 localhost kernel: XFS (vda4): Ending clean mount Feb 2 01:37:06 localhost systemd[1]: Mounted /sysroot. Feb 2 01:37:06 localhost systemd[1]: Reached target Initrd Root File System. Feb 2 01:37:06 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Feb 2 01:37:06 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Feb 2 01:37:06 localhost systemd[1]: Reached target Initrd File Systems. Feb 2 01:37:06 localhost systemd[1]: Reached target Initrd Default Target. Feb 2 01:37:06 localhost systemd[1]: Starting dracut mount hook... Feb 2 01:37:06 localhost systemd[1]: Finished dracut mount hook. Feb 2 01:37:06 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Feb 2 01:37:06 localhost rpc.idmapd[413]: exiting on signal 15 Feb 2 01:37:06 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Feb 2 01:37:06 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Feb 2 01:37:06 localhost systemd[1]: Stopped target Network. Feb 2 01:37:06 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Feb 2 01:37:06 localhost systemd[1]: Stopped target Timer Units. Feb 2 01:37:06 localhost systemd[1]: dbus.socket: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Feb 2 01:37:06 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Feb 2 01:37:06 localhost systemd[1]: Stopped target Initrd Default Target. Feb 2 01:37:06 localhost systemd[1]: Stopped target Basic System. Feb 2 01:37:06 localhost systemd[1]: Stopped target Initrd Root Device. Feb 2 01:37:06 localhost systemd[1]: Stopped target Initrd /usr File System. Feb 2 01:37:06 localhost systemd[1]: Stopped target Path Units. Feb 2 01:37:06 localhost systemd[1]: Stopped target Remote File Systems. Feb 2 01:37:06 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Feb 2 01:37:06 localhost systemd[1]: Stopped target Slice Units. Feb 2 01:37:06 localhost systemd[1]: Stopped target Socket Units. Feb 2 01:37:06 localhost systemd[1]: Stopped target System Initialization. Feb 2 01:37:06 localhost systemd[1]: Stopped target Local File Systems. Feb 2 01:37:06 localhost systemd[1]: Stopped target Swaps. Feb 2 01:37:06 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped dracut mount hook. Feb 2 01:37:06 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped dracut pre-mount hook. Feb 2 01:37:06 localhost systemd[1]: Stopped target Local Encrypted Volumes. Feb 2 01:37:06 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Feb 2 01:37:06 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped dracut initqueue hook. Feb 2 01:37:06 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped Apply Kernel Variables. Feb 2 01:37:06 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped Load Kernel Modules. Feb 2 01:37:06 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped Create Volatile Files and Directories. Feb 2 01:37:06 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped Coldplug All udev Devices. Feb 2 01:37:06 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped dracut pre-trigger hook. Feb 2 01:37:06 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Feb 2 01:37:06 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped Setup Virtual Console. Feb 2 01:37:06 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Feb 2 01:37:06 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Feb 2 01:37:06 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Closed udev Control Socket. Feb 2 01:37:06 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Closed udev Kernel Socket. Feb 2 01:37:06 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped dracut pre-udev hook. Feb 2 01:37:06 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped dracut cmdline hook. Feb 2 01:37:06 localhost systemd[1]: Starting Cleanup udev Database... Feb 2 01:37:06 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Feb 2 01:37:06 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped Create List of Static Device Nodes. Feb 2 01:37:06 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Stopped Create System Users. Feb 2 01:37:06 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 2 01:37:06 localhost systemd[1]: Finished Cleanup udev Database. Feb 2 01:37:06 localhost systemd[1]: Reached target Switch Root. Feb 2 01:37:06 localhost systemd[1]: Starting Switch Root... Feb 2 01:37:06 localhost systemd[1]: Switching root. Feb 2 01:37:06 localhost systemd-journald[282]: Journal stopped Feb 2 01:37:07 localhost systemd-journald[282]: Received SIGTERM from PID 1 (systemd). Feb 2 01:37:07 localhost kernel: audit: type=1404 audit(1770014227.020:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Feb 2 01:37:07 localhost kernel: SELinux: policy capability network_peer_controls=1 Feb 2 01:37:07 localhost kernel: SELinux: policy capability open_perms=1 Feb 2 01:37:07 localhost kernel: SELinux: policy capability extended_socket_class=1 Feb 2 01:37:07 localhost kernel: SELinux: policy capability always_check_network=0 Feb 2 01:37:07 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Feb 2 01:37:07 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 2 01:37:07 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 2 01:37:07 localhost kernel: audit: type=1403 audit(1770014227.124:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 2 01:37:07 localhost systemd[1]: Successfully loaded SELinux policy in 107.920ms. Feb 2 01:37:07 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 34.777ms. Feb 2 01:37:07 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 2 01:37:07 localhost systemd[1]: Detected virtualization kvm. Feb 2 01:37:07 localhost systemd[1]: Detected architecture x86-64. Feb 2 01:37:07 localhost systemd-rc-local-generator[581]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 01:37:07 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 01:37:07 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 2 01:37:07 localhost systemd[1]: Stopped Switch Root. Feb 2 01:37:07 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 2 01:37:07 localhost systemd[1]: Created slice Slice /system/getty. Feb 2 01:37:07 localhost systemd[1]: Created slice Slice /system/modprobe. Feb 2 01:37:07 localhost systemd[1]: Created slice Slice /system/serial-getty. Feb 2 01:37:07 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Feb 2 01:37:07 localhost systemd[1]: Created slice Slice /system/systemd-fsck. Feb 2 01:37:07 localhost systemd[1]: Created slice User and Session Slice. Feb 2 01:37:07 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Feb 2 01:37:07 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Feb 2 01:37:07 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Feb 2 01:37:07 localhost systemd[1]: Reached target Local Encrypted Volumes. Feb 2 01:37:07 localhost systemd[1]: Stopped target Switch Root. Feb 2 01:37:07 localhost systemd[1]: Stopped target Initrd File Systems. Feb 2 01:37:07 localhost systemd[1]: Stopped target Initrd Root File System. Feb 2 01:37:07 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Feb 2 01:37:07 localhost systemd[1]: Reached target Path Units. Feb 2 01:37:07 localhost systemd[1]: Reached target rpc_pipefs.target. Feb 2 01:37:07 localhost systemd[1]: Reached target Slice Units. Feb 2 01:37:07 localhost systemd[1]: Reached target Swaps. Feb 2 01:37:07 localhost systemd[1]: Reached target Local Verity Protected Volumes. Feb 2 01:37:07 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Feb 2 01:37:07 localhost systemd[1]: Reached target RPC Port Mapper. Feb 2 01:37:07 localhost systemd[1]: Listening on Process Core Dump Socket. Feb 2 01:37:07 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Feb 2 01:37:07 localhost systemd[1]: Listening on udev Control Socket. Feb 2 01:37:07 localhost systemd[1]: Listening on udev Kernel Socket. Feb 2 01:37:07 localhost systemd[1]: Mounting Huge Pages File System... Feb 2 01:37:07 localhost systemd[1]: Mounting POSIX Message Queue File System... Feb 2 01:37:07 localhost systemd[1]: Mounting Kernel Debug File System... Feb 2 01:37:07 localhost systemd[1]: Mounting Kernel Trace File System... Feb 2 01:37:07 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Feb 2 01:37:07 localhost systemd[1]: Starting Create List of Static Device Nodes... Feb 2 01:37:07 localhost systemd[1]: Starting Load Kernel Module configfs... Feb 2 01:37:07 localhost systemd[1]: Starting Load Kernel Module drm... Feb 2 01:37:07 localhost systemd[1]: Starting Load Kernel Module fuse... Feb 2 01:37:07 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Feb 2 01:37:07 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 2 01:37:07 localhost systemd[1]: Stopped File System Check on Root Device. Feb 2 01:37:07 localhost systemd[1]: Stopped Journal Service. Feb 2 01:37:07 localhost systemd[1]: Starting Journal Service... Feb 2 01:37:07 localhost kernel: fuse: init (API version 7.36) Feb 2 01:37:07 localhost systemd[1]: Starting Load Kernel Modules... Feb 2 01:37:07 localhost systemd[1]: Starting Generate network units from Kernel command line... Feb 2 01:37:07 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Feb 2 01:37:07 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Feb 2 01:37:07 localhost systemd-journald[617]: Journal started Feb 2 01:37:07 localhost systemd-journald[617]: Runtime Journal (/run/log/journal/48447b9b8976f23a3b4b319f2b01dfe5) is 8.0M, max 314.7M, 306.7M free. Feb 2 01:37:07 localhost systemd[1]: Queued start job for default target Multi-User System. Feb 2 01:37:07 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Feb 2 01:37:07 localhost systemd-modules-load[618]: Module 'msr' is built in Feb 2 01:37:07 localhost systemd[1]: Starting Coldplug All udev Devices... Feb 2 01:37:07 localhost systemd[1]: Started Journal Service. Feb 2 01:37:07 localhost systemd[1]: Mounted Huge Pages File System. Feb 2 01:37:07 localhost systemd[1]: Mounted POSIX Message Queue File System. Feb 2 01:37:07 localhost systemd[1]: Mounted Kernel Debug File System. Feb 2 01:37:07 localhost systemd[1]: Mounted Kernel Trace File System. Feb 2 01:37:07 localhost systemd[1]: Finished Create List of Static Device Nodes. Feb 2 01:37:07 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 2 01:37:07 localhost systemd[1]: Finished Load Kernel Module configfs. Feb 2 01:37:07 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Feb 2 01:37:07 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 2 01:37:07 localhost systemd[1]: Finished Load Kernel Module fuse. Feb 2 01:37:07 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Feb 2 01:37:07 localhost systemd[1]: Finished Load Kernel Modules. Feb 2 01:37:07 localhost systemd[1]: Finished Generate network units from Kernel command line. Feb 2 01:37:07 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Feb 2 01:37:07 localhost systemd[1]: Mounting FUSE Control File System... Feb 2 01:37:07 localhost systemd[1]: Mounting Kernel Configuration File System... Feb 2 01:37:07 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Feb 2 01:37:07 localhost systemd[1]: Starting Rebuild Hardware Database... Feb 2 01:37:07 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Feb 2 01:37:07 localhost kernel: ACPI: bus type drm_connector registered Feb 2 01:37:07 localhost systemd[1]: Starting Load/Save Random Seed... Feb 2 01:37:07 localhost systemd[1]: Starting Apply Kernel Variables... Feb 2 01:37:07 localhost systemd-journald[617]: Runtime Journal (/run/log/journal/48447b9b8976f23a3b4b319f2b01dfe5) is 8.0M, max 314.7M, 306.7M free. Feb 2 01:37:07 localhost systemd-journald[617]: Received client request to flush runtime journal. Feb 2 01:37:07 localhost systemd[1]: Starting Create System Users... Feb 2 01:37:07 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 2 01:37:07 localhost systemd[1]: Finished Load Kernel Module drm. Feb 2 01:37:07 localhost systemd[1]: Mounted FUSE Control File System. Feb 2 01:37:07 localhost systemd[1]: Mounted Kernel Configuration File System. Feb 2 01:37:07 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Feb 2 01:37:07 localhost systemd[1]: Finished Load/Save Random Seed. Feb 2 01:37:07 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Feb 2 01:37:07 localhost systemd[1]: Finished Apply Kernel Variables. Feb 2 01:37:07 localhost systemd[1]: Finished Coldplug All udev Devices. Feb 2 01:37:07 localhost systemd-sysusers[630]: Creating group 'sgx' with GID 989. Feb 2 01:37:07 localhost systemd-sysusers[630]: Creating group 'systemd-oom' with GID 988. Feb 2 01:37:07 localhost systemd-sysusers[630]: Creating user 'systemd-oom' (systemd Userspace OOM Killer) with UID 988 and GID 988. Feb 2 01:37:07 localhost systemd[1]: Finished Create System Users. Feb 2 01:37:07 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Feb 2 01:37:07 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Feb 2 01:37:07 localhost systemd[1]: Reached target Preparation for Local File Systems. Feb 2 01:37:07 localhost systemd[1]: Set up automount EFI System Partition Automount. Feb 2 01:37:08 localhost systemd[1]: Finished Rebuild Hardware Database. Feb 2 01:37:08 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Feb 2 01:37:08 localhost systemd-udevd[634]: Using default interface naming scheme 'rhel-9.0'. Feb 2 01:37:08 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Feb 2 01:37:08 localhost systemd[1]: Starting Load Kernel Module configfs... Feb 2 01:37:08 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Feb 2 01:37:08 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 2 01:37:08 localhost systemd[1]: Finished Load Kernel Module configfs. Feb 2 01:37:08 localhost systemd-udevd[644]: Network interface NamePolicy= disabled on kernel command line. Feb 2 01:37:08 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/b141154b-6a70-437a-a97f-d160c9ba37eb being skipped. Feb 2 01:37:08 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/7B77-95E7 being skipped. Feb 2 01:37:08 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/7B77-95E7... Feb 2 01:37:08 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 2 01:37:08 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Feb 2 01:37:08 localhost systemd-fsck[677]: fsck.fat 4.2 (2021-01-31) Feb 2 01:37:08 localhost systemd-fsck[677]: /dev/vda2: 12 files, 1782/51145 clusters Feb 2 01:37:08 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/7B77-95E7. Feb 2 01:37:08 localhost kernel: SVM: TSC scaling supported Feb 2 01:37:08 localhost kernel: kvm: Nested Virtualization enabled Feb 2 01:37:08 localhost kernel: SVM: kvm: Nested Paging enabled Feb 2 01:37:08 localhost kernel: SVM: LBR virtualization supported Feb 2 01:37:08 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Feb 2 01:37:08 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Feb 2 01:37:08 localhost kernel: Console: switching to colour dummy device 80x25 Feb 2 01:37:08 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Feb 2 01:37:08 localhost kernel: [drm] features: -context_init Feb 2 01:37:08 localhost kernel: [drm] number of scanouts: 1 Feb 2 01:37:08 localhost kernel: [drm] number of cap sets: 0 Feb 2 01:37:08 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 0 for virtio0 on minor 0 Feb 2 01:37:08 localhost kernel: virtio_gpu virtio0: [drm] drm_plane_enable_fb_damage_clips() not called Feb 2 01:37:08 localhost kernel: Console: switching to colour frame buffer device 128x48 Feb 2 01:37:08 localhost kernel: virtio_gpu virtio0: [drm] fb0: virtio_gpudrmfb frame buffer device Feb 2 01:37:08 localhost systemd[1]: Mounting /boot... Feb 2 01:37:08 localhost kernel: XFS (vda3): Mounting V5 Filesystem Feb 2 01:37:08 localhost kernel: XFS (vda3): Ending clean mount Feb 2 01:37:08 localhost kernel: xfs filesystem being mounted at /boot supports timestamps until 2038 (0x7fffffff) Feb 2 01:37:08 localhost systemd[1]: Mounted /boot. Feb 2 01:37:08 localhost systemd[1]: Mounting /boot/efi... Feb 2 01:37:08 localhost systemd[1]: Mounted /boot/efi. Feb 2 01:37:08 localhost systemd[1]: Reached target Local File Systems. Feb 2 01:37:08 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Feb 2 01:37:08 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Feb 2 01:37:08 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Feb 2 01:37:08 localhost systemd[1]: Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 2 01:37:08 localhost systemd[1]: Starting Automatic Boot Loader Update... Feb 2 01:37:08 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Feb 2 01:37:08 localhost systemd[1]: Starting Create Volatile Files and Directories... Feb 2 01:37:08 localhost systemd[1]: efi.automount: Got automount request for /efi, triggered by 716 (bootctl) Feb 2 01:37:08 localhost systemd[1]: Starting File System Check on /dev/vda2... Feb 2 01:37:08 localhost systemd[1]: Finished File System Check on /dev/vda2. Feb 2 01:37:08 localhost systemd[1]: Mounting EFI System Partition Automount... Feb 2 01:37:08 localhost systemd[1]: Mounted EFI System Partition Automount. Feb 2 01:37:08 localhost systemd[1]: Finished Automatic Boot Loader Update. Feb 2 01:37:08 localhost systemd[1]: Finished Create Volatile Files and Directories. Feb 2 01:37:08 localhost systemd[1]: Starting Security Auditing Service... Feb 2 01:37:08 localhost systemd[1]: Starting RPC Bind... Feb 2 01:37:08 localhost systemd[1]: Starting Rebuild Journal Catalog... Feb 2 01:37:08 localhost auditd[725]: audit dispatcher initialized with q_depth=1200 and 1 active plugins Feb 2 01:37:08 localhost auditd[725]: Init complete, auditd 3.0.7 listening for events (startup state enable) Feb 2 01:37:08 localhost systemd[1]: Finished Rebuild Journal Catalog. Feb 2 01:37:09 localhost systemd[1]: Started RPC Bind. Feb 2 01:37:09 localhost augenrules[730]: /sbin/augenrules: No change Feb 2 01:37:09 localhost augenrules[740]: No rules Feb 2 01:37:09 localhost augenrules[740]: enabled 1 Feb 2 01:37:09 localhost augenrules[740]: failure 1 Feb 2 01:37:09 localhost augenrules[740]: pid 725 Feb 2 01:37:09 localhost augenrules[740]: rate_limit 0 Feb 2 01:37:09 localhost augenrules[740]: backlog_limit 8192 Feb 2 01:37:09 localhost augenrules[740]: lost 0 Feb 2 01:37:09 localhost augenrules[740]: backlog 4 Feb 2 01:37:09 localhost augenrules[740]: backlog_wait_time 60000 Feb 2 01:37:09 localhost augenrules[740]: backlog_wait_time_actual 0 Feb 2 01:37:09 localhost augenrules[740]: enabled 1 Feb 2 01:37:09 localhost augenrules[740]: failure 1 Feb 2 01:37:09 localhost augenrules[740]: pid 725 Feb 2 01:37:09 localhost augenrules[740]: rate_limit 0 Feb 2 01:37:09 localhost augenrules[740]: backlog_limit 8192 Feb 2 01:37:09 localhost augenrules[740]: lost 0 Feb 2 01:37:09 localhost augenrules[740]: backlog 0 Feb 2 01:37:09 localhost augenrules[740]: backlog_wait_time 60000 Feb 2 01:37:09 localhost augenrules[740]: backlog_wait_time_actual 0 Feb 2 01:37:09 localhost augenrules[740]: enabled 1 Feb 2 01:37:09 localhost augenrules[740]: failure 1 Feb 2 01:37:09 localhost augenrules[740]: pid 725 Feb 2 01:37:09 localhost augenrules[740]: rate_limit 0 Feb 2 01:37:09 localhost augenrules[740]: backlog_limit 8192 Feb 2 01:37:09 localhost augenrules[740]: lost 0 Feb 2 01:37:09 localhost augenrules[740]: backlog 4 Feb 2 01:37:09 localhost augenrules[740]: backlog_wait_time 60000 Feb 2 01:37:09 localhost augenrules[740]: backlog_wait_time_actual 0 Feb 2 01:37:09 localhost systemd[1]: Started Security Auditing Service. Feb 2 01:37:09 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Feb 2 01:37:09 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Feb 2 01:37:09 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Feb 2 01:37:09 localhost systemd[1]: Starting Update is Completed... Feb 2 01:37:09 localhost systemd[1]: Finished Update is Completed. Feb 2 01:37:09 localhost systemd[1]: Reached target System Initialization. Feb 2 01:37:09 localhost systemd[1]: Started dnf makecache --timer. Feb 2 01:37:09 localhost systemd[1]: Started Daily rotation of log files. Feb 2 01:37:09 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Feb 2 01:37:09 localhost systemd[1]: Reached target Timer Units. Feb 2 01:37:09 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Feb 2 01:37:09 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Feb 2 01:37:09 localhost systemd[1]: Reached target Socket Units. Feb 2 01:37:09 localhost systemd[1]: Starting Initial cloud-init job (pre-networking)... Feb 2 01:37:09 localhost systemd[1]: Starting D-Bus System Message Bus... Feb 2 01:37:09 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 2 01:37:09 localhost systemd[1]: Started D-Bus System Message Bus. Feb 2 01:37:09 localhost systemd[1]: Reached target Basic System. Feb 2 01:37:09 localhost journal[750]: Ready Feb 2 01:37:09 localhost systemd[1]: Starting NTP client/server... Feb 2 01:37:09 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Feb 2 01:37:09 localhost systemd[1]: Started irqbalance daemon. Feb 2 01:37:09 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Feb 2 01:37:09 localhost systemd[1]: Starting System Logging Service... Feb 2 01:37:09 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 2 01:37:09 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 2 01:37:09 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 2 01:37:09 localhost systemd[1]: Reached target sshd-keygen.target. Feb 2 01:37:09 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Feb 2 01:37:09 localhost systemd[1]: Reached target User and Group Name Lookups. Feb 2 01:37:09 localhost systemd[1]: Starting User Login Management... Feb 2 01:37:09 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Feb 2 01:37:09 localhost rsyslogd[758]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="758" x-info="https://www.rsyslog.com"] start Feb 2 01:37:09 localhost rsyslogd[758]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2040 ] Feb 2 01:37:09 localhost systemd[1]: Started System Logging Service. Feb 2 01:37:09 localhost chronyd[765]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Feb 2 01:37:09 localhost chronyd[765]: Using right/UTC timezone to obtain leap second data Feb 2 01:37:09 localhost chronyd[765]: Loaded seccomp filter (level 2) Feb 2 01:37:09 localhost systemd[1]: Started NTP client/server. Feb 2 01:37:09 localhost systemd-logind[759]: New seat seat0. Feb 2 01:37:09 localhost systemd-logind[759]: Watching system buttons on /dev/input/event0 (Power Button) Feb 2 01:37:09 localhost systemd-logind[759]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 2 01:37:09 localhost systemd[1]: Started User Login Management. Feb 2 01:37:09 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Feb 2 01:37:09 localhost cloud-init[769]: Cloud-init v. 22.1-9.el9 running 'init-local' at Mon, 02 Feb 2026 06:37:09 +0000. Up 6.12 seconds. Feb 2 01:37:10 localhost systemd[1]: run-cloud\x2dinit-tmp-tmp5viqasnb.mount: Deactivated successfully. Feb 2 01:37:10 localhost systemd[1]: Starting Hostname Service... Feb 2 01:37:10 localhost systemd[1]: Started Hostname Service. Feb 2 01:37:10 localhost systemd-hostnamed[783]: Hostname set to (static) Feb 2 01:37:10 localhost systemd[1]: Finished Initial cloud-init job (pre-networking). Feb 2 01:37:10 localhost systemd[1]: Reached target Preparation for Network. Feb 2 01:37:10 localhost systemd[1]: Starting Network Manager... Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.4674] NetworkManager (version 1.42.2-1.el9) is starting... (boot:ab212fec-fcdc-40c9-86f0-5c8d0ef5b6f3) Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.4680] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Feb 2 01:37:10 localhost systemd[1]: Started Network Manager. Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.4720] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Feb 2 01:37:10 localhost systemd[1]: Reached target Network. Feb 2 01:37:10 localhost systemd[1]: Starting Network Manager Wait Online... Feb 2 01:37:10 localhost systemd[1]: Starting GSSAPI Proxy Daemon... Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.4812] manager[0x5625cb0ed020]: monitoring kernel firmware directory '/lib/firmware'. Feb 2 01:37:10 localhost systemd[1]: Starting Enable periodic update of entitlement certificates.... Feb 2 01:37:10 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.4874] hostname: hostname: using hostnamed Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.4874] hostname: static hostname changed from (none) to "np0005604725.novalocal" Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.4887] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Feb 2 01:37:10 localhost systemd[1]: Started Enable periodic update of entitlement certificates.. Feb 2 01:37:10 localhost systemd[1]: Started GSSAPI Proxy Daemon. Feb 2 01:37:10 localhost systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Feb 2 01:37:10 localhost systemd[1]: Reached target NFS client services. Feb 2 01:37:10 localhost systemd[1]: Reached target Preparation for Remote File Systems. Feb 2 01:37:10 localhost systemd[1]: Reached target Remote File Systems. Feb 2 01:37:10 localhost systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5084] manager[0x5625cb0ed020]: rfkill: Wi-Fi hardware radio set enabled Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5088] manager[0x5625cb0ed020]: rfkill: WWAN hardware radio set enabled Feb 2 01:37:10 localhost systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5157] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5158] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5166] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5167] manager: Networking is enabled by state file Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5207] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5208] settings: Loaded settings plugin: keyfile (internal) Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5239] dhcp: init: Using DHCP client 'internal' Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5241] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Feb 2 01:37:10 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5253] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5258] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5265] device (lo): Activation: starting connection 'lo' (95a315a5-2bb1-437b-a760-de784249b4a2) Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5273] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5276] device (eth0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5300] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5304] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5306] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5308] device (eth0): carrier: link connected Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5310] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5314] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5322] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5326] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5326] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Feb 2 01:37:10 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5328] manager: NetworkManager state is now CONNECTING Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5328] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5339] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5342] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5359] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5361] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5366] device (lo): Activation: successful, device activated. Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5864] dhcp4 (eth0): state changed new lease, address=38.102.83.200 Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5872] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5912] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5929] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5932] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5944] manager: NetworkManager state is now CONNECTED_SITE Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5959] device (eth0): Activation: successful, device activated. Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5969] manager: NetworkManager state is now CONNECTED_GLOBAL Feb 2 01:37:10 localhost NetworkManager[788]: [1770014230.5981] manager: startup complete Feb 2 01:37:10 localhost systemd[1]: Finished Network Manager Wait Online. Feb 2 01:37:10 localhost systemd[1]: Starting Initial cloud-init job (metadata service crawler)... Feb 2 01:37:10 localhost cloud-init[985]: Cloud-init v. 22.1-9.el9 running 'init' at Mon, 02 Feb 2026 06:37:10 +0000. Up 7.04 seconds. Feb 2 01:37:10 localhost cloud-init[985]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Feb 2 01:37:10 localhost cloud-init[985]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Feb 2 01:37:10 localhost cloud-init[985]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Feb 2 01:37:10 localhost cloud-init[985]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Feb 2 01:37:10 localhost cloud-init[985]: ci-info: | eth0 | True | 38.102.83.200 | 255.255.255.0 | global | fa:16:3e:33:b6:81 | Feb 2 01:37:10 localhost cloud-init[985]: ci-info: | eth0 | True | fe80::f816:3eff:fe33:b681/64 | . | link | fa:16:3e:33:b6:81 | Feb 2 01:37:10 localhost cloud-init[985]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Feb 2 01:37:10 localhost cloud-init[985]: ci-info: | lo | True | ::1/128 | . | host | . | Feb 2 01:37:10 localhost cloud-init[985]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Feb 2 01:37:10 localhost cloud-init[985]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Feb 2 01:37:10 localhost cloud-init[985]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Feb 2 01:37:10 localhost cloud-init[985]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Feb 2 01:37:10 localhost cloud-init[985]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Feb 2 01:37:10 localhost cloud-init[985]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Feb 2 01:37:10 localhost cloud-init[985]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Feb 2 01:37:10 localhost cloud-init[985]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Feb 2 01:37:10 localhost cloud-init[985]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Feb 2 01:37:10 localhost cloud-init[985]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Feb 2 01:37:10 localhost cloud-init[985]: ci-info: +-------+-------------+---------+-----------+-------+ Feb 2 01:37:10 localhost cloud-init[985]: ci-info: | Route | Destination | Gateway | Interface | Flags | Feb 2 01:37:10 localhost cloud-init[985]: ci-info: +-------+-------------+---------+-----------+-------+ Feb 2 01:37:10 localhost cloud-init[985]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Feb 2 01:37:10 localhost cloud-init[985]: ci-info: | 3 | multicast | :: | eth0 | U | Feb 2 01:37:10 localhost cloud-init[985]: ci-info: +-------+-------------+---------+-----------+-------+ Feb 2 01:37:10 localhost systemd[1]: Starting Authorization Manager... Feb 2 01:37:10 localhost systemd[1]: Started Dynamic System Tuning Daemon. Feb 2 01:37:10 localhost polkitd[1035]: Started polkitd version 0.117 Feb 2 01:37:11 localhost systemd[1]: Started Authorization Manager. Feb 2 01:37:13 localhost cloud-init[985]: Generating public/private rsa key pair. Feb 2 01:37:13 localhost cloud-init[985]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Feb 2 01:37:13 localhost cloud-init[985]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Feb 2 01:37:13 localhost cloud-init[985]: The key fingerprint is: Feb 2 01:37:13 localhost cloud-init[985]: SHA256:ybPZ1KBvsqTo/cxZSRddh2wViGAOdJk4pxBAjK/18F8 root@np0005604725.novalocal Feb 2 01:37:13 localhost cloud-init[985]: The key's randomart image is: Feb 2 01:37:13 localhost cloud-init[985]: +---[RSA 3072]----+ Feb 2 01:37:13 localhost cloud-init[985]: | +o..oo.++ ...+=| Feb 2 01:37:13 localhost cloud-init[985]: | . . . o=+ . o+..| Feb 2 01:37:13 localhost cloud-init[985]: | . . +.. ... | Feb 2 01:37:13 localhost cloud-init[985]: | + o o o . | Feb 2 01:37:13 localhost cloud-init[985]: | o + S o o | Feb 2 01:37:13 localhost cloud-init[985]: | . o E o | Feb 2 01:37:13 localhost cloud-init[985]: | . * * | Feb 2 01:37:13 localhost cloud-init[985]: | o * * | Feb 2 01:37:13 localhost cloud-init[985]: | .o o.* | Feb 2 01:37:13 localhost cloud-init[985]: +----[SHA256]-----+ Feb 2 01:37:13 localhost cloud-init[985]: Generating public/private ecdsa key pair. Feb 2 01:37:13 localhost cloud-init[985]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Feb 2 01:37:13 localhost cloud-init[985]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Feb 2 01:37:13 localhost cloud-init[985]: The key fingerprint is: Feb 2 01:37:13 localhost cloud-init[985]: SHA256:DZ+eZakXpubfap5qD+YRRffOQ/fUXzdwBng/uDZpJfQ root@np0005604725.novalocal Feb 2 01:37:13 localhost cloud-init[985]: The key's randomart image is: Feb 2 01:37:13 localhost cloud-init[985]: +---[ECDSA 256]---+ Feb 2 01:37:13 localhost cloud-init[985]: | oooo | Feb 2 01:37:13 localhost cloud-init[985]: | o ++..| Feb 2 01:37:13 localhost cloud-init[985]: | . + +oB| Feb 2 01:37:13 localhost cloud-init[985]: | + o +.EB| Feb 2 01:37:13 localhost cloud-init[985]: | S = * =.*| Feb 2 01:37:13 localhost cloud-init[985]: | . O B .| Feb 2 01:37:13 localhost cloud-init[985]: | X + . | Feb 2 01:37:13 localhost cloud-init[985]: | =.+.o | Feb 2 01:37:13 localhost cloud-init[985]: | .+**.. | Feb 2 01:37:13 localhost cloud-init[985]: +----[SHA256]-----+ Feb 2 01:37:13 localhost cloud-init[985]: Generating public/private ed25519 key pair. Feb 2 01:37:13 localhost cloud-init[985]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Feb 2 01:37:13 localhost cloud-init[985]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Feb 2 01:37:13 localhost cloud-init[985]: The key fingerprint is: Feb 2 01:37:13 localhost cloud-init[985]: SHA256:3FG7LdHwAjNOHT/jqQT3tmiUC91I//ob7PehgI9y/cc root@np0005604725.novalocal Feb 2 01:37:13 localhost cloud-init[985]: The key's randomart image is: Feb 2 01:37:13 localhost cloud-init[985]: +--[ED25519 256]--+ Feb 2 01:37:13 localhost cloud-init[985]: | =.+. | Feb 2 01:37:13 localhost cloud-init[985]: | o =.* | Feb 2 01:37:13 localhost cloud-init[985]: | + * * | Feb 2 01:37:13 localhost cloud-init[985]: | . . * % + | Feb 2 01:37:13 localhost cloud-init[985]: | S o O O | Feb 2 01:37:13 localhost cloud-init[985]: | .+ *.o | Feb 2 01:37:13 localhost cloud-init[985]: | ...= o+.| Feb 2 01:37:13 localhost cloud-init[985]: | . .oo. oE+| Feb 2 01:37:13 localhost cloud-init[985]: | o. ..oo+*| Feb 2 01:37:13 localhost cloud-init[985]: +----[SHA256]-----+ Feb 2 01:37:13 localhost systemd[1]: Finished Initial cloud-init job (metadata service crawler). Feb 2 01:37:13 localhost systemd[1]: Reached target Cloud-config availability. Feb 2 01:37:13 localhost systemd[1]: Reached target Network is Online. Feb 2 01:37:13 localhost systemd[1]: Starting Apply the settings specified in cloud-config... Feb 2 01:37:13 localhost systemd[1]: Run Insights Client at boot was skipped because of an unmet condition check (ConditionPathExists=/etc/insights-client/.run_insights_client_next_boot). Feb 2 01:37:13 localhost systemd[1]: Starting Crash recovery kernel arming... Feb 2 01:37:13 localhost systemd[1]: Starting Notify NFS peers of a restart... Feb 2 01:37:13 localhost systemd[1]: Starting OpenSSH server daemon... Feb 2 01:37:13 localhost systemd[1]: Starting Permit User Sessions... Feb 2 01:37:13 localhost sm-notify[1131]: Version 2.5.4 starting Feb 2 01:37:13 localhost systemd[1]: Started Notify NFS peers of a restart. Feb 2 01:37:13 localhost sshd[1132]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:37:13 localhost systemd[1]: Finished Permit User Sessions. Feb 2 01:37:13 localhost systemd[1]: Started Command Scheduler. Feb 2 01:37:13 localhost systemd[1]: Started Getty on tty1. Feb 2 01:37:13 localhost systemd[1]: Started Serial Getty on ttyS0. Feb 2 01:37:13 localhost systemd[1]: Reached target Login Prompts. Feb 2 01:37:13 localhost systemd[1]: Started OpenSSH server daemon. Feb 2 01:37:13 localhost systemd[1]: Reached target Multi-User System. Feb 2 01:37:13 localhost sshd[1135]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:37:13 localhost systemd[1]: Starting Record Runlevel Change in UTMP... Feb 2 01:37:13 localhost systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 2 01:37:13 localhost systemd[1]: Finished Record Runlevel Change in UTMP. Feb 2 01:37:13 localhost sshd[1150]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:37:13 localhost sshd[1165]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:37:13 localhost sshd[1178]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:37:13 localhost sshd[1188]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:37:13 localhost kdumpctl[1138]: kdump: No kdump initial ramdisk found. Feb 2 01:37:13 localhost kdumpctl[1138]: kdump: Rebuilding /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img Feb 2 01:37:13 localhost sshd[1196]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:37:13 localhost sshd[1205]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:37:13 localhost sshd[1224]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:37:13 localhost sshd[1242]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:37:13 localhost cloud-init[1274]: Cloud-init v. 22.1-9.el9 running 'modules:config' at Mon, 02 Feb 2026 06:37:13 +0000. Up 10.06 seconds. Feb 2 01:37:13 localhost systemd[1]: Finished Apply the settings specified in cloud-config. Feb 2 01:37:14 localhost systemd[1]: Starting Execute cloud user/final scripts... Feb 2 01:37:14 localhost dracut[1434]: dracut-057-21.git20230214.el9 Feb 2 01:37:14 localhost cloud-init[1452]: Cloud-init v. 22.1-9.el9 running 'modules:final' at Mon, 02 Feb 2026 06:37:14 +0000. Up 10.43 seconds. Feb 2 01:37:14 localhost dracut[1436]: Executing: /usr/bin/dracut --add kdumpbase --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics -o "plymouth resume ifcfg earlykdump" --mount "/dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device -f /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img 5.14.0-284.11.1.el9_2.x86_64 Feb 2 01:37:14 localhost cloud-init[1493]: ############################################################# Feb 2 01:37:14 localhost cloud-init[1498]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Feb 2 01:37:14 localhost cloud-init[1505]: 256 SHA256:DZ+eZakXpubfap5qD+YRRffOQ/fUXzdwBng/uDZpJfQ root@np0005604725.novalocal (ECDSA) Feb 2 01:37:14 localhost cloud-init[1520]: 256 SHA256:3FG7LdHwAjNOHT/jqQT3tmiUC91I//ob7PehgI9y/cc root@np0005604725.novalocal (ED25519) Feb 2 01:37:14 localhost cloud-init[1533]: 3072 SHA256:ybPZ1KBvsqTo/cxZSRddh2wViGAOdJk4pxBAjK/18F8 root@np0005604725.novalocal (RSA) Feb 2 01:37:14 localhost cloud-init[1537]: -----END SSH HOST KEY FINGERPRINTS----- Feb 2 01:37:14 localhost cloud-init[1541]: ############################################################# Feb 2 01:37:14 localhost dracut[1436]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Feb 2 01:37:14 localhost cloud-init[1452]: Cloud-init v. 22.1-9.el9 finished at Mon, 02 Feb 2026 06:37:14 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 10.70 seconds Feb 2 01:37:14 localhost dracut[1436]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Feb 2 01:37:14 localhost dracut[1436]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Feb 2 01:37:14 localhost systemd[1]: Reloading Network Manager... Feb 2 01:37:14 localhost dracut[1436]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Feb 2 01:37:14 localhost NetworkManager[788]: [1770014234.6351] audit: op="reload" arg="0" pid=1646 uid=0 result="success" Feb 2 01:37:14 localhost NetworkManager[788]: [1770014234.6360] config: signal: SIGHUP (no changes from disk) Feb 2 01:37:14 localhost systemd[1]: Reloaded Network Manager. Feb 2 01:37:14 localhost systemd[1]: Finished Execute cloud user/final scripts. Feb 2 01:37:14 localhost systemd[1]: Reached target Cloud-init target. Feb 2 01:37:14 localhost dracut[1436]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Feb 2 01:37:14 localhost dracut[1436]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Feb 2 01:37:15 localhost dracut[1436]: memstrack is not available Feb 2 01:37:15 localhost dracut[1436]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Feb 2 01:37:15 localhost dracut[1436]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Feb 2 01:37:15 localhost dracut[1436]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Feb 2 01:37:15 localhost dracut[1436]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Feb 2 01:37:15 localhost dracut[1436]: memstrack is not available Feb 2 01:37:15 localhost dracut[1436]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Feb 2 01:37:15 localhost dracut[1436]: *** Including module: systemd *** Feb 2 01:37:15 localhost chronyd[765]: Selected source 162.159.200.123 (2.rhel.pool.ntp.org) Feb 2 01:37:15 localhost chronyd[765]: System clock TAI offset set to 37 seconds Feb 2 01:37:15 localhost dracut[1436]: *** Including module: systemd-initrd *** Feb 2 01:37:15 localhost dracut[1436]: *** Including module: i18n *** Feb 2 01:37:15 localhost dracut[1436]: No KEYMAP configured. Feb 2 01:37:15 localhost dracut[1436]: *** Including module: drm *** Feb 2 01:37:16 localhost dracut[1436]: *** Including module: prefixdevname *** Feb 2 01:37:16 localhost dracut[1436]: *** Including module: kernel-modules *** Feb 2 01:37:16 localhost dracut[1436]: *** Including module: kernel-modules-extra *** Feb 2 01:37:17 localhost dracut[1436]: *** Including module: qemu *** Feb 2 01:37:17 localhost dracut[1436]: *** Including module: fstab-sys *** Feb 2 01:37:17 localhost dracut[1436]: *** Including module: rootfs-block *** Feb 2 01:37:17 localhost dracut[1436]: *** Including module: terminfo *** Feb 2 01:37:17 localhost dracut[1436]: *** Including module: udev-rules *** Feb 2 01:37:17 localhost dracut[1436]: Skipping udev rule: 91-permissions.rules Feb 2 01:37:17 localhost dracut[1436]: Skipping udev rule: 80-drivers-modprobe.rules Feb 2 01:37:17 localhost dracut[1436]: *** Including module: virtiofs *** Feb 2 01:37:17 localhost dracut[1436]: *** Including module: dracut-systemd *** Feb 2 01:37:17 localhost dracut[1436]: *** Including module: usrmount *** Feb 2 01:37:17 localhost dracut[1436]: *** Including module: base *** Feb 2 01:37:17 localhost dracut[1436]: *** Including module: fs-lib *** Feb 2 01:37:17 localhost dracut[1436]: *** Including module: kdumpbase *** Feb 2 01:37:18 localhost dracut[1436]: *** Including module: microcode_ctl-fw_dir_override *** Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl module: mangling fw_dir Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: configuration "intel" is ignored Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: configuration "intel-06-2d-07" is ignored Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: configuration "intel-06-4e-03" is ignored Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: configuration "intel-06-4f-01" is ignored Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: configuration "intel-06-55-04" is ignored Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: configuration "intel-06-5e-03" is ignored Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: configuration "intel-06-8c-01" is ignored Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Feb 2 01:37:18 localhost dracut[1436]: microcode_ctl: final fw_dir: "/lib/firmware/updates/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware/updates /lib/firmware/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware" Feb 2 01:37:18 localhost dracut[1436]: *** Including module: shutdown *** Feb 2 01:37:18 localhost dracut[1436]: *** Including module: squash *** Feb 2 01:37:18 localhost dracut[1436]: *** Including modules done *** Feb 2 01:37:18 localhost dracut[1436]: *** Installing kernel module dependencies *** Feb 2 01:37:19 localhost dracut[1436]: *** Installing kernel module dependencies done *** Feb 2 01:37:19 localhost dracut[1436]: *** Resolving executable dependencies *** Feb 2 01:37:20 localhost dracut[1436]: *** Resolving executable dependencies done *** Feb 2 01:37:20 localhost dracut[1436]: *** Hardlinking files *** Feb 2 01:37:20 localhost dracut[1436]: Mode: real Feb 2 01:37:20 localhost dracut[1436]: Files: 1099 Feb 2 01:37:20 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Feb 2 01:37:20 localhost dracut[1436]: Linked: 3 files Feb 2 01:37:20 localhost dracut[1436]: Compared: 0 xattrs Feb 2 01:37:20 localhost dracut[1436]: Compared: 373 files Feb 2 01:37:20 localhost dracut[1436]: Saved: 61.04 KiB Feb 2 01:37:20 localhost dracut[1436]: Duration: 0.054760 seconds Feb 2 01:37:20 localhost dracut[1436]: *** Hardlinking files done *** Feb 2 01:37:20 localhost dracut[1436]: Could not find 'strip'. Not stripping the initramfs. Feb 2 01:37:20 localhost dracut[1436]: *** Generating early-microcode cpio image *** Feb 2 01:37:20 localhost dracut[1436]: *** Constructing AuthenticAMD.bin *** Feb 2 01:37:20 localhost dracut[1436]: *** Store current command line parameters *** Feb 2 01:37:20 localhost dracut[1436]: Stored kernel commandline: Feb 2 01:37:20 localhost dracut[1436]: No dracut internal kernel commandline stored in the initramfs Feb 2 01:37:20 localhost dracut[1436]: *** Install squash loader *** Feb 2 01:37:21 localhost dracut[1436]: *** Squashing the files inside the initramfs *** Feb 2 01:37:22 localhost dracut[1436]: *** Squashing the files inside the initramfs done *** Feb 2 01:37:22 localhost dracut[1436]: *** Creating image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' *** Feb 2 01:37:22 localhost dracut[1436]: *** Creating initramfs image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' done *** Feb 2 01:37:23 localhost kdumpctl[1138]: kdump: kexec: loaded kdump kernel Feb 2 01:37:23 localhost kdumpctl[1138]: kdump: Starting kdump: [OK] Feb 2 01:37:23 localhost systemd[1]: Finished Crash recovery kernel arming. Feb 2 01:37:23 localhost systemd[1]: Startup finished in 1.179s (kernel) + 2.049s (initrd) + 16.269s (userspace) = 19.498s. Feb 2 01:37:40 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 2 01:37:53 localhost sshd[4175]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:37:53 localhost systemd[1]: Created slice User Slice of UID 1000. Feb 2 01:37:53 localhost systemd[1]: Starting User Runtime Directory /run/user/1000... Feb 2 01:37:53 localhost systemd-logind[759]: New session 1 of user zuul. Feb 2 01:37:53 localhost systemd[1]: Finished User Runtime Directory /run/user/1000. Feb 2 01:37:53 localhost systemd[1]: Starting User Manager for UID 1000... Feb 2 01:37:53 localhost systemd[4179]: Queued start job for default target Main User Target. Feb 2 01:37:53 localhost systemd[4179]: Created slice User Application Slice. Feb 2 01:37:53 localhost systemd[4179]: Started Mark boot as successful after the user session has run 2 minutes. Feb 2 01:37:53 localhost systemd[4179]: Started Daily Cleanup of User's Temporary Directories. Feb 2 01:37:53 localhost systemd[4179]: Reached target Paths. Feb 2 01:37:53 localhost systemd[4179]: Reached target Timers. Feb 2 01:37:53 localhost systemd[4179]: Starting D-Bus User Message Bus Socket... Feb 2 01:37:53 localhost systemd[4179]: Starting Create User's Volatile Files and Directories... Feb 2 01:37:53 localhost systemd[4179]: Finished Create User's Volatile Files and Directories. Feb 2 01:37:53 localhost systemd[4179]: Listening on D-Bus User Message Bus Socket. Feb 2 01:37:53 localhost systemd[4179]: Reached target Sockets. Feb 2 01:37:53 localhost systemd[4179]: Reached target Basic System. Feb 2 01:37:53 localhost systemd[4179]: Reached target Main User Target. Feb 2 01:37:53 localhost systemd[4179]: Startup finished in 114ms. Feb 2 01:37:53 localhost systemd[1]: Started User Manager for UID 1000. Feb 2 01:37:53 localhost systemd[1]: Started Session 1 of User zuul. Feb 2 01:37:53 localhost python3[4231]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 01:38:00 localhost python3[4249]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 01:38:09 localhost python3[4302]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 01:38:10 localhost python3[4332]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Feb 2 01:38:13 localhost python3[4348]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:14 localhost python3[4362]: ansible-file Invoked with state=directory path=/home/zuul/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:38:15 localhost python3[4421]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 01:38:15 localhost python3[4462]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1770014294.7781076-344-122261163012049/source dest=/home/zuul/.ssh/id_rsa mode=384 force=False _original_basename=787e74ff6eaa40b09474e6f677511092_id_rsa follow=False checksum=8a867f6a9741086497bd57804c37ae9f0bc86fd1 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:38:16 localhost python3[4535]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 01:38:17 localhost python3[4576]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1770014296.475068-442-73587311258188/source dest=/home/zuul/.ssh/id_rsa.pub mode=420 force=False _original_basename=787e74ff6eaa40b09474e6f677511092_id_rsa.pub follow=False checksum=3c30998ac883cb6393f2c91d71828f09947af393 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:38:19 localhost python3[4604]: ansible-ping Invoked with data=pong Feb 2 01:38:20 localhost python3[4618]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 01:38:25 localhost python3[4671]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Feb 2 01:38:27 localhost python3[4693]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:38:27 localhost python3[4707]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:38:27 localhost python3[4721]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:38:29 localhost python3[4735]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:38:29 localhost python3[4749]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:38:29 localhost python3[4764]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:38:32 localhost python3[4780]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:38:33 localhost python3[4828]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 01:38:33 localhost python3[4871]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul/.ansible/tmp/ansible-tmp-1770014312.995642-57-44259728396172/source follow=False _original_basename=mirror_info.sh.j2 checksum=92d92a03afdddee82732741071f662c729080c35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:38:35 localhost python3[4899]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA4Z/c9osaGGtU6X8fgELwfj/yayRurfcKA0HMFfdpPxev2dbwljysMuzoVp4OZmW1gvGtyYPSNRvnzgsaabPNKNo2ym5NToCP6UM+KSe93aln4BcM/24mXChYAbXJQ5Bqq/pIzsGs/pKetQN+vwvMxLOwTvpcsCJBXaa981RKML6xj9l/UZ7IIq1HSEKMvPLxZMWdu0Ut8DkCd5F4nOw9Wgml2uYpDCj5LLCrQQ9ChdOMz8hz6SighhNlRpPkvPaet3OXxr/ytFMu7j7vv06CaEnuMMiY2aTWN1Imin9eHAylIqFHta/3gFfQSWt9jXM7owkBLKL7ATzhaAn+fjNupw== arxcruz@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:35 localhost python3[4913]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS4Fn6k4deCnIlOtLWqZJyksbepjQt04j8Ed8CGx9EKkj0fKiAxiI4TadXQYPuNHMixZy4Nevjb6aDhL5Z906TfvNHKUrjrG7G26a0k8vdc61NEQ7FmcGMWRLwwc6ReDO7lFpzYKBMk4YqfWgBuGU/K6WLKiVW2cVvwIuGIaYrE1OiiX0iVUUk7KApXlDJMXn7qjSYynfO4mF629NIp8FJal38+Kv+HA+0QkE5Y2xXnzD4Lar5+keymiCHRntPppXHeLIRzbt0gxC7v3L72hpQ3BTBEzwHpeS8KY+SX1y5lRMN45thCHfJqGmARJREDjBvWG8JXOPmVIKQtZmVcD5b mandreou@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:35 localhost python3[4927]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9MiLfy30deHA7xPOAlew5qUq3UP2gmRMYJi8PtkjFB20/DKeWwWNnkZPqP9AayruRoo51SIiVg870gbZE2jYl+Ncx/FYDe56JeC3ySZsXoAVkC9bP7gkOGqOmJjirvAgPMI7bogVz8i+66Q4Ar7OKTp3762G4IuWPPEg4ce4Y7lx9qWocZapHYq4cYKMxrOZ7SEbFSATBbe2bPZAPKTw8do/Eny+Hq/LkHFhIeyra6cqTFQYShr+zPln0Cr+ro/pDX3bB+1ubFgTpjpkkkQsLhDfR6cCdCWM2lgnS3BTtYj5Ct9/JRPR5YOphqZz+uB+OEu2IL68hmU9vNTth1KeX rlandy@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:36 localhost python3[4941]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCbgz8gdERiJlk2IKOtkjQxEXejrio6ZYMJAVJYpOIp raukadah@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:36 localhost python3[4955]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBqb3Q/9uDf4LmihQ7xeJ9gA/STIQUFPSfyyV0m8AoQi bshewale@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:36 localhost python3[4969]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0I8QqQx0Az2ysJt2JuffucLijhBqnsXKEIx5GyHwxVULROa8VtNFXUDH6ZKZavhiMcmfHB2+TBTda+lDP4FldYj06dGmzCY+IYGa+uDRdxHNGYjvCfLFcmLlzRK6fNbTcui+KlUFUdKe0fb9CRoGKyhlJD5GRkM1Dv+Yb6Bj+RNnmm1fVGYxzmrD2utvffYEb0SZGWxq2R9gefx1q/3wCGjeqvufEV+AskPhVGc5T7t9eyZ4qmslkLh1/nMuaIBFcr9AUACRajsvk6mXrAN1g3HlBf2gQlhi1UEyfbqIQvzzFtsbLDlSum/KmKjy818GzvWjERfQ0VkGzCd9bSLVL dviroel@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:36 localhost python3[4983]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDLOQd4ZLtkZXQGY6UwAr/06ppWQK4fDO3HaqxPk98csyOCBXsliSKK39Bso828+5srIXiW7aI6aC9P5mwi4mUZlGPfJlQbfrcGvY+b/SocuvaGK+1RrHLoJCT52LBhwgrzlXio2jeksZeein8iaTrhsPrOAs7KggIL/rB9hEiB3NaOPWhhoCP4vlW6MEMExGcqB/1FVxXFBPnLkEyW0Lk7ycVflZl2ocRxbfjZi0+tI1Wlinp8PvSQSc/WVrAcDgKjc/mB4ODPOyYy3G8FHgfMsrXSDEyjBKgLKMsdCrAUcqJQWjkqXleXSYOV4q3pzL+9umK+q/e3P/bIoSFQzmJKTU1eDfuvPXmow9F5H54fii/Da7ezlMJ+wPGHJrRAkmzvMbALy7xwswLhZMkOGNtRcPqaKYRmIBKpw3o6bCTtcNUHOtOQnzwY8JzrM2eBWJBXAANYw+9/ho80JIiwhg29CFNpVBuHbql2YxJQNrnl90guN65rYNpDxdIluweyUf8= anbanerj@kaermorhen manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:37 localhost python3[4997]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 dasm@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:37 localhost python3[5011]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHUnwjB20UKmsSed9X73eGNV5AOEFccQ3NYrRW776pEk cjeanner manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:37 localhost python3[5025]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDercCMGn8rW1C4P67tHgtflPdTeXlpyUJYH+6XDd2lR jgilaber@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:37 localhost python3[5039]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAMI6kkg9Wg0sG7jIJmyZemEBwUn1yzNpQQd3gnulOmZ adrianfuscoarnejo@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:38 localhost python3[5053]: ansible-authorized_key Invoked with user=zuul state=present key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPijwpQu/3jhhhBZInXNOLEH57DrknPc3PLbsRvYyJIFzwYjX+WD4a7+nGnMYS42MuZk6TJcVqgnqofVx4isoD4= ramishra@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:38 localhost python3[5067]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGpU/BepK3qX0NRf5Np+dOBDqzQEefhNrw2DCZaH3uWW rebtoor@monolith manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:38 localhost python3[5081]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDK0iKdi8jQTpQrDdLVH/AAgLVYyTXF7AQ1gjc/5uT3t ykarel@yatinkarel manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:38 localhost python3[5095]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF/V/cLotA6LZeO32VL45Hd78skuA2lJA425Sm2LlQeZ fmount@horcrux manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:39 localhost python3[5109]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDa7QCjuDMVmRPo1rREbGwzYeBCYVN+Ou/3WKXZEC6Sr manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:39 localhost python3[5123]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 averdagu@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:39 localhost python3[5137]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 ashigupt@ashigupt.remote.csb manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:40 localhost python3[5151]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOKLl0NYKwoZ/JY5KeZU8VwRAggeOxqQJeoqp3dsAaY9 manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:40 localhost python3[5165]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIASASQOH2BcOyLKuuDOdWZlPi2orcjcA8q4400T73DLH evallesp@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:40 localhost python3[5179]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILeBWlamUph+jRKV2qrx1PGU7vWuGIt5+z9k96I8WehW amsinha@amsinha-mac manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:40 localhost python3[5193]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIANvVgvJBlK3gb1yz5uef/JqIGq4HLEmY2dYA8e37swb morenod@redhat-laptop manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:41 localhost python3[5207]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 brjackma@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:41 localhost python3[5221]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKwedoZ0TWPJX/z/4TAbO/kKcDZOQVgRH0hAqrL5UCI1 vcastell@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:41 localhost python3[5235]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEmv8sE8GCk6ZTPIqF0FQrttBdL3mq7rCm/IJy0xDFh7 michburk@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:42 localhost python3[5249]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICy6GpGEtwevXEEn4mmLR5lmSLe23dGgAvzkB9DMNbkf rsafrono@rsafrono manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:38:49 localhost python3[5265]: ansible-community.general.timezone Invoked with name=UTC hwclock=None Feb 2 01:38:49 localhost systemd[1]: Starting Time & Date Service... Feb 2 01:38:49 localhost systemd[1]: Started Time & Date Service. Feb 2 01:38:49 localhost systemd-timedated[5267]: Changed time zone to 'UTC' (UTC). Feb 2 01:38:50 localhost python3[5286]: ansible-file Invoked with path=/etc/nodepool state=directory mode=511 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:38:51 localhost python3[5332]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 01:38:51 localhost python3[5373]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes src=/home/zuul/.ansible/tmp/ansible-tmp-1770014331.1760569-453-140197798169739/source _original_basename=tmpiz82z55j follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:38:52 localhost python3[5433]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 01:38:53 localhost python3[5474]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes_private src=/home/zuul/.ansible/tmp/ansible-tmp-1770014332.671698-542-204905556821403/source _original_basename=tmp00re2wom follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:38:54 localhost python3[5536]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 01:38:55 localhost python3[5579]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/node_private src=/home/zuul/.ansible/tmp/ansible-tmp-1770014334.7007692-686-49869580905818/source _original_basename=tmp05ui94dq follow=False checksum=2301e7467fee6838fa1b769310e346cfdbf4fa73 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:38:56 localhost python3[5607]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa /etc/nodepool/id_rsa zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 01:38:56 localhost python3[5623]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa.pub /etc/nodepool/id_rsa.pub zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 01:38:58 localhost python3[5673]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/zuul-sudo-grep follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 01:38:58 localhost python3[5716]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/zuul-sudo-grep mode=288 src=/home/zuul/.ansible/tmp/ansible-tmp-1770014337.8958178-813-262379203185435/source _original_basename=tmphvj78w_4 follow=False checksum=bdca1a77493d00fb51567671791f4aa30f66c2f0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:39:00 localhost python3[5747]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/visudo -c zuul_log_id=fa163ef9-e89a-2521-a363-000000000023-1-overcloudcontroller1 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 01:39:01 localhost python3[5765]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=env#012 _uses_shell=True zuul_log_id=fa163ef9-e89a-2521-a363-000000000024-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 2 01:39:03 localhost python3[5784]: ansible-file Invoked with path=/home/zuul/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:39:19 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Feb 2 01:39:22 localhost python3[5803]: ansible-ansible.builtin.file Invoked with path=/etc/ci/env state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:40:22 localhost systemd-logind[759]: Session 1 logged out. Waiting for processes to exit. Feb 2 01:40:28 localhost systemd[4179]: Starting Mark boot as successful... Feb 2 01:40:28 localhost systemd[4179]: Finished Mark boot as successful. Feb 2 01:41:10 localhost systemd[1]: Unmounting EFI System Partition Automount... Feb 2 01:41:10 localhost systemd[1]: efi.mount: Deactivated successfully. Feb 2 01:41:10 localhost systemd[1]: Unmounted EFI System Partition Automount. Feb 2 01:41:40 localhost kernel: pci 0000:00:07.0: [1af4:1000] type 00 class 0x020000 Feb 2 01:41:40 localhost kernel: pci 0000:00:07.0: reg 0x10: [io 0x0000-0x003f] Feb 2 01:41:40 localhost kernel: pci 0000:00:07.0: reg 0x14: [mem 0x00000000-0x00000fff] Feb 2 01:41:40 localhost kernel: pci 0000:00:07.0: reg 0x20: [mem 0x00000000-0x00003fff 64bit pref] Feb 2 01:41:40 localhost kernel: pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x0007ffff pref] Feb 2 01:41:40 localhost kernel: pci 0000:00:07.0: BAR 6: assigned [mem 0xc0000000-0xc007ffff pref] Feb 2 01:41:40 localhost kernel: pci 0000:00:07.0: BAR 4: assigned [mem 0x440000000-0x440003fff 64bit pref] Feb 2 01:41:40 localhost kernel: pci 0000:00:07.0: BAR 1: assigned [mem 0xc0080000-0xc0080fff] Feb 2 01:41:40 localhost kernel: pci 0000:00:07.0: BAR 0: assigned [io 0x1000-0x103f] Feb 2 01:41:40 localhost kernel: virtio-pci 0000:00:07.0: enabling device (0000 -> 0003) Feb 2 01:41:40 localhost NetworkManager[788]: [1770014500.1722] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Feb 2 01:41:40 localhost systemd-udevd[5809]: Network interface NamePolicy= disabled on kernel command line. Feb 2 01:41:40 localhost NetworkManager[788]: [1770014500.1870] device (eth1): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Feb 2 01:41:40 localhost NetworkManager[788]: [1770014500.1901] settings: (eth1): created default wired connection 'Wired connection 1' Feb 2 01:41:40 localhost NetworkManager[788]: [1770014500.1906] device (eth1): carrier: link connected Feb 2 01:41:40 localhost NetworkManager[788]: [1770014500.1909] device (eth1): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Feb 2 01:41:40 localhost NetworkManager[788]: [1770014500.1914] policy: auto-activating connection 'Wired connection 1' (45c03d1c-3827-3324-b222-92209190f97f) Feb 2 01:41:40 localhost NetworkManager[788]: [1770014500.1920] device (eth1): Activation: starting connection 'Wired connection 1' (45c03d1c-3827-3324-b222-92209190f97f) Feb 2 01:41:40 localhost NetworkManager[788]: [1770014500.1921] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Feb 2 01:41:40 localhost NetworkManager[788]: [1770014500.1924] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Feb 2 01:41:40 localhost NetworkManager[788]: [1770014500.1930] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Feb 2 01:41:40 localhost NetworkManager[788]: [1770014500.1933] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Feb 2 01:41:40 localhost sshd[5812]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:41:40 localhost systemd[1]: Started Session 3 of User zuul. Feb 2 01:41:40 localhost systemd-logind[759]: New session 3 of user zuul. Feb 2 01:41:41 localhost python3[5829]: ansible-ansible.legacy.command Invoked with _raw_params=ip -j link zuul_log_id=fa163ef9-e89a-def1-923a-0000000002c1-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 01:41:41 localhost kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready Feb 2 01:41:54 localhost python3[5879]: ansible-ansible.legacy.stat Invoked with path=/etc/NetworkManager/system-connections/ci-private-network.nmconnection follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 01:41:54 localhost python3[5922]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1770014514.0080867-333-130199103129125/source dest=/etc/NetworkManager/system-connections/ci-private-network.nmconnection mode=0600 owner=root group=root follow=False _original_basename=bootstrap-ci-network-nm-connection.nmconnection.j2 checksum=af943b6b385a612b1c051644048881ca20546e96 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:41:55 localhost python3[5952]: ansible-ansible.builtin.systemd Invoked with name=NetworkManager state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Feb 2 01:41:55 localhost systemd[1]: NetworkManager-wait-online.service: Deactivated successfully. Feb 2 01:41:55 localhost systemd[1]: Stopped Network Manager Wait Online. Feb 2 01:41:55 localhost systemd[1]: Stopping Network Manager Wait Online... Feb 2 01:41:55 localhost NetworkManager[788]: [1770014515.2795] caught SIGTERM, shutting down normally. Feb 2 01:41:55 localhost systemd[1]: Stopping Network Manager... Feb 2 01:41:55 localhost NetworkManager[788]: [1770014515.2985] dhcp4 (eth0): canceled DHCP transaction Feb 2 01:41:55 localhost NetworkManager[788]: [1770014515.2987] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Feb 2 01:41:55 localhost NetworkManager[788]: [1770014515.2988] dhcp4 (eth0): state changed no lease Feb 2 01:41:55 localhost NetworkManager[788]: [1770014515.2992] manager: NetworkManager state is now CONNECTING Feb 2 01:41:55 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Feb 2 01:41:55 localhost NetworkManager[788]: [1770014515.3155] dhcp4 (eth1): canceled DHCP transaction Feb 2 01:41:55 localhost NetworkManager[788]: [1770014515.3157] dhcp4 (eth1): state changed no lease Feb 2 01:41:55 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Feb 2 01:41:55 localhost NetworkManager[788]: [1770014515.3269] exiting (success) Feb 2 01:41:55 localhost systemd[1]: NetworkManager.service: Deactivated successfully. Feb 2 01:41:55 localhost systemd[1]: Stopped Network Manager. Feb 2 01:41:55 localhost systemd[1]: NetworkManager.service: Consumed 2.502s CPU time. Feb 2 01:41:55 localhost systemd[1]: Starting Network Manager... Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.3867] NetworkManager (version 1.42.2-1.el9) is starting... (after a restart, boot:ab212fec-fcdc-40c9-86f0-5c8d0ef5b6f3) Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.3869] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Feb 2 01:41:55 localhost systemd[1]: Started Network Manager. Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.3900] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Feb 2 01:41:55 localhost systemd[1]: Starting Network Manager Wait Online... Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.3956] manager[0x563b1ba60090]: monitoring kernel firmware directory '/lib/firmware'. Feb 2 01:41:55 localhost systemd[1]: Starting Hostname Service... Feb 2 01:41:55 localhost systemd[1]: Started Hostname Service. Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4813] hostname: hostname: using hostnamed Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4813] hostname: static hostname changed from (none) to "np0005604725.novalocal" Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4818] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4824] manager[0x563b1ba60090]: rfkill: Wi-Fi hardware radio set enabled Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4825] manager[0x563b1ba60090]: rfkill: WWAN hardware radio set enabled Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4853] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4853] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4854] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4854] manager: Networking is enabled by state file Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4861] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4862] settings: Loaded settings plugin: keyfile (internal) Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4891] dhcp: init: Using DHCP client 'internal' Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4895] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4901] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4907] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4916] device (lo): Activation: starting connection 'lo' (95a315a5-2bb1-437b-a760-de784249b4a2) Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4923] device (eth0): carrier: link connected Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4927] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4932] manager: (eth0): assume: will attempt to assume matching connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) (indicated) Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4933] device (eth0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4939] device (eth0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4947] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4953] device (eth1): carrier: link connected Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4957] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4963] manager: (eth1): assume: will attempt to assume matching connection 'Wired connection 1' (45c03d1c-3827-3324-b222-92209190f97f) (indicated) Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4963] device (eth1): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4969] device (eth1): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4976] device (eth1): Activation: starting connection 'Wired connection 1' (45c03d1c-3827-3324-b222-92209190f97f) Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.4997] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5001] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5003] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5006] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5010] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5012] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5014] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5016] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5021] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5023] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5058] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5062] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5098] dhcp4 (eth0): state changed new lease, address=38.102.83.200 Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5103] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5194] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5197] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5209] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5216] device (lo): Activation: successful, device activated. Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5223] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5226] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5230] manager: NetworkManager state is now CONNECTED_SITE Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5233] device (eth0): Activation: successful, device activated. Feb 2 01:41:55 localhost NetworkManager[5971]: [1770014515.5238] manager: NetworkManager state is now CONNECTED_GLOBAL Feb 2 01:41:55 localhost python3[6025]: ansible-ansible.legacy.command Invoked with _raw_params=ip route zuul_log_id=fa163ef9-e89a-def1-923a-00000000010a-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 01:42:05 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Feb 2 01:42:25 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 2 01:42:40 localhost NetworkManager[5971]: [1770014560.7821] device (eth1): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Feb 2 01:42:40 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Feb 2 01:42:40 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Feb 2 01:42:40 localhost NetworkManager[5971]: [1770014560.8057] device (eth1): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Feb 2 01:42:40 localhost NetworkManager[5971]: [1770014560.8066] device (eth1): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Feb 2 01:42:40 localhost NetworkManager[5971]: [1770014560.8092] device (eth1): Activation: successful, device activated. Feb 2 01:42:40 localhost NetworkManager[5971]: [1770014560.8106] manager: startup complete Feb 2 01:42:40 localhost systemd[1]: Finished Network Manager Wait Online. Feb 2 01:42:50 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Feb 2 01:42:55 localhost systemd[1]: session-3.scope: Deactivated successfully. Feb 2 01:42:55 localhost systemd[1]: session-3.scope: Consumed 1.495s CPU time. Feb 2 01:42:55 localhost systemd-logind[759]: Session 3 logged out. Waiting for processes to exit. Feb 2 01:42:55 localhost systemd-logind[759]: Removed session 3. Feb 2 01:43:28 localhost systemd[4179]: Created slice User Background Tasks Slice. Feb 2 01:43:28 localhost systemd[4179]: Starting Cleanup of User's Temporary Files and Directories... Feb 2 01:43:28 localhost systemd[4179]: Finished Cleanup of User's Temporary Files and Directories. Feb 2 01:45:10 localhost sshd[6053]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:45:10 localhost systemd-logind[759]: New session 4 of user zuul. Feb 2 01:45:10 localhost systemd[1]: Started Session 4 of User zuul. Feb 2 01:45:11 localhost python3[6104]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/env/networking-info.yml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 01:45:11 localhost python3[6147]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/env/networking-info.yml owner=root group=root mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1770014710.8252409-628-266709913336387/source _original_basename=tmp5xuotneq follow=False checksum=267677b49ccfb2265a483760a8264c8ab9186a6a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:45:17 localhost systemd[1]: session-4.scope: Deactivated successfully. Feb 2 01:45:17 localhost systemd-logind[759]: Session 4 logged out. Waiting for processes to exit. Feb 2 01:45:17 localhost systemd-logind[759]: Removed session 4. Feb 2 01:51:17 localhost sshd[6164]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:51:17 localhost systemd-logind[759]: New session 5 of user zuul. Feb 2 01:51:17 localhost systemd[1]: Started Session 5 of User zuul. Feb 2 01:51:17 localhost python3[6183]: ansible-ansible.legacy.command Invoked with _raw_params=lsblk -nd -o MAJ:MIN /dev/vda#012 _uses_shell=True zuul_log_id=fa163ef9-e89a-3d37-7ea7-00000000219d-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 01:51:18 localhost python3[6202]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/init.scope state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:51:19 localhost python3[6218]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/machine.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:51:19 localhost python3[6234]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/system.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:51:19 localhost python3[6250]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/user.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:51:21 localhost python3[6266]: ansible-ansible.builtin.file Invoked with path=/etc/systemd/system.conf.d state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:51:21 localhost python3[6314]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system.conf.d/override.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 01:51:22 localhost python3[6357]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system.conf.d/override.conf mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1770015081.6112201-621-179443341186802/source _original_basename=tmpj_3d6iog follow=False checksum=a05098bd3d2321238ea1169d0e6f135b35b392d4 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:51:23 localhost python3[6387]: ansible-ansible.builtin.systemd_service Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Feb 2 01:51:23 localhost systemd[1]: Reloading. Feb 2 01:51:23 localhost systemd-rc-local-generator[6406]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 01:51:23 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 01:51:25 localhost python3[6435]: ansible-ansible.builtin.wait_for Invoked with path=/sys/fs/cgroup/system.slice/io.max state=present timeout=30 host=127.0.0.1 connect_timeout=5 delay=0 active_connection_states=['ESTABLISHED', 'FIN_WAIT1', 'FIN_WAIT2', 'SYN_RECV', 'SYN_SENT', 'TIME_WAIT'] sleep=1 port=None search_regex=None exclude_hosts=None msg=None Feb 2 01:51:26 localhost python3[6451]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/init.scope/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 01:51:26 localhost python3[6469]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/machine.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 01:51:26 localhost python3[6487]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/system.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 01:51:27 localhost python3[6505]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/user.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 01:51:28 localhost python3[6522]: ansible-ansible.legacy.command Invoked with _raw_params=echo "init"; cat /sys/fs/cgroup/init.scope/io.max; echo "machine"; cat /sys/fs/cgroup/machine.slice/io.max; echo "system"; cat /sys/fs/cgroup/system.slice/io.max; echo "user"; cat /sys/fs/cgroup/user.slice/io.max;#012 _uses_shell=True zuul_log_id=fa163ef9-e89a-3d37-7ea7-0000000021a4-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 01:51:29 localhost python3[6542]: ansible-ansible.builtin.stat Invoked with path=/sys/fs/cgroup/kubepods.slice/io.max follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 01:51:32 localhost systemd[1]: session-5.scope: Deactivated successfully. Feb 2 01:51:32 localhost systemd[1]: session-5.scope: Consumed 3.767s CPU time. Feb 2 01:51:32 localhost systemd-logind[759]: Session 5 logged out. Waiting for processes to exit. Feb 2 01:51:32 localhost systemd-logind[759]: Removed session 5. Feb 2 01:52:26 localhost sshd[6547]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:52:26 localhost systemd[1]: Starting Cleanup of Temporary Directories... Feb 2 01:52:26 localhost systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 2 01:52:26 localhost systemd[1]: Finished Cleanup of Temporary Directories. Feb 2 01:52:26 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 2 01:52:26 localhost systemd-logind[759]: New session 6 of user zuul. Feb 2 01:52:26 localhost systemd[1]: Started Session 6 of User zuul. Feb 2 01:52:26 localhost systemd[1]: Starting RHSM dbus service... Feb 2 01:52:27 localhost systemd[1]: Started RHSM dbus service. Feb 2 01:52:27 localhost rhsm-service[6573]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Feb 2 01:52:27 localhost rhsm-service[6573]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Feb 2 01:52:27 localhost rhsm-service[6573]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Feb 2 01:52:27 localhost rhsm-service[6573]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Feb 2 01:52:28 localhost rhsm-service[6573]: INFO [subscription_manager.managerlib:90] Consumer created: np0005604725.novalocal (abae7743-cd32-41a2-b3c6-414ab2836dab) Feb 2 01:52:28 localhost subscription-manager[6573]: Registered system with identity: abae7743-cd32-41a2-b3c6-414ab2836dab Feb 2 01:52:28 localhost rhsm-service[6573]: INFO [subscription_manager.entcertlib:131] certs updated: Feb 2 01:52:28 localhost rhsm-service[6573]: Total updates: 1 Feb 2 01:52:28 localhost rhsm-service[6573]: Found (local) serial# [] Feb 2 01:52:28 localhost rhsm-service[6573]: Expected (UEP) serial# [7820449897779651000] Feb 2 01:52:28 localhost rhsm-service[6573]: Added (new) Feb 2 01:52:28 localhost rhsm-service[6573]: [sn:7820449897779651000 ( Content Access,) @ /etc/pki/entitlement/7820449897779651000.pem] Feb 2 01:52:28 localhost rhsm-service[6573]: Deleted (rogue): Feb 2 01:52:28 localhost rhsm-service[6573]: Feb 2 01:52:28 localhost subscription-manager[6573]: Added subscription for 'Content Access' contract 'None' Feb 2 01:52:28 localhost subscription-manager[6573]: Added subscription for product ' Content Access' Feb 2 01:52:30 localhost rhsm-service[6573]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Feb 2 01:52:30 localhost rhsm-service[6573]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Feb 2 01:52:30 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 01:52:30 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 01:52:30 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 01:52:30 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 01:52:30 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 01:52:39 localhost python3[6664]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163ef9-e89a-7d1b-bd08-00000000000d-1-overcloudcontroller1 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 01:52:41 localhost python3[6683]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 01:53:12 localhost setsebool[6758]: The virt_use_nfs policy boolean was changed to 1 by root Feb 2 01:53:12 localhost setsebool[6758]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Feb 2 01:53:20 localhost kernel: SELinux: Converting 406 SID table entries... Feb 2 01:53:20 localhost kernel: SELinux: policy capability network_peer_controls=1 Feb 2 01:53:20 localhost kernel: SELinux: policy capability open_perms=1 Feb 2 01:53:20 localhost kernel: SELinux: policy capability extended_socket_class=1 Feb 2 01:53:20 localhost kernel: SELinux: policy capability always_check_network=0 Feb 2 01:53:20 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Feb 2 01:53:20 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 2 01:53:20 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 2 01:53:33 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=3 res=1 Feb 2 01:53:33 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 2 01:53:33 localhost systemd[1]: Starting man-db-cache-update.service... Feb 2 01:53:33 localhost systemd[1]: Reloading. Feb 2 01:53:33 localhost systemd-rc-local-generator[7602]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 01:53:33 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 01:53:33 localhost systemd[1]: Queuing reload/restart jobs for marked units… Feb 2 01:53:35 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 01:53:42 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 2 01:53:42 localhost systemd[1]: Finished man-db-cache-update.service. Feb 2 01:53:42 localhost systemd[1]: man-db-cache-update.service: Consumed 10.044s CPU time. Feb 2 01:53:42 localhost systemd[1]: run-r52ad6748a3de490a999b33d919c27af4.service: Deactivated successfully. Feb 2 01:54:28 localhost podman[18353]: 2026-02-02 06:54:28.462022918 +0000 UTC m=+0.101570358 system refresh Feb 2 01:54:28 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 01:54:29 localhost systemd[4179]: Starting D-Bus User Message Bus... Feb 2 01:54:29 localhost dbus-broker-launch[18413]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Feb 2 01:54:29 localhost dbus-broker-launch[18413]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Feb 2 01:54:29 localhost systemd[4179]: Started D-Bus User Message Bus. Feb 2 01:54:29 localhost journal[18413]: Ready Feb 2 01:54:29 localhost systemd[4179]: selinux: avc: op=load_policy lsm=selinux seqno=3 res=1 Feb 2 01:54:29 localhost systemd[4179]: Created slice Slice /user. Feb 2 01:54:29 localhost systemd[4179]: podman-18396.scope: unit configures an IP firewall, but not running as root. Feb 2 01:54:29 localhost systemd[4179]: (This warning is only shown for the first unit using IP firewalling.) Feb 2 01:54:29 localhost systemd[4179]: Started podman-18396.scope. Feb 2 01:54:29 localhost systemd[4179]: Started podman-pause-09c57424.scope. Feb 2 01:54:31 localhost systemd[1]: session-6.scope: Deactivated successfully. Feb 2 01:54:31 localhost systemd[1]: session-6.scope: Consumed 51.385s CPU time. Feb 2 01:54:31 localhost systemd-logind[759]: Session 6 logged out. Waiting for processes to exit. Feb 2 01:54:31 localhost systemd-logind[759]: Removed session 6. Feb 2 01:54:45 localhost sshd[18418]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:54:45 localhost sshd[18416]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:54:45 localhost sshd[18417]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:54:45 localhost sshd[18420]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:54:45 localhost sshd[18419]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:54:50 localhost sshd[18426]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:54:50 localhost systemd-logind[759]: New session 7 of user zuul. Feb 2 01:54:50 localhost systemd[1]: Started Session 7 of User zuul. Feb 2 01:54:50 localhost python3[18443]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBNOYZaIt06F8hBH+3vI4kRHySGfjAj786cfva3wlcDKVVN0rW3FEdXXMtBb7sDap9i8x4Xi/adGvlNEpyYaHjFA= zuul@np0005604720.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:54:51 localhost python3[18459]: ansible-ansible.posix.authorized_key Invoked with user=root key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBNOYZaIt06F8hBH+3vI4kRHySGfjAj786cfva3wlcDKVVN0rW3FEdXXMtBb7sDap9i8x4Xi/adGvlNEpyYaHjFA= zuul@np0005604720.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:54:53 localhost systemd[1]: session-7.scope: Deactivated successfully. Feb 2 01:54:53 localhost systemd-logind[759]: Session 7 logged out. Waiting for processes to exit. Feb 2 01:54:53 localhost systemd-logind[759]: Removed session 7. Feb 2 01:56:09 localhost sshd[18462]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:56:09 localhost systemd-logind[759]: New session 8 of user zuul. Feb 2 01:56:09 localhost systemd[1]: Started Session 8 of User zuul. Feb 2 01:56:10 localhost python3[18481]: ansible-authorized_key Invoked with user=root manage_dir=True key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDSP2ossQu4un8BdOSTCpCa1rqbj2in7CgdqbosGaYHhKiBh1Nayy4kowPlOsvQHK/10XcKBAlNW8yoiKaucaVkjlBTaBjgn8+Z/iRETSxlX3zCcvVocr02rkdA8mOR2rRzYgvCaYBNeAwR/UL69igOBm/96kOtVvF7VNcYInW7CUctSvR59iX3TNjmYcdcy4WDNsViTvllvyxSOC5Td3ORBS5/dnr10I/MRJHiyZO68F4JJ0sR8ylSWBdFpziBZzuoKUbTARPqbHsWwyuPRY6Ogfyv+8nlvFvnmjeGC8dKW4LxonO9S5qYy8/3lV01KMoo/+exlE0C+xxL9NzXoMh0T9V5xeROSZcbpg1NiNOpYrCtQmdkFiK8a3slCg6lZy6FNkBWPBzHa41AItEJLIiPdrqjtVVclQ/IQVk3vMLWLs77vCjdiAUG7i1gnJTbEmpbNv4ZcWQBzmqlr9YzQsAy5KKZieRJ4Ff6UXQgvDl//WSHKLb3ZUtf5nwEZS/MllM= zuul-build-sshkey state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 01:56:11 localhost python3[18497]: ansible-user Invoked with name=root state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005604725.novalocal update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Feb 2 01:56:12 localhost python3[18547]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 01:56:12 localhost python3[18590]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1770015371.9093995-91-58531841918782/source dest=/root/.ssh/id_rsa mode=384 owner=root force=False _original_basename=787e74ff6eaa40b09474e6f677511092_id_rsa follow=False checksum=8a867f6a9741086497bd57804c37ae9f0bc86fd1 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:56:14 localhost python3[18652]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 01:56:14 localhost python3[18695]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1770015373.764022-182-158015440146625/source dest=/root/.ssh/id_rsa.pub mode=420 owner=root force=False _original_basename=787e74ff6eaa40b09474e6f677511092_id_rsa.pub follow=False checksum=3c30998ac883cb6393f2c91d71828f09947af393 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:56:16 localhost python3[18725]: ansible-ansible.builtin.file Invoked with path=/etc/nodepool state=directory mode=0777 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:56:17 localhost python3[18771]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 01:56:17 localhost python3[18787]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes _original_basename=tmpnyj1zvg0 recurse=False state=file path=/etc/nodepool/sub_nodes force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:56:18 localhost python3[18847]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 01:56:19 localhost python3[18863]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes_private _original_basename=tmp7c48idnm recurse=False state=file path=/etc/nodepool/sub_nodes_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:56:20 localhost python3[18923]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 01:56:20 localhost python3[18939]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/node_private _original_basename=tmp5hq62l94 recurse=False state=file path=/etc/nodepool/node_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 01:56:21 localhost systemd[1]: session-8.scope: Deactivated successfully. Feb 2 01:56:21 localhost systemd[1]: session-8.scope: Consumed 3.544s CPU time. Feb 2 01:56:21 localhost systemd-logind[759]: Session 8 logged out. Waiting for processes to exit. Feb 2 01:56:21 localhost systemd-logind[759]: Removed session 8. Feb 2 01:58:20 localhost sshd[18954]: main: sshd: ssh-rsa algorithm is disabled Feb 2 01:58:20 localhost systemd-logind[759]: New session 9 of user zuul. Feb 2 01:58:20 localhost systemd[1]: Started Session 9 of User zuul. Feb 2 01:58:20 localhost python3[19000]: ansible-ansible.legacy.command Invoked with _raw_params=hostname _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:03:19 localhost systemd[1]: session-9.scope: Deactivated successfully. Feb 2 02:03:19 localhost systemd-logind[759]: Session 9 logged out. Waiting for processes to exit. Feb 2 02:03:19 localhost systemd-logind[759]: Removed session 9. Feb 2 02:09:15 localhost sshd[19022]: main: sshd: ssh-rsa algorithm is disabled Feb 2 02:09:15 localhost systemd-logind[759]: New session 10 of user zuul. Feb 2 02:09:15 localhost systemd[1]: Started Session 10 of User zuul. Feb 2 02:09:15 localhost python3[19039]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163ef9-e89a-9640-fd89-00000000000c-1-overcloudcontroller1 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:09:17 localhost python3[19059]: ansible-ansible.legacy.command Invoked with _raw_params=yum clean all zuul_log_id=fa163ef9-e89a-9640-fd89-00000000000d-1-overcloudcontroller1 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:09:22 localhost python3[19078]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-baseos-eus-rpms'] state=enabled purge=False Feb 2 02:09:30 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:09:31 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:10:20 localhost python3[19237]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-appstream-eus-rpms'] state=enabled purge=False Feb 2 02:10:22 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:10:36 localhost python3[19436]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-highavailability-eus-rpms'] state=enabled purge=False Feb 2 02:10:39 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:10:43 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:10:44 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:11:09 localhost python3[19770]: ansible-community.general.rhsm_repository Invoked with name=['fast-datapath-for-rhel-9-x86_64-rpms'] state=enabled purge=False Feb 2 02:11:12 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:11:12 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:11:17 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:11:17 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:12:06 localhost python3[20106]: ansible-community.general.rhsm_repository Invoked with name=['openstack-17.1-for-rhel-9-x86_64-rpms'] state=enabled purge=False Feb 2 02:12:16 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:12:17 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:12:28 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:12:28 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:12:43 localhost python3[20503]: ansible-ansible.legacy.command Invoked with _raw_params=yum repolist --enabled#012 _uses_shell=True zuul_log_id=fa163ef9-e89a-9640-fd89-000000000013-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:12:48 localhost python3[20522]: ansible-ansible.legacy.dnf Invoked with name=['openvswitch', 'os-net-config', 'ansible-core'] state=present update_cache=True allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 02:13:14 localhost systemd[1]: Started daily update of the root trust anchor for DNSSEC. Feb 2 02:13:22 localhost kernel: SELinux: Converting 499 SID table entries... Feb 2 02:13:22 localhost kernel: SELinux: policy capability network_peer_controls=1 Feb 2 02:13:22 localhost kernel: SELinux: policy capability open_perms=1 Feb 2 02:13:22 localhost kernel: SELinux: policy capability extended_socket_class=1 Feb 2 02:13:22 localhost kernel: SELinux: policy capability always_check_network=0 Feb 2 02:13:22 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Feb 2 02:13:22 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 2 02:13:22 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 2 02:13:25 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=4 res=1 Feb 2 02:13:25 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 2 02:13:25 localhost systemd[1]: Starting man-db-cache-update.service... Feb 2 02:13:25 localhost systemd[1]: Reloading. Feb 2 02:13:25 localhost systemd-rc-local-generator[21189]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:13:25 localhost systemd-sysv-generator[21193]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:13:25 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:13:25 localhost systemd[1]: Starting dnf makecache... Feb 2 02:13:25 localhost systemd[1]: Queuing reload/restart jobs for marked units… Feb 2 02:13:26 localhost dnf[21384]: Updating Subscription Management repositories. Feb 2 02:13:26 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 2 02:13:26 localhost systemd[1]: Finished man-db-cache-update.service. Feb 2 02:13:26 localhost systemd[1]: run-rcd4b2cd67e6f44d3baf9239032b9d328.service: Deactivated successfully. Feb 2 02:13:27 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:13:27 localhost rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 02:13:27 localhost dnf[21384]: Failed determining last makecache time. Feb 2 02:13:33 localhost dnf[21384]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 886 B/s | 4.5 kB 00:05 Feb 2 02:13:33 localhost dnf[21384]: Fast Datapath for RHEL 9 x86_64 (RPMs) 47 kB/s | 4.0 kB 00:00 Feb 2 02:13:33 localhost dnf[21384]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 44 kB/s | 4.1 kB 00:00 Feb 2 02:13:33 localhost dnf[21384]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 61 kB/s | 4.5 kB 00:00 Feb 2 02:13:33 localhost dnf[21384]: Red Hat OpenStack Platform 17.1 for RHEL 9 x86_ 49 kB/s | 4.0 kB 00:00 Feb 2 02:13:33 localhost dnf[21384]: Red Hat Enterprise Linux 9 for x86_64 - High Av 40 kB/s | 4.0 kB 00:00 Feb 2 02:13:33 localhost dnf[21384]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 45 kB/s | 4.1 kB 00:00 Feb 2 02:13:34 localhost dnf[21384]: Metadata cache created. Feb 2 02:13:34 localhost systemd[1]: dnf-makecache.service: Deactivated successfully. Feb 2 02:13:34 localhost systemd[1]: Finished dnf makecache. Feb 2 02:13:34 localhost systemd[1]: dnf-makecache.service: Consumed 2.766s CPU time. Feb 2 02:14:03 localhost python3[21863]: ansible-ansible.legacy.command Invoked with _raw_params=ansible-galaxy collection install ansible.posix#012 _uses_shell=True zuul_log_id=fa163ef9-e89a-9640-fd89-000000000015-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:14:27 localhost python3[21883]: ansible-ansible.builtin.file Invoked with path=/etc/os-net-config state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:14:28 localhost python3[21931]: ansible-ansible.legacy.stat Invoked with path=/etc/os-net-config/tripleo_config.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:14:29 localhost python3[21974]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1770016468.2807844-287-214700765325715/source dest=/etc/os-net-config/tripleo_config.yaml mode=None follow=False _original_basename=overcloud_net_config.j2 checksum=c4aca9aeb86d5a72911d87567aeb8f7976c3c1f0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:14:30 localhost python3[22004]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Feb 2 02:14:30 localhost systemd-journald[617]: Field hash table of /run/log/journal/48447b9b8976f23a3b4b319f2b01dfe5/system.journal has a fill level at 89.2 (297 of 333 items), suggesting rotation. Feb 2 02:14:30 localhost systemd-journald[617]: /run/log/journal/48447b9b8976f23a3b4b319f2b01dfe5/system.journal: Journal header limits reached or header out-of-date, rotating. Feb 2 02:14:30 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Feb 2 02:14:30 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Feb 2 02:14:30 localhost python3[22025]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-20 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Feb 2 02:14:31 localhost python3[22045]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-21 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Feb 2 02:14:31 localhost python3[22065]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-22 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Feb 2 02:14:31 localhost python3[22085]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-23 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Feb 2 02:14:33 localhost python3[22105]: ansible-ansible.builtin.systemd Invoked with name=network state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Feb 2 02:14:33 localhost systemd[1]: Starting LSB: Bring up/down networking... Feb 2 02:14:34 localhost network[22108]: WARN : [network] You are using 'network' service provided by 'network-scripts', which are now deprecated. Feb 2 02:14:34 localhost network[22119]: You are using 'network' service provided by 'network-scripts', which are now deprecated. Feb 2 02:14:34 localhost network[22108]: WARN : [network] 'network-scripts' will be removed from distribution in near future. Feb 2 02:14:34 localhost network[22120]: 'network-scripts' will be removed from distribution in near future. Feb 2 02:14:34 localhost network[22108]: WARN : [network] It is advised to switch to 'NetworkManager' instead for network management. Feb 2 02:14:34 localhost network[22121]: It is advised to switch to 'NetworkManager' instead for network management. Feb 2 02:14:34 localhost NetworkManager[5971]: [1770016474.1296] audit: op="connections-reload" pid=22149 uid=0 result="success" Feb 2 02:14:34 localhost network[22108]: Bringing up loopback interface: [ OK ] Feb 2 02:14:34 localhost NetworkManager[5971]: [1770016474.3365] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth0" pid=22237 uid=0 result="success" Feb 2 02:14:34 localhost network[22108]: Bringing up interface eth0: [ OK ] Feb 2 02:14:34 localhost systemd[1]: Started LSB: Bring up/down networking. Feb 2 02:14:34 localhost python3[22278]: ansible-ansible.builtin.systemd Invoked with name=openvswitch state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Feb 2 02:14:34 localhost systemd[1]: Starting Open vSwitch Database Unit... Feb 2 02:14:34 localhost chown[22282]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Feb 2 02:14:35 localhost ovs-ctl[22287]: /etc/openvswitch/conf.db does not exist ... (warning). Feb 2 02:14:35 localhost ovs-ctl[22287]: Creating empty database /etc/openvswitch/conf.db [ OK ] Feb 2 02:14:35 localhost ovs-ctl[22287]: Starting ovsdb-server [ OK ] Feb 2 02:14:35 localhost ovs-vsctl[22336]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Feb 2 02:14:35 localhost ovs-vsctl[22356]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.6-141.el9fdp "external-ids:system-id=\"85b1f937-e817-4dc5-a11a-4768eec5fe5c\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"rhel\"" "system-version=\"9.2\"" Feb 2 02:14:35 localhost ovs-ctl[22287]: Configuring Open vSwitch system IDs [ OK ] Feb 2 02:14:35 localhost ovs-ctl[22287]: Enabling remote OVSDB managers [ OK ] Feb 2 02:14:35 localhost ovs-vsctl[22362]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005604725.novalocal Feb 2 02:14:35 localhost systemd[1]: Started Open vSwitch Database Unit. Feb 2 02:14:35 localhost systemd[1]: Starting Open vSwitch Delete Transient Ports... Feb 2 02:14:35 localhost systemd[1]: Finished Open vSwitch Delete Transient Ports. Feb 2 02:14:35 localhost systemd[1]: Starting Open vSwitch Forwarding Unit... Feb 2 02:14:35 localhost kernel: openvswitch: Open vSwitch switching datapath Feb 2 02:14:35 localhost ovs-ctl[22406]: Inserting openvswitch module [ OK ] Feb 2 02:14:35 localhost ovs-ctl[22375]: Starting ovs-vswitchd [ OK ] Feb 2 02:14:35 localhost ovs-ctl[22375]: Enabling remote OVSDB managers [ OK ] Feb 2 02:14:35 localhost ovs-vsctl[22424]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005604725.novalocal Feb 2 02:14:35 localhost systemd[1]: Started Open vSwitch Forwarding Unit. Feb 2 02:14:35 localhost systemd[1]: Starting Open vSwitch... Feb 2 02:14:35 localhost systemd[1]: Finished Open vSwitch. Feb 2 02:14:39 localhost python3[22443]: ansible-ansible.legacy.command Invoked with _raw_params=os-net-config -c /etc/os-net-config/tripleo_config.yaml#012 _uses_shell=True zuul_log_id=fa163ef9-e89a-9640-fd89-00000000001a-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:14:40 localhost NetworkManager[5971]: [1770016480.0934] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22639 uid=0 result="success" Feb 2 02:14:40 localhost ifup[22640]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 2 02:14:40 localhost ifup[22641]: 'network-scripts' will be removed from distribution in near future. Feb 2 02:14:40 localhost ifup[22642]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 2 02:14:40 localhost NetworkManager[5971]: [1770016480.1320] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22648 uid=0 result="success" Feb 2 02:14:40 localhost ovs-vsctl[22650]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex other-config:mac-table-size=50000 -- set bridge br-ex other-config:hwaddr=fa:16:3e:93:66:cb -- set bridge br-ex fail_mode=standalone -- del-controller br-ex Feb 2 02:14:40 localhost NetworkManager[5971]: [1770016480.1584] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Feb 2 02:14:40 localhost kernel: device ovs-system entered promiscuous mode Feb 2 02:14:40 localhost kernel: Timeout policy base is empty Feb 2 02:14:40 localhost kernel: Failed to associated timeout policy `ovs_test_tp' Feb 2 02:14:40 localhost systemd-udevd[22652]: Network interface NamePolicy= disabled on kernel command line. Feb 2 02:14:40 localhost kernel: device br-ex entered promiscuous mode Feb 2 02:14:40 localhost NetworkManager[5971]: [1770016480.2019] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/5) Feb 2 02:14:40 localhost NetworkManager[5971]: [1770016480.2317] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22678 uid=0 result="success" Feb 2 02:14:40 localhost NetworkManager[5971]: [1770016480.2558] device (br-ex): carrier: link connected Feb 2 02:14:43 localhost NetworkManager[5971]: [1770016483.3242] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22707 uid=0 result="success" Feb 2 02:14:43 localhost NetworkManager[5971]: [1770016483.3734] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22722 uid=0 result="success" Feb 2 02:14:43 localhost NET[22747]: /etc/sysconfig/network-scripts/ifup-post : updated /etc/resolv.conf Feb 2 02:14:43 localhost NetworkManager[5971]: [1770016483.4576] device (eth1): state change: activated -> unmanaged (reason 'unmanaged', sys-iface-state: 'managed') Feb 2 02:14:43 localhost NetworkManager[5971]: [1770016483.4706] dhcp4 (eth1): canceled DHCP transaction Feb 2 02:14:43 localhost NetworkManager[5971]: [1770016483.4706] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Feb 2 02:14:43 localhost NetworkManager[5971]: [1770016483.4706] dhcp4 (eth1): state changed no lease Feb 2 02:14:43 localhost NetworkManager[5971]: [1770016483.4745] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22756 uid=0 result="success" Feb 2 02:14:43 localhost ifup[22757]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 2 02:14:43 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Feb 2 02:14:43 localhost ifup[22758]: 'network-scripts' will be removed from distribution in near future. Feb 2 02:14:43 localhost ifup[22760]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 2 02:14:43 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Feb 2 02:14:43 localhost NetworkManager[5971]: [1770016483.5132] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22774 uid=0 result="success" Feb 2 02:14:43 localhost NetworkManager[5971]: [1770016483.5606] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22784 uid=0 result="success" Feb 2 02:14:43 localhost NetworkManager[5971]: [1770016483.5647] device (eth1): carrier: link connected Feb 2 02:14:43 localhost NetworkManager[5971]: [1770016483.5797] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22793 uid=0 result="success" Feb 2 02:14:43 localhost ipv6_wait_tentative[22805]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Feb 2 02:14:44 localhost ipv6_wait_tentative[22810]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Feb 2 02:14:45 localhost NetworkManager[5971]: [1770016485.6415] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22820 uid=0 result="success" Feb 2 02:14:45 localhost ovs-vsctl[22835]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex eth1 -- add-port br-ex eth1 Feb 2 02:14:45 localhost kernel: device eth1 entered promiscuous mode Feb 2 02:14:45 localhost NetworkManager[5971]: [1770016485.7201] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22842 uid=0 result="success" Feb 2 02:14:45 localhost ifup[22843]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 2 02:14:45 localhost ifup[22844]: 'network-scripts' will be removed from distribution in near future. Feb 2 02:14:45 localhost ifup[22845]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 2 02:14:45 localhost NetworkManager[5971]: [1770016485.7508] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22851 uid=0 result="success" Feb 2 02:14:45 localhost NetworkManager[5971]: [1770016485.7976] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22861 uid=0 result="success" Feb 2 02:14:45 localhost ifup[22862]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 2 02:14:45 localhost ifup[22863]: 'network-scripts' will be removed from distribution in near future. Feb 2 02:14:45 localhost ifup[22864]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 2 02:14:45 localhost NetworkManager[5971]: [1770016485.8311] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22870 uid=0 result="success" Feb 2 02:14:45 localhost ovs-vsctl[22873]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Feb 2 02:14:45 localhost kernel: device vlan23 entered promiscuous mode Feb 2 02:14:45 localhost NetworkManager[5971]: [1770016485.8729] manager: (vlan23): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Feb 2 02:14:45 localhost systemd-udevd[22875]: Network interface NamePolicy= disabled on kernel command line. Feb 2 02:14:45 localhost NetworkManager[5971]: [1770016485.8981] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22884 uid=0 result="success" Feb 2 02:14:45 localhost NetworkManager[5971]: [1770016485.9197] device (vlan23): carrier: link connected Feb 2 02:14:48 localhost NetworkManager[5971]: [1770016488.9907] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22913 uid=0 result="success" Feb 2 02:14:49 localhost NetworkManager[5971]: [1770016489.0446] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22928 uid=0 result="success" Feb 2 02:14:49 localhost NetworkManager[5971]: [1770016489.1112] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22949 uid=0 result="success" Feb 2 02:14:49 localhost ifup[22950]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 2 02:14:49 localhost ifup[22951]: 'network-scripts' will be removed from distribution in near future. Feb 2 02:14:49 localhost ifup[22952]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 2 02:14:49 localhost NetworkManager[5971]: [1770016489.1477] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22958 uid=0 result="success" Feb 2 02:14:49 localhost ovs-vsctl[22961]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Feb 2 02:14:49 localhost kernel: device vlan22 entered promiscuous mode Feb 2 02:14:49 localhost NetworkManager[5971]: [1770016489.1893] manager: (vlan22): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Feb 2 02:14:49 localhost systemd-udevd[22963]: Network interface NamePolicy= disabled on kernel command line. Feb 2 02:14:49 localhost NetworkManager[5971]: [1770016489.2159] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22973 uid=0 result="success" Feb 2 02:14:49 localhost NetworkManager[5971]: [1770016489.2399] device (vlan22): carrier: link connected Feb 2 02:14:52 localhost NetworkManager[5971]: [1770016492.2981] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23003 uid=0 result="success" Feb 2 02:14:52 localhost NetworkManager[5971]: [1770016492.3529] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23018 uid=0 result="success" Feb 2 02:14:52 localhost NetworkManager[5971]: [1770016492.4199] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23039 uid=0 result="success" Feb 2 02:14:52 localhost ifup[23040]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 2 02:14:52 localhost ifup[23041]: 'network-scripts' will be removed from distribution in near future. Feb 2 02:14:52 localhost ifup[23042]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 2 02:14:52 localhost NetworkManager[5971]: [1770016492.4581] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23048 uid=0 result="success" Feb 2 02:14:52 localhost ovs-vsctl[23051]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Feb 2 02:14:52 localhost kernel: device vlan44 entered promiscuous mode Feb 2 02:14:52 localhost systemd-udevd[23053]: Network interface NamePolicy= disabled on kernel command line. Feb 2 02:14:52 localhost NetworkManager[5971]: [1770016492.4997] manager: (vlan44): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Feb 2 02:14:52 localhost NetworkManager[5971]: [1770016492.5270] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23063 uid=0 result="success" Feb 2 02:14:52 localhost NetworkManager[5971]: [1770016492.5473] device (vlan44): carrier: link connected Feb 2 02:14:53 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Feb 2 02:14:55 localhost NetworkManager[5971]: [1770016495.6172] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23093 uid=0 result="success" Feb 2 02:14:55 localhost NetworkManager[5971]: [1770016495.6710] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23108 uid=0 result="success" Feb 2 02:14:55 localhost NetworkManager[5971]: [1770016495.7368] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23129 uid=0 result="success" Feb 2 02:14:55 localhost ifup[23130]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 2 02:14:55 localhost ifup[23131]: 'network-scripts' will be removed from distribution in near future. Feb 2 02:14:55 localhost ifup[23132]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 2 02:14:55 localhost NetworkManager[5971]: [1770016495.7712] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23138 uid=0 result="success" Feb 2 02:14:55 localhost ovs-vsctl[23141]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Feb 2 02:14:55 localhost NetworkManager[5971]: [1770016495.8114] manager: (vlan21): new Generic device (/org/freedesktop/NetworkManager/Devices/9) Feb 2 02:14:55 localhost kernel: device vlan21 entered promiscuous mode Feb 2 02:14:55 localhost systemd-udevd[23144]: Network interface NamePolicy= disabled on kernel command line. Feb 2 02:14:55 localhost NetworkManager[5971]: [1770016495.8413] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23153 uid=0 result="success" Feb 2 02:14:55 localhost NetworkManager[5971]: [1770016495.8646] device (vlan21): carrier: link connected Feb 2 02:14:58 localhost NetworkManager[5971]: [1770016498.9124] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23183 uid=0 result="success" Feb 2 02:14:58 localhost NetworkManager[5971]: [1770016498.9611] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23198 uid=0 result="success" Feb 2 02:14:59 localhost NetworkManager[5971]: [1770016499.0152] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23219 uid=0 result="success" Feb 2 02:14:59 localhost ifup[23220]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 2 02:14:59 localhost ifup[23221]: 'network-scripts' will be removed from distribution in near future. Feb 2 02:14:59 localhost ifup[23222]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 2 02:14:59 localhost NetworkManager[5971]: [1770016499.0460] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23228 uid=0 result="success" Feb 2 02:14:59 localhost ovs-vsctl[23231]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Feb 2 02:14:59 localhost kernel: device vlan20 entered promiscuous mode Feb 2 02:14:59 localhost systemd-udevd[23233]: Network interface NamePolicy= disabled on kernel command line. Feb 2 02:14:59 localhost NetworkManager[5971]: [1770016499.0785] manager: (vlan20): new Generic device (/org/freedesktop/NetworkManager/Devices/10) Feb 2 02:14:59 localhost NetworkManager[5971]: [1770016499.1034] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23243 uid=0 result="success" Feb 2 02:14:59 localhost NetworkManager[5971]: [1770016499.1204] device (vlan20): carrier: link connected Feb 2 02:15:02 localhost NetworkManager[5971]: [1770016502.1676] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23273 uid=0 result="success" Feb 2 02:15:02 localhost NetworkManager[5971]: [1770016502.2147] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23288 uid=0 result="success" Feb 2 02:15:02 localhost NetworkManager[5971]: [1770016502.2793] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23309 uid=0 result="success" Feb 2 02:15:02 localhost ifup[23310]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 2 02:15:02 localhost ifup[23311]: 'network-scripts' will be removed from distribution in near future. Feb 2 02:15:02 localhost ifup[23312]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 2 02:15:02 localhost NetworkManager[5971]: [1770016502.3102] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23318 uid=0 result="success" Feb 2 02:15:02 localhost ovs-vsctl[23321]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Feb 2 02:15:02 localhost NetworkManager[5971]: [1770016502.3622] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23328 uid=0 result="success" Feb 2 02:15:03 localhost NetworkManager[5971]: [1770016503.4247] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23355 uid=0 result="success" Feb 2 02:15:03 localhost NetworkManager[5971]: [1770016503.4786] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23370 uid=0 result="success" Feb 2 02:15:03 localhost NetworkManager[5971]: [1770016503.5515] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23391 uid=0 result="success" Feb 2 02:15:03 localhost ifup[23392]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 2 02:15:03 localhost ifup[23393]: 'network-scripts' will be removed from distribution in near future. Feb 2 02:15:03 localhost ifup[23394]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 2 02:15:03 localhost NetworkManager[5971]: [1770016503.5882] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23400 uid=0 result="success" Feb 2 02:15:03 localhost ovs-vsctl[23403]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Feb 2 02:15:03 localhost NetworkManager[5971]: [1770016503.6498] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23410 uid=0 result="success" Feb 2 02:15:04 localhost NetworkManager[5971]: [1770016504.7118] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23438 uid=0 result="success" Feb 2 02:15:04 localhost NetworkManager[5971]: [1770016504.7590] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23453 uid=0 result="success" Feb 2 02:15:04 localhost NetworkManager[5971]: [1770016504.8212] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23474 uid=0 result="success" Feb 2 02:15:04 localhost ifup[23475]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 2 02:15:04 localhost ifup[23476]: 'network-scripts' will be removed from distribution in near future. Feb 2 02:15:04 localhost ifup[23477]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 2 02:15:04 localhost NetworkManager[5971]: [1770016504.8551] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23483 uid=0 result="success" Feb 2 02:15:04 localhost ovs-vsctl[23486]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Feb 2 02:15:04 localhost NetworkManager[5971]: [1770016504.9092] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23493 uid=0 result="success" Feb 2 02:15:05 localhost NetworkManager[5971]: [1770016505.9643] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23521 uid=0 result="success" Feb 2 02:15:06 localhost NetworkManager[5971]: [1770016506.0087] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23536 uid=0 result="success" Feb 2 02:15:06 localhost NetworkManager[5971]: [1770016506.0681] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23557 uid=0 result="success" Feb 2 02:15:06 localhost ifup[23558]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 2 02:15:06 localhost ifup[23559]: 'network-scripts' will be removed from distribution in near future. Feb 2 02:15:06 localhost ifup[23560]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 2 02:15:06 localhost NetworkManager[5971]: [1770016506.1001] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23566 uid=0 result="success" Feb 2 02:15:06 localhost ovs-vsctl[23569]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Feb 2 02:15:06 localhost NetworkManager[5971]: [1770016506.1487] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23576 uid=0 result="success" Feb 2 02:15:07 localhost NetworkManager[5971]: [1770016507.2051] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23604 uid=0 result="success" Feb 2 02:15:07 localhost NetworkManager[5971]: [1770016507.2519] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23619 uid=0 result="success" Feb 2 02:15:07 localhost NetworkManager[5971]: [1770016507.3055] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23640 uid=0 result="success" Feb 2 02:15:07 localhost ifup[23641]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 2 02:15:07 localhost ifup[23642]: 'network-scripts' will be removed from distribution in near future. Feb 2 02:15:07 localhost ifup[23643]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 2 02:15:07 localhost NetworkManager[5971]: [1770016507.3336] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23649 uid=0 result="success" Feb 2 02:15:07 localhost ovs-vsctl[23652]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Feb 2 02:15:07 localhost NetworkManager[5971]: [1770016507.3865] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23659 uid=0 result="success" Feb 2 02:15:08 localhost NetworkManager[5971]: [1770016508.4389] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23687 uid=0 result="success" Feb 2 02:15:08 localhost NetworkManager[5971]: [1770016508.4856] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23702 uid=0 result="success" Feb 2 02:16:01 localhost python3[23734]: ansible-ansible.legacy.command Invoked with _raw_params=ip a#012ping -c 2 -W 2 192.168.122.10#012ping -c 2 -W 2 192.168.122.11#012 _uses_shell=True zuul_log_id=fa163ef9-e89a-9640-fd89-00000000001b-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:16:07 localhost python3[23753]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 02:16:07 localhost python3[23769]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDSP2ossQu4un8BdOSTCpCa1rqbj2in7CgdqbosGaYHhKiBh1Nayy4kowPlOsvQHK/10XcKBAlNW8yoiKaucaVkjlBTaBjgn8+Z/iRETSxlX3zCcvVocr02rkdA8mOR2rRzYgvCaYBNeAwR/UL69igOBm/96kOtVvF7VNcYInW7CUctSvR59iX3TNjmYcdcy4WDNsViTvllvyxSOC5Td3ORBS5/dnr10I/MRJHiyZO68F4JJ0sR8ylSWBdFpziBZzuoKUbTARPqbHsWwyuPRY6Ogfyv+8nlvFvnmjeGC8dKW4LxonO9S5qYy8/3lV01KMoo/+exlE0C+xxL9NzXoMh0T9V5xeROSZcbpg1NiNOpYrCtQmdkFiK8a3slCg6lZy6FNkBWPBzHa41AItEJLIiPdrqjtVVclQ/IQVk3vMLWLs77vCjdiAUG7i1gnJTbEmpbNv4ZcWQBzmqlr9YzQsAy5KKZieRJ4Ff6UXQgvDl//WSHKLb3ZUtf5nwEZS/MllM= zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 02:16:09 localhost python3[23783]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 02:16:09 localhost python3[23799]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDSP2ossQu4un8BdOSTCpCa1rqbj2in7CgdqbosGaYHhKiBh1Nayy4kowPlOsvQHK/10XcKBAlNW8yoiKaucaVkjlBTaBjgn8+Z/iRETSxlX3zCcvVocr02rkdA8mOR2rRzYgvCaYBNeAwR/UL69igOBm/96kOtVvF7VNcYInW7CUctSvR59iX3TNjmYcdcy4WDNsViTvllvyxSOC5Td3ORBS5/dnr10I/MRJHiyZO68F4JJ0sR8ylSWBdFpziBZzuoKUbTARPqbHsWwyuPRY6Ogfyv+8nlvFvnmjeGC8dKW4LxonO9S5qYy8/3lV01KMoo/+exlE0C+xxL9NzXoMh0T9V5xeROSZcbpg1NiNOpYrCtQmdkFiK8a3slCg6lZy6FNkBWPBzHa41AItEJLIiPdrqjtVVclQ/IQVk3vMLWLs77vCjdiAUG7i1gnJTbEmpbNv4ZcWQBzmqlr9YzQsAy5KKZieRJ4Ff6UXQgvDl//WSHKLb3ZUtf5nwEZS/MllM= zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 2 02:16:10 localhost python3[23813]: ansible-ansible.builtin.slurp Invoked with path=/etc/hostname src=/etc/hostname Feb 2 02:16:11 localhost python3[23828]: ansible-ansible.legacy.command Invoked with _raw_params=hostname="np0005604725.novalocal"#012hostname_str_array=(${hostname//./ })#012echo ${hostname_str_array[0]} > /home/zuul/ansible_hostname#012 _uses_shell=True zuul_log_id=fa163ef9-e89a-9640-fd89-000000000022-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:16:12 localhost python3[23848]: ansible-ansible.legacy.command Invoked with _raw_params=hostname=$(cat /home/zuul/ansible_hostname)#012hostnamectl hostname "$hostname.ooo.test"#012 _uses_shell=True zuul_log_id=fa163ef9-e89a-9640-fd89-000000000023-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:16:12 localhost systemd[1]: Starting Hostname Service... Feb 2 02:16:12 localhost systemd[1]: Started Hostname Service. Feb 2 02:16:12 localhost systemd-hostnamed[23852]: Hostname set to (static) Feb 2 02:16:12 localhost NetworkManager[5971]: [1770016572.2923] hostname: static hostname changed from "np0005604725.novalocal" to "np0005604725.ooo.test" Feb 2 02:16:12 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Feb 2 02:16:12 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Feb 2 02:16:13 localhost systemd[1]: session-10.scope: Deactivated successfully. Feb 2 02:16:13 localhost systemd[1]: session-10.scope: Consumed 1min 45.817s CPU time. Feb 2 02:16:13 localhost systemd-logind[759]: Session 10 logged out. Waiting for processes to exit. Feb 2 02:16:13 localhost systemd-logind[759]: Removed session 10. Feb 2 02:16:15 localhost sshd[23863]: main: sshd: ssh-rsa algorithm is disabled Feb 2 02:16:15 localhost systemd-logind[759]: New session 11 of user zuul. Feb 2 02:16:15 localhost systemd[1]: Started Session 11 of User zuul. Feb 2 02:16:15 localhost python3[23880]: ansible-ansible.builtin.slurp Invoked with path=/home/zuul/ansible_hostname src=/home/zuul/ansible_hostname Feb 2 02:16:18 localhost systemd[1]: session-11.scope: Deactivated successfully. Feb 2 02:16:18 localhost systemd-logind[759]: Session 11 logged out. Waiting for processes to exit. Feb 2 02:16:18 localhost systemd-logind[759]: Removed session 11. Feb 2 02:16:22 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Feb 2 02:16:42 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 2 02:16:49 localhost sshd[23883]: main: sshd: ssh-rsa algorithm is disabled Feb 2 02:16:49 localhost systemd-logind[759]: New session 12 of user zuul. Feb 2 02:16:49 localhost systemd[1]: Started Session 12 of User zuul. Feb 2 02:16:49 localhost python3[23902]: ansible-ansible.legacy.dnf Invoked with name=['ipa-client'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 02:16:58 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Feb 2 02:16:58 localhost dbus-broker-launch[18413]: Noticed file-system modification, trigger reload. Feb 2 02:16:58 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Feb 2 02:16:58 localhost dbus-broker-launch[18413]: Service file '/usr/share/dbus-1/services/certmonger.service' is not named after the D-Bus name 'org.fedorahosted.certmonger'. Feb 2 02:16:58 localhost dbus-broker-launch[18413]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Feb 2 02:16:58 localhost dbus-broker-launch[18413]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Feb 2 02:16:58 localhost systemd[1]: Reloading. Feb 2 02:16:58 localhost systemd-rc-local-generator[23998]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:16:58 localhost systemd-sysv-generator[24003]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:16:58 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:16:59 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Feb 2 02:17:07 localhost kernel: SELinux: Converting 538 SID table entries... Feb 2 02:17:07 localhost kernel: SELinux: policy capability network_peer_controls=1 Feb 2 02:17:07 localhost kernel: SELinux: policy capability open_perms=1 Feb 2 02:17:07 localhost kernel: SELinux: policy capability extended_socket_class=1 Feb 2 02:17:07 localhost kernel: SELinux: policy capability always_check_network=0 Feb 2 02:17:07 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Feb 2 02:17:07 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 2 02:17:07 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 2 02:17:08 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=5 res=1 Feb 2 02:17:08 localhost systemd[1]: Stopping OpenSSH server daemon... Feb 2 02:17:08 localhost systemd[1]: sshd.service: Deactivated successfully. Feb 2 02:17:08 localhost systemd[1]: Stopped OpenSSH server daemon. Feb 2 02:17:08 localhost systemd[1]: Stopped target sshd-keygen.target. Feb 2 02:17:08 localhost systemd[1]: Stopping sshd-keygen.target... Feb 2 02:17:08 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 2 02:17:08 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 2 02:17:08 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 2 02:17:08 localhost systemd[1]: Reached target sshd-keygen.target. Feb 2 02:17:08 localhost systemd[1]: Starting OpenSSH server daemon... Feb 2 02:17:08 localhost sshd[24038]: main: sshd: ssh-rsa algorithm is disabled Feb 2 02:17:08 localhost systemd[1]: Started OpenSSH server daemon. Feb 2 02:17:09 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 2 02:17:09 localhost systemd[1]: Starting man-db-cache-update.service... Feb 2 02:17:09 localhost systemd[1]: Reloading. Feb 2 02:17:10 localhost systemd-sysv-generator[24614]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:17:10 localhost systemd-rc-local-generator[24609]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:17:10 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:17:10 localhost systemd[1]: Queuing reload/restart jobs for marked units… Feb 2 02:17:10 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 2 02:17:11 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 2 02:17:11 localhost systemd[1]: Finished man-db-cache-update.service. Feb 2 02:17:11 localhost systemd[1]: man-db-cache-update.service: Consumed 1.524s CPU time. Feb 2 02:17:11 localhost systemd[1]: run-rec35120580db4807b528059e27947150.service: Deactivated successfully. Feb 2 02:17:11 localhost systemd[1]: run-r98bf9ccfc23a4e1381d9f912572bc021.service: Deactivated successfully. Feb 2 02:18:11 localhost systemd[1]: session-12.scope: Deactivated successfully. Feb 2 02:18:11 localhost systemd[1]: session-12.scope: Consumed 17.982s CPU time. Feb 2 02:18:11 localhost systemd-logind[759]: Session 12 logged out. Waiting for processes to exit. Feb 2 02:18:11 localhost systemd-logind[759]: Removed session 12. Feb 2 02:18:59 localhost sshd[26003]: main: sshd: ssh-rsa algorithm is disabled Feb 2 02:18:59 localhost systemd-logind[759]: New session 13 of user zuul. Feb 2 02:18:59 localhost systemd[1]: Started Session 13 of User zuul. Feb 2 02:18:59 localhost python3[26054]: ansible-ansible.legacy.stat Invoked with path=/etc/resolv.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:19:00 localhost python3[26099]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1770016739.631042-62-6629534105651/source dest=/etc/resolv.conf owner=root group=root mode=420 follow=False _original_basename=ipa_resolv_conf.j2 checksum=edbe9a45130a7ebff5948216d04bc5bb05808e49 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:19:04 localhost python3[26129]: ansible-ansible.legacy.command Invoked with _raw_params=ip route add 10.255.255.25 via 192.168.122.100 dev br-ex _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:19:06 localhost python3[26147]: ansible-ansible.builtin.file Invoked with path=/etc/pki/CA state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:20:06 localhost systemd[1]: session-13.scope: Deactivated successfully. Feb 2 02:20:06 localhost systemd[1]: session-13.scope: Consumed 1.160s CPU time. Feb 2 02:20:06 localhost systemd-logind[759]: Session 13 logged out. Waiting for processes to exit. Feb 2 02:20:06 localhost systemd-logind[759]: Removed session 13. Feb 2 02:46:52 localhost sshd[26158]: main: sshd: ssh-rsa algorithm is disabled Feb 2 02:46:52 localhost systemd-logind[759]: New session 14 of user zuul. Feb 2 02:46:52 localhost systemd[1]: Started Session 14 of User zuul. Feb 2 02:46:53 localhost python3[26206]: ansible-ansible.legacy.ping Invoked with data=pong Feb 2 02:46:54 localhost python3[26251]: ansible-setup Invoked with gather_subset=['!facter', '!ohai'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 02:46:54 localhost python3[26271]: ansible-user Invoked with name=tripleo-admin generate_ssh_key=False state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005604725.ooo.test update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Feb 2 02:46:54 localhost systemd-journald[617]: Field hash table of /run/log/journal/48447b9b8976f23a3b4b319f2b01dfe5/system.journal has a fill level at 76.6 (255 of 333 items), suggesting rotation. Feb 2 02:46:54 localhost systemd-journald[617]: /run/log/journal/48447b9b8976f23a3b4b319f2b01dfe5/system.journal: Journal header limits reached or header out-of-date, rotating. Feb 2 02:46:54 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Feb 2 02:46:54 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Feb 2 02:46:55 localhost python3[26329]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/tripleo-admin follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:46:55 localhost python3[26372]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/tripleo-admin mode=288 owner=root group=root src=/home/zuul/.ansible/tmp/ansible-tmp-1770018415.125909-82041-217690367085349/source _original_basename=tmpcefrpajn follow=False checksum=b3e7ecdcc699d217c6b083a91b07208207813d93 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:46:56 localhost python3[26402]: ansible-file Invoked with path=/home/tripleo-admin state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:46:56 localhost python3[26418]: ansible-file Invoked with path=/home/tripleo-admin/.ssh state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:46:57 localhost python3[26434]: ansible-file Invoked with path=/home/tripleo-admin/.ssh/authorized_keys state=touch owner=tripleo-admin group=tripleo-admin mode=384 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:46:58 localhost python3[26450]: ansible-lineinfile Invoked with path=/home/tripleo-admin/.ssh/authorized_keys line=ssh-rsa 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 zuul-build-sshkey#012 regexp=Generated by TripleO state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:46:58 localhost python3[26464]: ansible-ping Invoked with data=pong Feb 2 02:47:10 localhost sshd[26468]: main: sshd: ssh-rsa algorithm is disabled Feb 2 02:47:10 localhost systemd[1]: Created slice User Slice of UID 1002. Feb 2 02:47:10 localhost systemd[1]: Starting User Runtime Directory /run/user/1002... Feb 2 02:47:10 localhost systemd-logind[759]: New session 15 of user tripleo-admin. Feb 2 02:47:10 localhost systemd[1]: Finished User Runtime Directory /run/user/1002. Feb 2 02:47:10 localhost systemd[1]: Starting User Manager for UID 1002... Feb 2 02:47:10 localhost systemd[26472]: Queued start job for default target Main User Target. Feb 2 02:47:10 localhost systemd[26472]: Created slice User Application Slice. Feb 2 02:47:10 localhost systemd[26472]: Started Mark boot as successful after the user session has run 2 minutes. Feb 2 02:47:10 localhost systemd[26472]: Started Daily Cleanup of User's Temporary Directories. Feb 2 02:47:10 localhost systemd[26472]: Reached target Paths. Feb 2 02:47:10 localhost systemd[26472]: Reached target Timers. Feb 2 02:47:10 localhost systemd[26472]: Starting D-Bus User Message Bus Socket... Feb 2 02:47:10 localhost systemd[26472]: Starting Create User's Volatile Files and Directories... Feb 2 02:47:10 localhost systemd[26472]: Finished Create User's Volatile Files and Directories. Feb 2 02:47:10 localhost systemd[26472]: Listening on D-Bus User Message Bus Socket. Feb 2 02:47:10 localhost systemd[26472]: Reached target Sockets. Feb 2 02:47:10 localhost systemd[26472]: Reached target Basic System. Feb 2 02:47:10 localhost systemd[26472]: Reached target Main User Target. Feb 2 02:47:10 localhost systemd[26472]: Startup finished in 107ms. Feb 2 02:47:10 localhost systemd[1]: Started User Manager for UID 1002. Feb 2 02:47:10 localhost systemd[1]: Started Session 15 of User tripleo-admin. Feb 2 02:47:11 localhost python3[26533]: ansible-ansible.legacy.setup Invoked with gather_subset=['!all', 'min'] gather_timeout=45 filter=[] fact_path=/etc/ansible/facts.d Feb 2 02:47:15 localhost python3[26553]: ansible-selinux Invoked with policy=targeted state=enforcing configfile=/etc/selinux/config Feb 2 02:47:16 localhost python3[26569]: ansible-tempfile Invoked with state=file suffix=tmphosts prefix=ansible. path=None Feb 2 02:47:17 localhost python3[26617]: ansible-ansible.legacy.copy Invoked with remote_src=True src=/etc/hosts dest=/tmp/ansible.vt3xqoqbtmphosts mode=preserve backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None local_follow=None checksum=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:47:17 localhost python3[26647]: ansible-blockinfile Invoked with state=absent path=/tmp/ansible.vt3xqoqbtmphosts block= marker=# {mark} marker_begin=HEAT_HOSTS_START - Do not edit manually within this section! marker_end=HEAT_HOSTS_END create=False backup=False unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:47:18 localhost python3[26663]: ansible-blockinfile Invoked with create=True path=/tmp/ansible.vt3xqoqbtmphosts insertbefore=BOF block=172.17.0.106 np0005604728.ooo.test np0005604728#012172.18.0.106 np0005604728.storage.ooo.test np0005604728.storage#012172.17.0.106 np0005604728.internalapi.ooo.test np0005604728.internalapi#012172.19.0.106 np0005604728.tenant.ooo.test np0005604728.tenant#012192.168.122.106 np0005604728.ctlplane.ooo.test np0005604728.ctlplane#012172.17.0.107 np0005604729.ooo.test np0005604729#012172.18.0.107 np0005604729.storage.ooo.test np0005604729.storage#012172.17.0.107 np0005604729.internalapi.ooo.test np0005604729.internalapi#012172.19.0.107 np0005604729.tenant.ooo.test np0005604729.tenant#012192.168.122.107 np0005604729.ctlplane.ooo.test np0005604729.ctlplane#012172.17.0.108 np0005604730.ooo.test np0005604730#012172.18.0.108 np0005604730.storage.ooo.test np0005604730.storage#012172.17.0.108 np0005604730.internalapi.ooo.test np0005604730.internalapi#012172.19.0.108 np0005604730.tenant.ooo.test np0005604730.tenant#012192.168.122.108 np0005604730.ctlplane.ooo.test np0005604730.ctlplane#012172.17.0.103 np0005604723.ooo.test np0005604723#012172.18.0.103 np0005604723.storage.ooo.test np0005604723.storage#012172.20.0.103 np0005604723.storagemgmt.ooo.test np0005604723.storagemgmt#012172.17.0.103 np0005604723.internalapi.ooo.test np0005604723.internalapi#012172.19.0.103 np0005604723.tenant.ooo.test np0005604723.tenant#012172.21.0.103 np0005604723.external.ooo.test np0005604723.external#012192.168.122.103 np0005604723.ctlplane.ooo.test np0005604723.ctlplane#012172.17.0.104 np0005604725.ooo.test np0005604725#012172.18.0.104 np0005604725.storage.ooo.test np0005604725.storage#012172.20.0.104 np0005604725.storagemgmt.ooo.test np0005604725.storagemgmt#012172.17.0.104 np0005604725.internalapi.ooo.test np0005604725.internalapi#012172.19.0.104 np0005604725.tenant.ooo.test np0005604725.tenant#012172.21.0.104 np0005604725.external.ooo.test np0005604725.external#012192.168.122.104 np0005604725.ctlplane.ooo.test np0005604725.ctlplane#012172.17.0.105 np0005604726.ooo.test np0005604726#012172.18.0.105 np0005604726.storage.ooo.test np0005604726.storage#012172.20.0.105 np0005604726.storagemgmt.ooo.test np0005604726.storagemgmt#012172.17.0.105 np0005604726.internalapi.ooo.test np0005604726.internalapi#012172.19.0.105 np0005604726.tenant.ooo.test np0005604726.tenant#012172.21.0.105 np0005604726.external.ooo.test np0005604726.external#012192.168.122.105 np0005604726.ctlplane.ooo.test np0005604726.ctlplane#012#012192.168.122.100 undercloud.ctlplane.ooo.test undercloud.ctlplane#012192.168.122.99 overcloud.ctlplane.ooo.test#012172.18.0.162 overcloud.storage.ooo.test#012172.20.0.221 overcloud.storagemgmt.ooo.test#012172.17.0.127 overcloud.internalapi.ooo.test#012172.21.0.122 overcloud.ooo.test#012 marker=# {mark} marker_begin=START_HOST_ENTRIES_FOR_STACK: overcloud marker_end=END_HOST_ENTRIES_FOR_STACK: overcloud state=present backup=False unsafe_writes=False insertafter=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:47:19 localhost python3[26679]: ansible-ansible.legacy.command Invoked with _raw_params=cp "/tmp/ansible.vt3xqoqbtmphosts" "/etc/hosts" _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:47:19 localhost python3[26696]: ansible-file Invoked with path=/tmp/ansible.vt3xqoqbtmphosts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:47:20 localhost python3[26712]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides rhosp-release _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:47:21 localhost python3[26729]: ansible-ansible.legacy.dnf Invoked with name=['rhosp-release'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 02:47:26 localhost python3[26749]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:47:26 localhost python3[26766]: ansible-ansible.legacy.dnf Invoked with name=['driverctl', 'lvm2', 'jq', 'nftables', 'openvswitch', 'openstack-heat-agents', 'openstack-selinux', 'os-net-config', 'python3-libselinux', 'python3-pyyaml', 'puppet-tripleo', 'rsync', 'tmpwatch', 'sysstat', 'iproute-tc'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 02:47:41 localhost systemd[1]: Reloading. Feb 2 02:47:42 localhost systemd-rc-local-generator[26961]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:47:42 localhost systemd-sysv-generator[26967]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:47:42 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:47:42 localhost systemd[1]: Listening on Device-mapper event daemon FIFOs. Feb 2 02:47:50 localhost systemd[1]: Reloading. Feb 2 02:47:50 localhost systemd-rc-local-generator[27031]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:47:50 localhost systemd-sysv-generator[27035]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:47:50 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:47:50 localhost systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Feb 2 02:47:50 localhost systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Feb 2 02:47:50 localhost systemd[1]: Reloading. Feb 2 02:47:50 localhost systemd-rc-local-generator[27072]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:47:50 localhost systemd-sysv-generator[27075]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:47:50 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:47:50 localhost systemd[1]: Listening on LVM2 poll daemon socket. Feb 2 02:48:39 localhost kernel: SELinux: Converting 2713 SID table entries... Feb 2 02:48:39 localhost kernel: SELinux: policy capability network_peer_controls=1 Feb 2 02:48:39 localhost kernel: SELinux: policy capability open_perms=1 Feb 2 02:48:39 localhost kernel: SELinux: policy capability extended_socket_class=1 Feb 2 02:48:39 localhost kernel: SELinux: policy capability always_check_network=0 Feb 2 02:48:39 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Feb 2 02:48:39 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 2 02:48:39 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 2 02:48:40 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=7 res=1 Feb 2 02:48:40 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 2 02:48:40 localhost systemd[1]: Starting man-db-cache-update.service... Feb 2 02:48:40 localhost systemd[1]: Reloading. Feb 2 02:48:40 localhost systemd-rc-local-generator[27896]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:48:40 localhost systemd-sysv-generator[27900]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:48:40 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:48:40 localhost systemd[1]: Queuing reload/restart jobs for marked units… Feb 2 02:48:40 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 2 02:48:41 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 2 02:48:41 localhost systemd[1]: Finished man-db-cache-update.service. Feb 2 02:48:41 localhost systemd[1]: run-rfa1441dcb70d4c3f9bbfe7def5293f01.service: Deactivated successfully. Feb 2 02:48:41 localhost systemd[1]: run-r688a1884569d4584aa998fc12de6fcc2.service: Deactivated successfully. Feb 2 02:48:43 localhost python3[28777]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -V driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:48:44 localhost python3[28916]: ansible-ansible.legacy.systemd Invoked with name=openvswitch enabled=True state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 02:48:44 localhost systemd[1]: Reloading. Feb 2 02:48:44 localhost systemd-rc-local-generator[28940]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:48:44 localhost systemd-sysv-generator[28946]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:48:45 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:48:45 localhost python3[28969]: ansible-file Invoked with path=/var/lib/heat-config/tripleo-config-download state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:48:46 localhost python3[28985]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides openstack-network-scripts _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:48:46 localhost python3[29002]: ansible-systemd Invoked with name=NetworkManager enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Feb 2 02:48:48 localhost python3[29020]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=dns value=none backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:48:48 localhost python3[29038]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=rc-manager value=unmanaged backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:48:49 localhost python3[29056]: ansible-ansible.legacy.systemd Invoked with name=NetworkManager state=reloaded daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Feb 2 02:48:49 localhost systemd[1]: Reloading Network Manager... Feb 2 02:48:49 localhost NetworkManager[5971]: [1770018529.3399] audit: op="reload" arg="0" pid=29059 uid=0 result="success" Feb 2 02:48:49 localhost NetworkManager[5971]: [1770018529.3409] config: signal: SIGHUP,config-files,values,values-user,no-auto-default,dns-mode,rc-manager (/etc/NetworkManager/NetworkManager.conf (lib: 00-server.conf) (run: 15-carrier-timeout.conf)) Feb 2 02:48:49 localhost NetworkManager[5971]: [1770018529.3410] dns-mgr: init: dns=none,systemd-resolved rc-manager=unmanaged Feb 2 02:48:49 localhost systemd[1]: Reloaded Network Manager. Feb 2 02:48:49 localhost python3[29075]: ansible-ansible.legacy.command Invoked with _raw_params=ln -f -s /usr/share/openstack-puppet/modules/* /etc/puppet/modules/ _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:48:50 localhost python3[29092]: ansible-stat Invoked with path=/usr/bin/ansible-playbook follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 02:48:50 localhost python3[29110]: ansible-stat Invoked with path=/usr/bin/ansible-playbook-3 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 02:48:51 localhost python3[29126]: ansible-file Invoked with state=link src=/usr/bin/ansible-playbook path=/usr/bin/ansible-playbook-3 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:48:51 localhost python3[29142]: ansible-tempfile Invoked with state=file prefix=ansible. suffix= path=None Feb 2 02:48:52 localhost python3[29158]: ansible-stat Invoked with path=/etc/ssh/ssh_known_hosts follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 02:48:53 localhost python3[29174]: ansible-blockinfile Invoked with path=/tmp/ansible.q798f7qm block=[192.168.122.106]*,[np0005604728.ctlplane.ooo.test]*,[172.17.0.106]*,[np0005604728.internalapi.ooo.test]*,[172.18.0.106]*,[np0005604728.storage.ooo.test]*,[172.19.0.106]*,[np0005604728.tenant.ooo.test]*,[np0005604728.ooo.test]*,[np0005604728]* ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDE05fscUvb9BAlTydLehJTIAYK25JL7u5/E0TmKfuEnw5xURb9YXNLC6Kbjf1GgzEDxTOV2vrjgjz/wqRiSOOSJ05q59pbRxru72BvzJwL3Qm0dIUivShLEAsgFWpYhDnN2qFSExVCmXqytW5Ud3h6OOV5u5i9ulyqUI9jfLkqOnQNEgDrjsb5djgm1t9vzlfPU2nwdUNhuEKaZUyS6dWnkmiWSoekBVwq+B/F4Z0CMBbfAch4rqw0OIGrs5mmdZFfrYoaqS/v532iUhUuBq85TAiq6pOmo+CmXacfUepGg/RuDNeZ4njYnPYW1s1YJPNI5kfjiuNu3OTu3Ldl6OLNc6rInhQ3QGdsiw+AYUILPk07pZgX++qg71gvTr2EDwGgRHGX2efJr78LC8nCuOAnkDyKka1JNmUevKKZU1TrmI2dCrM7gzza9G3ukj4DsC6ynSctGWqBTM+eQPb0ZFytQLNa2ezpJWBat0eY9HYaHu1CpXcD6z4oL5RLErxD9o8=#012[192.168.122.107]*,[np0005604729.ctlplane.ooo.test]*,[172.17.0.107]*,[np0005604729.internalapi.ooo.test]*,[172.18.0.107]*,[np0005604729.storage.ooo.test]*,[172.19.0.107]*,[np0005604729.tenant.ooo.test]*,[np0005604729.ooo.test]*,[np0005604729]* ssh-rsa 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#012[192.168.122.108]*,[np0005604730.ctlplane.ooo.test]*,[172.17.0.108]*,[np0005604730.internalapi.ooo.test]*,[172.18.0.108]*,[np0005604730.storage.ooo.test]*,[172.19.0.108]*,[np0005604730.tenant.ooo.test]*,[np0005604730.ooo.test]*,[np0005604730]* ssh-rsa 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#012[192.168.122.103]*,[np0005604723.ctlplane.ooo.test]*,[172.21.0.103]*,[np0005604723.external.ooo.test]*,[172.17.0.103]*,[np0005604723.internalapi.ooo.test]*,[172.18.0.103]*,[np0005604723.storage.ooo.test]*,[172.20.0.103]*,[np0005604723.storagemgmt.ooo.test]*,[172.19.0.103]*,[np0005604723.tenant.ooo.test]*,[np0005604723.ooo.test]*,[np0005604723]* ssh-rsa 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#012[192.168.122.104]*,[np0005604725.ctlplane.ooo.test]*,[172.21.0.104]*,[np0005604725.external.ooo.test]*,[172.17.0.104]*,[np0005604725.internalapi.ooo.test]*,[172.18.0.104]*,[np0005604725.storage.ooo.test]*,[172.20.0.104]*,[np0005604725.storagemgmt.ooo.test]*,[172.19.0.104]*,[np0005604725.tenant.ooo.test]*,[np0005604725.ooo.test]*,[np0005604725]* ssh-rsa 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#012[192.168.122.105]*,[np0005604726.ctlplane.ooo.test]*,[172.21.0.105]*,[np0005604726.external.ooo.test]*,[172.17.0.105]*,[np0005604726.internalapi.ooo.test]*,[172.18.0.105]*,[np0005604726.storage.ooo.test]*,[172.20.0.105]*,[np0005604726.storagemgmt.ooo.test]*,[172.19.0.105]*,[np0005604726.tenant.ooo.test]*,[np0005604726.ooo.test]*,[np0005604726]* ssh-rsa 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#012 create=True state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:48:53 localhost python3[29190]: ansible-ansible.legacy.command Invoked with _raw_params=cat '/tmp/ansible.q798f7qm' > /etc/ssh/ssh_known_hosts _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:48:54 localhost python3[29208]: ansible-file Invoked with path=/tmp/ansible.q798f7qm state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:48:54 localhost python3[29224]: ansible-file Invoked with path=/var/log/journal state=directory mode=0750 owner=root group=root setype=var_log_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Feb 2 02:48:55 localhost python3[29240]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active cloud-init.service || systemctl is-enabled cloud-init.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:48:55 localhost python3[29258]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline | grep -q cloud-init=disabled _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:48:55 localhost python3[29277]: ansible-community.general.cloud_init_data_facts Invoked with filter=status Feb 2 02:48:58 localhost python3[29414]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:48:58 localhost python3[29431]: ansible-ansible.legacy.dnf Invoked with name=['tuned', 'tuned-profiles-cpu-partitioning'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 02:49:01 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Feb 2 02:49:02 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Feb 2 02:49:02 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 2 02:49:02 localhost systemd[1]: Starting man-db-cache-update.service... Feb 2 02:49:02 localhost systemd[1]: Reloading. Feb 2 02:49:02 localhost systemd-sysv-generator[29482]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:49:02 localhost systemd-rc-local-generator[29476]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:49:02 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:49:02 localhost systemd[1]: Queuing reload/restart jobs for marked units… Feb 2 02:49:02 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Feb 2 02:49:02 localhost systemd[1]: tuned.service: Deactivated successfully. Feb 2 02:49:02 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Feb 2 02:49:02 localhost systemd[1]: tuned.service: Consumed 1.699s CPU time. Feb 2 02:49:02 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Feb 2 02:49:02 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 2 02:49:02 localhost systemd[1]: Finished man-db-cache-update.service. Feb 2 02:49:02 localhost systemd[1]: run-rce5cdbdab3014f3cbc051cfb975ef944.service: Deactivated successfully. Feb 2 02:49:04 localhost systemd[1]: Started Dynamic System Tuning Daemon. Feb 2 02:49:04 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 2 02:49:04 localhost systemd[1]: Starting man-db-cache-update.service... Feb 2 02:49:04 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 2 02:49:04 localhost systemd[1]: Finished man-db-cache-update.service. Feb 2 02:49:04 localhost systemd[1]: run-ra6c1fd70ddbf421191cf6689e9cc0739.service: Deactivated successfully. Feb 2 02:49:05 localhost python3[29876]: ansible-systemd Invoked with name=tuned state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 02:49:05 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Feb 2 02:49:05 localhost systemd[1]: tuned.service: Deactivated successfully. Feb 2 02:49:05 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Feb 2 02:49:05 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Feb 2 02:49:06 localhost systemd[1]: Started Dynamic System Tuning Daemon. Feb 2 02:49:07 localhost python3[30071]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:49:07 localhost python3[30088]: ansible-slurp Invoked with src=/etc/tuned/active_profile Feb 2 02:49:08 localhost python3[30104]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 02:49:08 localhost python3[30120]: ansible-ansible.legacy.command Invoked with _raw_params=tuned-adm profile throughput-performance _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:49:10 localhost python3[30140]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:49:11 localhost python3[30157]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/nova_libvirt/etc/nova/nova.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 02:49:13 localhost python3[30173]: ansible-replace Invoked with regexp=TRIPLEO_HEAT_TEMPLATE_KERNEL_ARGS dest=/etc/default/grub replace= path=/etc/default/grub backup=False encoding=utf-8 unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:19 localhost python3[30189]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:20 localhost python3[30237]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:49:20 localhost python3[30282]: ansible-ansible.legacy.copy Invoked with mode=384 dest=/etc/puppet/hiera.yaml src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018559.7123368-87601-279809526448271/source _original_basename=tmp_vyjlf1t follow=False checksum=aaf3699defba931d532f4955ae152f505046749a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:20 localhost python3[30312]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:21 localhost python3[30360]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:49:22 localhost python3[30403]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018561.3330612-87834-25404231210950/source dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json follow=False checksum=9706421d324de4cde83d427e6c2ba1de043319c8 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:22 localhost python3[30465]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:49:23 localhost python3[30508]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018562.370366-87970-238584071300375/source dest=/etc/puppet/hieradata/bootstrap_node.json mode=None follow=False _original_basename=bootstrap_node.j2 checksum=06827f71b1728b7dfcc177861cf7ff87aec2fa67 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:23 localhost python3[30570]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:49:24 localhost python3[30613]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018563.3218553-87970-247035450737581/source dest=/etc/puppet/hieradata/vip_data.json mode=None follow=False _original_basename=vip_data.j2 checksum=37fb0bed7121277f29bc22dec370cd75f8825843 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:24 localhost python3[30675]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:49:25 localhost python3[30718]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018564.3369112-87970-112512848146599/source dest=/etc/puppet/hieradata/net_ip_map.json mode=None follow=False _original_basename=net_ip_map.j2 checksum=3aa9bde21cec8e8062cc87ae410eab47ae478aa8 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:25 localhost python3[30780]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:49:26 localhost python3[30823]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018565.465559-87970-20552837350734/source dest=/etc/puppet/hieradata/cloud_domain.json mode=None follow=False _original_basename=cloud_domain.j2 checksum=64f5f309f5137b9e0913cbf22857157ecfa0f1f1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:26 localhost python3[30885]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:49:27 localhost python3[30928]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018566.455864-87970-224903563640177/source dest=/etc/puppet/hieradata/fqdn.json mode=None follow=False _original_basename=fqdn.j2 checksum=32f88bcf31f1775579d68b0bd508c08322c64f5a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:27 localhost python3[30990]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:49:28 localhost python3[31033]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018567.4317462-87970-241301711335500/source dest=/etc/puppet/hieradata/service_names.json mode=None follow=False _original_basename=service_names.j2 checksum=f3a297f9489dbabd957eb904b4140ce21e05b558 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:28 localhost systemd[26472]: Starting Mark boot as successful... Feb 2 02:49:28 localhost systemd[26472]: Finished Mark boot as successful. Feb 2 02:49:28 localhost python3[31096]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:49:29 localhost python3[31139]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018568.388788-87970-112404701935087/source dest=/etc/puppet/hieradata/service_configs.json mode=None follow=False _original_basename=service_configs.j2 checksum=d25a9148ca2074f56504132da3e218a6107442ef backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:29 localhost python3[31201]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:49:30 localhost python3[31244]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018569.36129-87970-147827744215053/source dest=/etc/puppet/hieradata/extraconfig.json mode=None follow=False _original_basename=extraconfig.j2 checksum=5f36b2ea290645ee34d943220a14b54ee5ea5be5 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:30 localhost python3[31306]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:49:31 localhost python3[31349]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018570.3621774-87970-32483556886609/source dest=/etc/puppet/hieradata/role_extraconfig.json mode=None follow=False _original_basename=role_extraconfig.j2 checksum=ad2ff5cbdfc5332b5cb47860d7f73fa8fd81a43a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:31 localhost python3[31411]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:49:32 localhost python3[31454]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018571.3517363-87970-206967670080085/source dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json mode=None follow=False _original_basename=ovn_chassis_mac_map.j2 checksum=61f634af721ef24c642dcf60747a28d617564c6d backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:32 localhost python3[31484]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 02:49:33 localhost python3[31532]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:49:33 localhost python3[31575]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/ansible_managed.json owner=root group=root mode=0644 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018573.0606902-89455-29890365408/source _original_basename=tmpy15q3kfx follow=False checksum=bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:49:38 localhost python3[31605]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_default_ipv4'] gather_timeout=10 fact_path=/etc/ansible/facts.d Feb 2 02:49:39 localhost python3[31666]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 38.102.83.1 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:49:43 localhost python3[31683]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.10 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:49:48 localhost python3[31700]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 192.168.122.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:49:49 localhost python3[31723]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:49:53 localhost python3[31740]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.18.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:49:54 localhost python3[31763]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.18.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:49:58 localhost python3[31780]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.18.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:50:03 localhost python3[31797]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.20.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:50:03 localhost python3[31820]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.20.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:50:08 localhost python3[31837]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.20.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:50:12 localhost python3[31854]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.17.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:50:13 localhost python3[31877]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.17.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:50:17 localhost python3[31894]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.17.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:50:22 localhost python3[31911]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.19.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:50:22 localhost python3[31934]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.19.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:50:26 localhost python3[31951]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.19.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:50:31 localhost python3[31968]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.21.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:50:31 localhost python3[31991]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.21.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:50:36 localhost python3[32008]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.21.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:50:42 localhost python3[32025]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:50:42 localhost python3[32073]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:50:42 localhost python3[32091]: ansible-ansible.legacy.file Invoked with mode=384 dest=/etc/puppet/hiera.yaml _original_basename=tmpuft91i32 recurse=False state=file path=/etc/puppet/hiera.yaml force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:50:43 localhost python3[32121]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:50:44 localhost python3[32169]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:50:44 localhost python3[32187]: ansible-ansible.legacy.file Invoked with dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json recurse=False state=file path=/etc/puppet/hieradata/all_nodes.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:50:45 localhost python3[32249]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:50:45 localhost python3[32267]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/bootstrap_node.json _original_basename=bootstrap_node.j2 recurse=False state=file path=/etc/puppet/hieradata/bootstrap_node.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:50:46 localhost python3[32329]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:50:46 localhost python3[32347]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/vip_data.json _original_basename=vip_data.j2 recurse=False state=file path=/etc/puppet/hieradata/vip_data.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:50:47 localhost python3[32409]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:50:47 localhost python3[32427]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/net_ip_map.json _original_basename=net_ip_map.j2 recurse=False state=file path=/etc/puppet/hieradata/net_ip_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:50:47 localhost python3[32489]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:50:48 localhost python3[32507]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/cloud_domain.json _original_basename=cloud_domain.j2 recurse=False state=file path=/etc/puppet/hieradata/cloud_domain.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:50:48 localhost python3[32569]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:50:48 localhost python3[32587]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/fqdn.json _original_basename=fqdn.j2 recurse=False state=file path=/etc/puppet/hieradata/fqdn.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:50:49 localhost python3[32649]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:50:49 localhost python3[32667]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_names.json _original_basename=service_names.j2 recurse=False state=file path=/etc/puppet/hieradata/service_names.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:50:50 localhost python3[32729]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:50:50 localhost python3[32747]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_configs.json _original_basename=service_configs.j2 recurse=False state=file path=/etc/puppet/hieradata/service_configs.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:50:51 localhost python3[32809]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:50:51 localhost python3[32827]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/extraconfig.json _original_basename=extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:50:51 localhost python3[32889]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:50:52 localhost python3[32907]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/role_extraconfig.json _original_basename=role_extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/role_extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:50:52 localhost python3[32969]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:50:53 localhost python3[32987]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json _original_basename=ovn_chassis_mac_map.j2 recurse=False state=file path=/etc/puppet/hieradata/ovn_chassis_mac_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:50:53 localhost python3[33018]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 02:50:54 localhost python3[33066]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:50:54 localhost python3[33084]: ansible-ansible.legacy.file Invoked with owner=root group=root mode=0644 dest=/etc/puppet/hieradata/ansible_managed.json _original_basename=tmp7i1ih93n recurse=False state=file path=/etc/puppet/hieradata/ansible_managed.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:50:57 localhost python3[33114]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 02:51:02 localhost python3[33131]: ansible-ansible.builtin.systemd Invoked with name=iptables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 02:51:02 localhost python3[33149]: ansible-ansible.builtin.systemd Invoked with name=ip6tables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 02:51:03 localhost python3[33167]: ansible-ansible.builtin.systemd Invoked with name=nftables state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 02:51:03 localhost systemd[1]: Reloading. Feb 2 02:51:03 localhost systemd-rc-local-generator[33193]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:51:03 localhost systemd-sysv-generator[33196]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:51:03 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:51:03 localhost systemd[1]: Starting Netfilter Tables... Feb 2 02:51:03 localhost systemd[1]: Finished Netfilter Tables. Feb 2 02:51:04 localhost python3[33256]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/iptables.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:51:04 localhost python3[33299]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/iptables.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018664.1634636-93598-158492285171141/source _original_basename=iptables.nft follow=False checksum=ede9860c99075946a7bc827210247aac639bc84a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:51:05 localhost python3[33329]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/iptables.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:51:06 localhost python3[33347]: ansible-ansible.legacy.command Invoked with _raw_params=nft -j list ruleset _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:51:06 localhost python3[33396]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:51:07 localhost python3[33439]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018666.249468-93845-171170307199002/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:51:07 localhost python3[33501]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-update-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:51:08 localhost python3[33544]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-update-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018667.3451226-93998-209156263536564/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:51:08 localhost python3[33606]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-flushes.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:51:09 localhost python3[33649]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-flushes.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018668.399619-94177-165236087712119/source mode=None follow=False _original_basename=flush-chain.j2 checksum=e8e7b8db0d61a7fe393441cc91613f470eb34a6e backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:51:09 localhost python3[33711]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-chains.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:51:10 localhost python3[33754]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-chains.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018669.3802412-94324-267409789925234/source mode=None follow=False _original_basename=chains.j2 checksum=e60ee651f5014e83924f4e901ecc8e25b1906610 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:51:11 localhost python3[33816]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-rules.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:51:12 localhost python3[33859]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-rules.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018670.2814877-94443-280980722660635/source mode=None follow=False _original_basename=ruleset.j2 checksum=f3487dfc0a90bd6214637cfa4d839c408ea37185 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:51:12 localhost python3[33889]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-chains.nft /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft /etc/nftables/tripleo-jumps.nft | nft -c -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:51:13 localhost python3[33954]: ansible-ansible.builtin.blockinfile Invoked with path=/etc/sysconfig/nftables.conf backup=False validate=nft -c -f %s block=include "/etc/nftables/iptables.nft"#012include "/etc/nftables/tripleo-chains.nft"#012include "/etc/nftables/tripleo-rules.nft"#012include "/etc/nftables/tripleo-jumps.nft"#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK create=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:51:13 localhost python3[33971]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/tripleo-chains.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:51:14 localhost python3[33988]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft | nft -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:51:14 localhost python3[34007]: ansible-file Invoked with mode=0750 path=/var/log/containers/ceilometer setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:14 localhost python3[34023]: ansible-seboolean Invoked with name=virt_sandbox_use_netlink persistent=True state=True ignore_selinux_state=False Feb 2 02:51:15 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=8 res=1 Feb 2 02:51:15 localhost python3[34045]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:16 localhost python3[34061]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/cinder-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:16 localhost python3[34077]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/cinder(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Feb 2 02:51:17 localhost kernel: SELinux: Converting 2717 SID table entries... Feb 2 02:51:17 localhost kernel: SELinux: policy capability network_peer_controls=1 Feb 2 02:51:17 localhost kernel: SELinux: policy capability open_perms=1 Feb 2 02:51:17 localhost kernel: SELinux: policy capability extended_socket_class=1 Feb 2 02:51:17 localhost kernel: SELinux: policy capability always_check_network=0 Feb 2 02:51:17 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Feb 2 02:51:17 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 2 02:51:17 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 2 02:51:17 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=9 res=1 Feb 2 02:51:17 localhost python3[34098]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:18 localhost python3[34114]: ansible-file Invoked with path=/var/lib/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:18 localhost python3[34130]: ansible-file Invoked with path=/var/lib/tripleo-config/ceph state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:51:19 localhost python3[34146]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:19 localhost python3[34162]: ansible-ansible.legacy.dnf Invoked with name=['lvm2'] state=latest allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 02:51:22 localhost python3[34179]: ansible-ansible.legacy.command Invoked with creates=/var/lib/cinder/cinder-volumes _raw_params=dd if=/dev/zero of=/var/lib/cinder/cinder-volumes bs=1 count=0 seek=20480M _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 2 02:51:23 localhost python3[34196]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=exit_code=0#012existing_device=$(losetup -j /var/lib/cinder/cinder-volumes -l -n -O NAME)#012if [[ -z "${existing_device}" ]]; then#012 losetup -f /var/lib/cinder/cinder-volumes --show#012 exit_code=2#012else#012 echo ${existing_device%$'\n'*}#012fi#012exit ${exit_code} _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 2 02:51:23 localhost kernel: loop: module loaded Feb 2 02:51:23 localhost kernel: loop0: detected capacity change from 0 to 41943040 Feb 2 02:51:23 localhost python3[34221]: ansible-community.general.lvg Invoked with pvs=['/dev/loop0'] state=present vg=cinder-volumes pesize=4 pv_options= pvresize=False vg_options= force=False Feb 2 02:51:23 localhost lvm[34225]: PV /dev/loop0 not used. Feb 2 02:51:23 localhost lvm[34227]: PV /dev/loop0 online, VG cinder-volumes is complete. Feb 2 02:51:23 localhost systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Feb 2 02:51:23 localhost lvm[34229]: 0 logical volume(s) in volume group "cinder-volumes" now active Feb 2 02:51:23 localhost systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Feb 2 02:51:24 localhost python3[34277]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/cinder-lvm-losetup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:51:24 localhost python3[34320]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system/cinder-lvm-losetup.service src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018683.9462-95423-141144571073693/source _original_basename=tmpjq15vrm_ follow=False checksum=b96c2f9cc51ddf9c35f8cfb4cbac820751f42aef backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:51:25 localhost python3[34350]: ansible-systemd Invoked with daemon_reload=True enabled=True name=cinder-lvm-losetup daemon_reexec=False scope=system no_block=False state=None force=None masked=None Feb 2 02:51:25 localhost systemd[1]: Reloading. Feb 2 02:51:25 localhost systemd-rc-local-generator[34376]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:51:25 localhost systemd-sysv-generator[34380]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:51:25 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:51:25 localhost systemd[1]: Reloading. Feb 2 02:51:25 localhost systemd-rc-local-generator[34407]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:51:25 localhost systemd-sysv-generator[34411]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:51:25 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:51:26 localhost python3[34439]: ansible-file Invoked with mode=0750 path=/var/log/containers/collectd setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:26 localhost python3[34455]: ansible-file Invoked with mode=0755 path=/var/lib/container-user-scripts/ setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:27 localhost python3[34471]: ansible-file Invoked with mode=0750 path=/var/log/containers/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:27 localhost python3[34487]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:27 localhost python3[34503]: ansible-file Invoked with path=/var/lib/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:28 localhost python3[34519]: ansible-file Invoked with mode=0750 path=/var/log/containers/haproxy setype=var_log_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:28 localhost python3[34535]: ansible-file Invoked with path=/var/lib/haproxy setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:33 localhost python3[34682]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:34 localhost python3[34698]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:34 localhost python3[34714]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:34 localhost python3[34730]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api-cfn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:35 localhost python3[34746]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:35 localhost python3[34762]: ansible-file Invoked with mode=0750 path=/var/log/containers/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:35 localhost python3[34778]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:36 localhost python3[34794]: ansible-file Invoked with path=/var/www setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:36 localhost python3[34810]: ansible-file Invoked with mode=01777 path=/var/tmp/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:37 localhost python3[34858]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/var-tmp-horizon.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:51:37 localhost python3[34901]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/var-tmp-horizon.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018696.769832-96276-107820063844921/source _original_basename=tmp1v10v1eh follow=False checksum=804a78abbf39204f4c8abd5e4269fa10d8cb9df3 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:51:38 localhost python3[34931]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Feb 2 02:51:38 localhost kernel: SELinux: Converting 2721 SID table entries... Feb 2 02:51:38 localhost kernel: SELinux: policy capability network_peer_controls=1 Feb 2 02:51:38 localhost kernel: SELinux: policy capability open_perms=1 Feb 2 02:51:38 localhost kernel: SELinux: policy capability extended_socket_class=1 Feb 2 02:51:38 localhost kernel: SELinux: policy capability always_check_network=0 Feb 2 02:51:38 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Feb 2 02:51:38 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 2 02:51:38 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 2 02:51:39 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=10 res=1 Feb 2 02:51:39 localhost python3[34956]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/target(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Feb 2 02:51:40 localhost kernel: SELinux: Converting 2721 SID table entries... Feb 2 02:51:40 localhost kernel: SELinux: policy capability network_peer_controls=1 Feb 2 02:51:40 localhost kernel: SELinux: policy capability open_perms=1 Feb 2 02:51:40 localhost kernel: SELinux: policy capability extended_socket_class=1 Feb 2 02:51:40 localhost kernel: SELinux: policy capability always_check_network=0 Feb 2 02:51:40 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Feb 2 02:51:40 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 2 02:51:40 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 2 02:51:40 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=11 res=1 Feb 2 02:51:40 localhost python3[34977]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Feb 2 02:51:41 localhost kernel: SELinux: Converting 2721 SID table entries... Feb 2 02:51:41 localhost kernel: SELinux: policy capability network_peer_controls=1 Feb 2 02:51:41 localhost kernel: SELinux: policy capability open_perms=1 Feb 2 02:51:41 localhost kernel: SELinux: policy capability extended_socket_class=1 Feb 2 02:51:41 localhost kernel: SELinux: policy capability always_check_network=0 Feb 2 02:51:41 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Feb 2 02:51:41 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 2 02:51:41 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 2 02:51:41 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=12 res=1 Feb 2 02:51:41 localhost python3[34998]: ansible-file Invoked with path=/etc/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:42 localhost python3[35014]: ansible-file Invoked with path=/etc/target setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:42 localhost python3[35030]: ansible-file Invoked with path=/var/lib/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:42 localhost python3[35046]: ansible-stat Invoked with path=/lib/systemd/system/iscsid.socket follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 02:51:42 localhost python3[35062]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-enabled --quiet iscsi.service _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:51:43 localhost python3[35079]: ansible-ansible.legacy.dnf Invoked with name=['dracut-config-generic'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 02:51:47 localhost python3[35096]: ansible-file Invoked with path=/etc/modules-load.d state=directory mode=493 owner=root group=root setype=etc_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:48 localhost python3[35144]: ansible-ansible.legacy.stat Invoked with path=/etc/modules-load.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:51:48 localhost python3[35187]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018707.8102636-97057-178142963945768/source dest=/etc/modules-load.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-modprobe.conf.j2 checksum=8021efe01721d8fa8cab46b95c00ec1be6dbb9d0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:49 localhost python3[35217]: ansible-systemd Invoked with name=systemd-modules-load.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Feb 2 02:51:50 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 2 02:51:50 localhost systemd[1]: Stopped Load Kernel Modules. Feb 2 02:51:50 localhost systemd[1]: Stopping Load Kernel Modules... Feb 2 02:51:50 localhost systemd[1]: Starting Load Kernel Modules... Feb 2 02:51:50 localhost kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 2 02:51:50 localhost kernel: Bridge firewalling registered Feb 2 02:51:50 localhost systemd-modules-load[35220]: Inserted module 'br_netfilter' Feb 2 02:51:50 localhost systemd-modules-load[35220]: Module 'msr' is built in Feb 2 02:51:50 localhost systemd[1]: Finished Load Kernel Modules. Feb 2 02:51:50 localhost python3[35271]: ansible-ansible.legacy.stat Invoked with path=/etc/sysctl.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:51:51 localhost python3[35314]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018710.3641374-97519-135096674657693/source dest=/etc/sysctl.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-sysctl.conf.j2 checksum=cddb9401fdafaaf28a4a94b98448f98ae93c94c9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:51 localhost python3[35344]: ansible-sysctl Invoked with name=fs.inotify.max_user_instances value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:51 localhost python3[35362]: ansible-sysctl Invoked with name=kernel.pid_max value=1048576 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:52 localhost python3[35380]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-arptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:52 localhost python3[35397]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-ip6tables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:52 localhost python3[35414]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-iptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:53 localhost python3[35431]: ansible-sysctl Invoked with name=net.ipv4.conf.all.rp_filter value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:53 localhost python3[35449]: ansible-sysctl Invoked with name=net.ipv4.ip_forward value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:53 localhost python3[35467]: ansible-sysctl Invoked with name=net.ipv4.ip_local_reserved_ports value=35357,49000-49001 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:55 localhost python3[35485]: ansible-sysctl Invoked with name=net.ipv4.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:56 localhost python3[35503]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh1 value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:56 localhost python3[35521]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh2 value=2048 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:56 localhost python3[35539]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh3 value=4096 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:57 localhost python3[35557]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:57 localhost python3[35574]: ansible-sysctl Invoked with name=net.ipv6.conf.all.forwarding value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:57 localhost python3[35591]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:58 localhost python3[35608]: ansible-sysctl Invoked with name=net.ipv6.conf.lo.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:58 localhost python3[35625]: ansible-sysctl Invoked with name=net.ipv6.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Feb 2 02:51:58 localhost python3[35643]: ansible-systemd Invoked with name=systemd-sysctl.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Feb 2 02:51:58 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 2 02:51:58 localhost systemd[1]: Stopped Apply Kernel Variables. Feb 2 02:51:58 localhost systemd[1]: Stopping Apply Kernel Variables... Feb 2 02:51:58 localhost systemd[1]: Starting Apply Kernel Variables... Feb 2 02:51:58 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 2 02:51:59 localhost systemd[1]: Finished Apply Kernel Variables. Feb 2 02:51:59 localhost python3[35663]: ansible-file Invoked with mode=0750 path=/var/log/containers/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:51:59 localhost python3[35679]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:00 localhost python3[35695]: ansible-stat Invoked with path=/etc/openldap/certs/certs_valid follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 02:52:00 localhost python3[35711]: ansible-stat Invoked with path=/etc/openldap/certs/cert9.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 02:52:00 localhost python3[35727]: ansible-stat Invoked with path=/etc/openldap/certs/key4.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 02:52:01 localhost python3[35743]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:01 localhost python3[35759]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/manila-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:01 localhost python3[35775]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:02 localhost python3[35791]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:02 localhost python3[35807]: ansible-file Invoked with path=/var/lib/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:02 localhost python3[35823]: ansible-file Invoked with mode=0750 path=/var/log/containers/memcached setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:03 localhost python3[35839]: ansible-file Invoked with mode=0750 path=/var/log/containers/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:03 localhost python3[35855]: ansible-file Invoked with path=/var/lib/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:03 localhost python3[35871]: ansible-file Invoked with mode=0750 path=/var/log/containers/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:04 localhost python3[35887]: ansible-file Invoked with path=/var/lib/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:04 localhost python3[35903]: ansible-file Invoked with mode=0750 path=/var/log/mariadb setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:04 localhost python3[35919]: ansible-file Invoked with mode=0750 path=/var/log/containers/neutron setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:05 localhost python3[35935]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/neutron-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:05 localhost python3[35951]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:05 localhost python3[35967]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:06 localhost python3[35983]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:06 localhost python3[35999]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:06 localhost python3[36015]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-metadata setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:07 localhost python3[36031]: ansible-group Invoked with gid=107 name=qemu state=present system=False local=False non_unique=False Feb 2 02:52:07 localhost python3[36053]: ansible-user Invoked with comment=qemu user group=qemu name=qemu shell=/sbin/nologin state=present uid=107 non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005604725.ooo.test update_password=always groups=None home=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Feb 2 02:52:08 localhost python3[36077]: ansible-seboolean Invoked with name=logrotate_read_inside_containers persistent=True state=True ignore_selinux_state=False Feb 2 02:52:08 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=13 res=1 Feb 2 02:52:09 localhost python3[36097]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:09 localhost python3[36113]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:09 localhost python3[36129]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:09 localhost python3[36145]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:10 localhost python3[36193]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/neutron-cleanup follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:52:10 localhost python3[36236]: ansible-ansible.legacy.copy Invoked with dest=/usr/libexec/neutron-cleanup force=True mode=0755 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018730.0884104-99002-105604656389100/source _original_basename=tmpbiyguott follow=False checksum=f9cc7d1e91fbae49caa7e35eb2253bba146a73b4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:52:11 localhost python3[36298]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/neutron-cleanup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:52:11 localhost python3[36341]: ansible-ansible.legacy.copy Invoked with dest=/usr/lib/systemd/system/neutron-cleanup.service force=True src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018731.0556629-99072-21065144870809/source _original_basename=tmp0tfyzumm follow=False checksum=6b6cd9f074903a28d054eb530a10c7235d0c39fc backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:52:12 localhost python3[36371]: ansible-ansible.legacy.systemd Invoked with enabled=True name=neutron-cleanup daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Feb 2 02:52:12 localhost systemd[1]: Reloading. Feb 2 02:52:12 localhost systemd-sysv-generator[36403]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:52:12 localhost systemd-rc-local-generator[36400]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:52:12 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:52:13 localhost python3[36425]: ansible-ansible.builtin.lineinfile Invoked with path=/etc/systemd/logind.conf regexp=^\s*#?\s*HandlePowerKey\s*=.* state=absent backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None line=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:52:13 localhost python3[36441]: ansible-ansible.builtin.lineinfile Invoked with line=HandlePowerKey=ignore path=/etc/systemd/logind.conf regexp=^#?HandlePowerKey state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:52:13 localhost python3[36457]: ansible-ansible.legacy.systemd Invoked with name=systemd-logind state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Feb 2 02:52:13 localhost systemd[1]: Stopping User Login Management... Feb 2 02:52:13 localhost systemd[1]: systemd-logind.service: Deactivated successfully. Feb 2 02:52:13 localhost systemd[1]: Stopped User Login Management. Feb 2 02:52:13 localhost systemd[1]: Starting Load Kernel Module drm... Feb 2 02:52:13 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 2 02:52:13 localhost systemd[1]: Finished Load Kernel Module drm. Feb 2 02:52:13 localhost systemd[1]: Starting User Login Management... Feb 2 02:52:14 localhost systemd-logind[36465]: New seat seat0. Feb 2 02:52:14 localhost systemd-logind[36465]: Watching system buttons on /dev/input/event0 (Power Button) Feb 2 02:52:14 localhost systemd-logind[36465]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 2 02:52:14 localhost systemd[1]: Started User Login Management. Feb 2 02:52:14 localhost systemd-logind[36465]: New session 15 of user tripleo-admin. Feb 2 02:52:14 localhost systemd-logind[36465]: New session 14 of user zuul. Feb 2 02:52:14 localhost python3[36481]: ansible-file Invoked with mode=0750 path=/var/log/containers/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:14 localhost python3[36497]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:15 localhost python3[36513]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/rabbitmq(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Feb 2 02:52:16 localhost kernel: SELinux: Converting 2721 SID table entries... Feb 2 02:52:16 localhost kernel: SELinux: policy capability network_peer_controls=1 Feb 2 02:52:16 localhost kernel: SELinux: policy capability open_perms=1 Feb 2 02:52:16 localhost kernel: SELinux: policy capability extended_socket_class=1 Feb 2 02:52:16 localhost kernel: SELinux: policy capability always_check_network=0 Feb 2 02:52:16 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Feb 2 02:52:16 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 2 02:52:16 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 2 02:52:16 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=14 res=1 Feb 2 02:52:16 localhost python3[36535]: ansible-file Invoked with path=/var/lib/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:17 localhost python3[36551]: ansible-file Invoked with mode=0750 path=/var/log/containers/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:17 localhost python3[36567]: ansible-ansible.legacy.command Invoked with _raw_params=echo 'export ERL_EPMD_ADDRESS=127.0.0.1' > /etc/rabbitmq/rabbitmq-env.conf#012echo 'export ERL_EPMD_PORT=4370' >> /etc/rabbitmq/rabbitmq-env.conf#012for pid in $(pgrep epmd --ns 1 --nslist pid); do kill $pid; done#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:52:18 localhost python3[36585]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 02:52:21 localhost python3[36602]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_interfaces'] gather_timeout=10 fact_path=/etc/ansible/facts.d Feb 2 02:52:22 localhost python3[36663]: ansible-file Invoked with path=/etc/containers/networks state=directory recurse=True mode=493 owner=root group=root force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:52:22 localhost python3[36679]: ansible-ansible.legacy.command Invoked with _raw_params=podman network inspect podman#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:52:22 localhost systemd[26472]: Created slice User Background Tasks Slice. Feb 2 02:52:22 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 02:52:22 localhost systemd[26472]: Starting Cleanup of User's Temporary Files and Directories... Feb 2 02:52:22 localhost systemd[26472]: Finished Cleanup of User's Temporary Files and Directories. Feb 2 02:52:23 localhost python3[36740]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/networks/podman.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:52:23 localhost python3[36783]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018742.741869-99986-117838287439513/source dest=/etc/containers/networks/podman.json mode=0644 owner=root group=root follow=False _original_basename=podman_network_config.j2 checksum=916bec36d88059f42c93714149950ee35127dac3 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:52:24 localhost python3[36845]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/registries.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:52:24 localhost python3[36890]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018743.7559242-100050-68818614498378/source dest=/etc/containers/registries.conf owner=root group=root setype=etc_t mode=0644 follow=False _original_basename=registries.conf.j2 checksum=710a00cfb11a4c3eba9c028ef1984a9fea9ba83a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:25 localhost python3[36920]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=containers option=pids_limit value=4096 backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:25 localhost python3[36936]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=events_logger value="journald" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:25 localhost python3[36952]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=runtime value="crun" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:25 localhost python3[36968]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=network option=network_backend value="netavark" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:26 localhost python3[37016]: ansible-ansible.legacy.stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:52:27 localhost python3[37059]: ansible-ansible.legacy.copy Invoked with dest=/etc/sysconfig/podman_drop_in src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018746.3470294-100227-131811952139117/source _original_basename=tmpmon9whag follow=False checksum=0bfbc70e9a4740c9004b9947da681f723d529c83 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:52:27 localhost python3[37089]: ansible-file Invoked with path=/var/lib/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:27 localhost python3[37105]: ansible-file Invoked with mode=0750 path=/var/log/containers/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:28 localhost python3[37121]: ansible-file Invoked with path=/run/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:28 localhost python3[37169]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/run-redis.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:52:29 localhost python3[37212]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/run-redis.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018748.3515613-100373-127557741267518/source _original_basename=tmpt3n_zs08 follow=False checksum=07018f7099c8edadf6a52c86069ae4e2a9407b28 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:52:29 localhost python3[37242]: ansible-file Invoked with mode=0750 path=/var/log/containers/rsyslog setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:29 localhost python3[37258]: ansible-file Invoked with path=/var/lib/rsyslog.container setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:30 localhost python3[37274]: ansible-ansible.legacy.dnf Invoked with name=['openssh-server'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 02:52:34 localhost python3[37323]: ansible-ansible.legacy.stat Invoked with path=/etc/ssh/sshd_config follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:52:34 localhost python3[37368]: ansible-ansible.legacy.copy Invoked with dest=/etc/ssh/sshd_config src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018753.871224-100888-68688478792519/source validate=/usr/sbin/sshd -T -f %s mode=None follow=False _original_basename=sshd_config_block.j2 checksum=92fbff64c26224c12f8a576f9ce1a758767bd467 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:52:35 localhost python3[37399]: ansible-systemd Invoked with name=sshd state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 02:52:35 localhost systemd[1]: Stopping OpenSSH server daemon... Feb 2 02:52:35 localhost systemd[1]: sshd.service: Deactivated successfully. Feb 2 02:52:35 localhost systemd[1]: Stopped OpenSSH server daemon. Feb 2 02:52:35 localhost systemd[1]: Stopped target sshd-keygen.target. Feb 2 02:52:35 localhost systemd[1]: Stopping sshd-keygen.target... Feb 2 02:52:35 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 2 02:52:35 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 2 02:52:35 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 2 02:52:35 localhost systemd[1]: Reached target sshd-keygen.target. Feb 2 02:52:35 localhost systemd[1]: Starting OpenSSH server daemon... Feb 2 02:52:35 localhost sshd[37403]: main: sshd: ssh-rsa algorithm is disabled Feb 2 02:52:35 localhost systemd[1]: Started OpenSSH server daemon. Feb 2 02:52:35 localhost python3[37419]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:36 localhost python3[37435]: ansible-file Invoked with path=/var/log/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:36 localhost python3[37451]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:36 localhost python3[37467]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:37 localhost python3[37483]: ansible-file Invoked with path=/var/cache/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:37 localhost python3[37499]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:52:37 localhost python3[37515]: ansible-file Invoked with path=/srv/node/d1 state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:52:38 localhost python3[37531]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:52:39 localhost python3[37549]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:52:40 localhost python3[37567]: ansible-ansible.legacy.dnf Invoked with name=['chrony'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 02:52:43 localhost python3[37616]: ansible-ansible.legacy.stat Invoked with path=/etc/chrony.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:52:44 localhost python3[37661]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018763.4285927-101429-254560006554522/source dest=/etc/chrony.conf owner=root group=root mode=420 follow=False _original_basename=chrony.conf.j2 checksum=4fd4fbbb2de00c70a54478b7feb8ef8adf6a3362 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:52:45 localhost python3[37691]: ansible-ansible.legacy.systemd Invoked with enabled=True name=chronyd state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 02:52:45 localhost python3[37709]: ansible-ansible.legacy.systemd Invoked with name=chronyd state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Feb 2 02:52:45 localhost chronyd[765]: chronyd exiting Feb 2 02:52:45 localhost systemd[1]: Stopping NTP client/server... Feb 2 02:52:45 localhost systemd[1]: chronyd.service: Deactivated successfully. Feb 2 02:52:45 localhost systemd[1]: Stopped NTP client/server. Feb 2 02:52:45 localhost systemd[1]: chronyd.service: Consumed 119ms CPU time, read 1.9M from disk, written 0B to disk. Feb 2 02:52:45 localhost systemd[1]: Starting NTP client/server... Feb 2 02:52:45 localhost chronyd[37716]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Feb 2 02:52:45 localhost chronyd[37716]: Frequency -30.150 +/- 0.049 ppm read from /var/lib/chrony/drift Feb 2 02:52:45 localhost chronyd[37716]: Loaded seccomp filter (level 2) Feb 2 02:52:45 localhost systemd[1]: Started NTP client/server. Feb 2 02:52:46 localhost python3[37765]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/chrony-online.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:52:46 localhost python3[37808]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018765.9096897-101620-264029834257350/source dest=/etc/systemd/system/chrony-online.service _original_basename=chrony-online.service follow=False checksum=d4d85e046d61f558ac7ec8178c6d529d893e81e1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:52:47 localhost python3[37838]: ansible-systemd Invoked with state=started name=chrony-online.service enabled=True daemon-reload=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 02:52:47 localhost systemd[1]: Reloading. Feb 2 02:52:47 localhost systemd-rc-local-generator[37861]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:52:47 localhost systemd-sysv-generator[37865]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:52:47 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:52:47 localhost systemd[1]: Reloading. Feb 2 02:52:47 localhost systemd-sysv-generator[37901]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:52:47 localhost systemd-rc-local-generator[37898]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:52:47 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:52:47 localhost systemd[1]: Starting chronyd online sources service... Feb 2 02:52:47 localhost chronyc[37913]: 200 OK Feb 2 02:52:47 localhost systemd[1]: chrony-online.service: Deactivated successfully. Feb 2 02:52:47 localhost systemd[1]: Finished chronyd online sources service. Feb 2 02:52:47 localhost python3[37929]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:52:48 localhost chronyd[37716]: System clock was stepped by -0.000000 seconds Feb 2 02:52:48 localhost python3[37946]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:52:49 localhost chronyd[37716]: Selected source 23.133.168.245 (pool.ntp.org) Feb 2 02:52:58 localhost python3[37963]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:52:58 localhost chronyd[37716]: System clock was stepped by -0.000004 seconds Feb 2 02:52:59 localhost python3[37980]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:52:59 localhost python3[37997]: ansible-timezone Invoked with name=UTC hwclock=None Feb 2 02:52:59 localhost systemd[1]: Starting Time & Date Service... Feb 2 02:52:59 localhost systemd[1]: Started Time & Date Service. Feb 2 02:53:00 localhost python3[38017]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:53:01 localhost python3[38034]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:53:02 localhost python3[38051]: ansible-slurp Invoked with src=/etc/tuned/active_profile Feb 2 02:53:02 localhost python3[38067]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 02:53:03 localhost python3[38083]: ansible-file Invoked with path=/var/log/containers state=directory setype=container_file_t selevel=s0 mode=488 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Feb 2 02:53:04 localhost python3[38099]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None setype=None attributes=None Feb 2 02:53:04 localhost python3[38115]: ansible-file Invoked with path=/var/lib/tripleo-config state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Feb 2 02:53:04 localhost python3[38131]: ansible-file Invoked with path=/var/lib/container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:53:05 localhost python3[38147]: ansible-file Invoked with path=/var/lib/docker-container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:53:05 localhost python3[38163]: ansible-community.general.sefcontext Invoked with target=/var/lib/container-config-scripts(/.*)? setype=container_file_t state=present ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Feb 2 02:53:06 localhost kernel: SELinux: Converting 2723 SID table entries... Feb 2 02:53:06 localhost kernel: SELinux: policy capability network_peer_controls=1 Feb 2 02:53:06 localhost kernel: SELinux: policy capability open_perms=1 Feb 2 02:53:06 localhost kernel: SELinux: policy capability extended_socket_class=1 Feb 2 02:53:06 localhost kernel: SELinux: policy capability always_check_network=0 Feb 2 02:53:06 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Feb 2 02:53:06 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 2 02:53:06 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 2 02:53:06 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=15 res=1 Feb 2 02:53:07 localhost python3[38185]: ansible-file Invoked with path=/var/lib/container-config-scripts state=directory setype=container_file_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 02:53:09 localhost python3[38322]: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-config/container-startup-config config_data={'step_0':********@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'egQUHP9AWZ8pgpaKI5POCQGwX', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, 'mysql_data_ownership': {'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, 'rabbitmq_bootstrap': {'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, 'redis_tls_proxy': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}}, 'step_2': {'cinder_api_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, 'cinder_scheduler_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, 'clustercheck': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, 'glance_init_logs': {'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']}, 'heat_init_log': {'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']}, 'horizon_fix_perms': {'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard']}, 'keystone_init_log': {'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']}, 'manila_init_logs': {'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, 'mysql_wait_bundle': {'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/ Feb 2 02:53:09 localhost rsyslogd[758]: message too long (84240) with configured size 8096, begin of message is: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-c [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Feb 2 02:53:09 localhost python3[38338]: ansible-file Invoked with path=/var/lib/kolla/config_files state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Feb 2 02:53:09 localhost python3[38354]: ansible-file Invoked with path=/var/lib/config-data mode=493 state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Feb 2 02:53:10 localhost python3[38370]: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/config_files/ceilometer_agent_central.json': {'command': '/usr/bin/ceilometer-polling --polling-namespaces central --logfile /var/log/ceilometer/central.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_gnocchi_upgrade.json': {'command': "/usr/bin/bootstrap_host_exec ceilometer_agent_central su ceilometer -s /bin/bash -c 'for n in {1..10}; do /usr/bin/ceilometer-upgrade && exit 0 || sleep 30; done; exit 1'", 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_notification.json': {'command': '/usr/bin/ceilometer-agent-notification --logfile /var/log/ceilometer/agent-notification.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/cinder_api.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}]}, '/var/lib/kolla/config_files/cinder_api_db_sync.json': {'command': "/usr/bin/bootstrap_host_exec cinder_api su cinder -s /bin/bash -c 'cinder-manage db sync --bump-versions'", 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_backup.json': {'command': '/usr/bin/cinder-backup --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_scheduler.json': {'command': '/usr/bin/cinder-scheduler --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_volume.json': {'command': '/usr/bin/cinder-volume --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/clustercheck.json': {'command': 'bash -c $* -- eval source /etc/sysconfig/clustercheck; exec socat -T"${TRIPLEO_HEALTHCHECK_TIMEOUT:-2}" "$TRIPLEO_SOCAT_BIND" system:"grep -qPe \\"^\\\\r\\$\\" && /usr/bin/clustercheck"', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/collectd.json': {'command': '/usr/sbin/collectd -f', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/collectd.d'}], 'permissions': [{'owner': 'collectd:collectd', 'path': '/var/log/collectd', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/scripts', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/config-scripts', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api.json': {'command': '/usr/bin/glance-api --config-file /usr/share/glance/glance-api-dist.conf --config-file /etc/glance/glance-api.conf --config-file /etc/glance/glance-image-import.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/lib/glance', 'recurse': True}, {'owner': 'glance:glance', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}]}, '/var/lib/kolla/config_files/glance_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/log/glance', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api_tls_proxy.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modul Feb 2 02:53:10 localhost rsyslogd[758]: message too long (37330) with configured size 8096, begin of message is: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/conf [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Feb 2 02:53:17 localhost python3[38386]: ansible-stat Invoked with path=/etc/ipa/default.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 02:53:20 localhost python3[38402]: ansible-ipaclient_test Invoked with domain=ooo.test servers=['ipa.ooo.test'] hostname=np0005604725.ooo.test no_ntp=False force_ntpd=False no_nisdomain=False kinit_attempts=5 configure_firefox=False all_ip_addresses=False on_master=False enable_dns_updates=False realm=None ntp_servers=None ntp_pool=None nisdomain=None ca_cert_files=None firefox_dir=None ip_addresses=None Feb 2 02:53:20 localhost python3[38424]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:53:21 localhost python3[38440]: ansible-ipaclient_setup_ntp Invoked with ntp_servers=[''] ntp_pool= no_ntp=False on_master=False servers=['ipa.ooo.test'] domain=ooo.test Feb 2 02:53:21 localhost systemd[1]: Reloading. Feb 2 02:53:21 localhost systemd-rc-local-generator[38472]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:53:21 localhost systemd-sysv-generator[38477]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:53:21 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:53:21 localhost systemd[1]: Stopping NTP client/server... Feb 2 02:53:21 localhost chronyd[37716]: chronyd exiting Feb 2 02:53:21 localhost systemd[1]: chronyd.service: Deactivated successfully. Feb 2 02:53:21 localhost systemd[1]: Stopped NTP client/server. Feb 2 02:53:21 localhost systemd[1]: Starting NTP client/server... Feb 2 02:53:21 localhost chronyd[38491]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Feb 2 02:53:21 localhost chronyd[38491]: Frequency -30.150 +/- 0.049 ppm read from /var/lib/chrony/drift Feb 2 02:53:21 localhost chronyd[38491]: Loaded seccomp filter (level 2) Feb 2 02:53:21 localhost systemd[1]: Started NTP client/server. Feb 2 02:53:26 localhost chronyd[38491]: Selected source 162.159.200.123 (pool.ntp.org) Feb 2 02:53:28 localhost python3[38510]: ansible-ipaclient_test_keytab Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005604725.ooo.test kdc=ipa.ooo.test kinit_attempts=5 Feb 2 02:53:29 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Feb 2 02:53:30 localhost python3[38533]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r "OOO.TEST"#012 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:53:31 localhost python3[38550]: ansible-ipaclient_set_hostname Invoked with hostname=np0005604725.ooo.test Feb 2 02:53:31 localhost systemd[1]: Starting Hostname Service... Feb 2 02:53:31 localhost systemd[1]: Started Hostname Service. Feb 2 02:53:31 localhost python3[38569]: ansible-ipaclient_temp_krb5 Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005604725.ooo.test kdc=ipa.ooo.test on_master=False Feb 2 02:53:32 localhost python3[38590]: ansible-ipaclient_join Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005604725.ooo.test force_join=False password=NOT_LOGGING_PARAMETER kinit_attempts=5 krb_name=/tmp/tmpz_bsah0h principal=None keytab=None admin_keytab=None ca_cert_file=None debug=None Feb 2 02:53:33 localhost python3[38590]: ansible-ipaclient_join Enrolled in IPA realm OOO.TEST Feb 2 02:53:34 localhost python3[38611]: ansible-ipaclient_ipa_conf Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005604725.ooo.test basedn=dc=ooo,dc=test Feb 2 02:53:34 localhost python3[38628]: ansible-ipaclient_setup_sssd Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005604725.ooo.test on_master=False no_ssh=False no_sshd=False no_sudo=False all_ip_addresses=False fixed_primary=False permit=False enable_dns_updates=False preserve_sssd=False no_krb5_offline_passwords=False Feb 2 02:53:34 localhost systemd-journald[617]: Field hash table of /run/log/journal/48447b9b8976f23a3b4b319f2b01dfe5/system.journal has a fill level at 76.0 (253 of 333 items), suggesting rotation. Feb 2 02:53:34 localhost systemd-journald[617]: /run/log/journal/48447b9b8976f23a3b4b319f2b01dfe5/system.journal: Journal header limits reached or header out-of-date, rotating. Feb 2 02:53:34 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Feb 2 02:53:34 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Feb 2 02:53:35 localhost python3[38646]: ansible-ipaclient_api Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST hostname=np0005604725.ooo.test krb_name=/tmp/tmpz_bsah0h debug=False Feb 2 02:53:38 localhost python3[38675]: ansible-ipaclient_setup_nss Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005604725.ooo.test subject_base=O=OOO.TEST principal=admin mkhomedir=False ca_enabled=True on_master=False dnsok=False enable_dns_updates=False all_ip_addresses=False request_cert=False preserve_sssd=False no_ssh=False no_sshd=False no_sudo=False fixed_primary=False permit=False no_krb5_offline_passwords=False no_dns_sshfp=False nosssd_files={} krb_name=/tmp/tmpz_bsah0h ip_addresses=None Feb 2 02:53:41 localhost systemd[1]: Starting System Security Services Daemon... Feb 2 02:53:41 localhost sssd[38710]: Starting up Feb 2 02:53:41 localhost sssd_be[38711]: Starting up Feb 2 02:53:41 localhost sssd_ssh[38714]: Starting up Feb 2 02:53:41 localhost sssd_pam[38713]: Starting up Feb 2 02:53:41 localhost sssd_nss[38712]: Starting up Feb 2 02:53:41 localhost sssd_sudo[38715]: Starting up Feb 2 02:53:41 localhost sssd_pac[38716]: Starting up Feb 2 02:53:41 localhost systemd[1]: Started System Security Services Daemon. Feb 2 02:53:41 localhost systemd[1]: Reloading. Feb 2 02:53:42 localhost systemd-rc-local-generator[38744]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:53:42 localhost systemd-sysv-generator[38748]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:53:42 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:53:43 localhost python3[38771]: ansible-ipaclient_setup_ssh Invoked with servers=['ipa.ooo.test'] sssd=True no_ssh=False ssh_trust_dns=False no_sshd=False Feb 2 02:53:43 localhost systemd[1]: Stopping OpenSSH server daemon... Feb 2 02:53:43 localhost systemd[1]: sshd.service: Deactivated successfully. Feb 2 02:53:43 localhost systemd[1]: Stopped OpenSSH server daemon. Feb 2 02:53:43 localhost systemd[1]: Stopped target sshd-keygen.target. Feb 2 02:53:43 localhost systemd[1]: Stopping sshd-keygen.target... Feb 2 02:53:43 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 2 02:53:43 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 2 02:53:43 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 2 02:53:43 localhost systemd[1]: Reached target sshd-keygen.target. Feb 2 02:53:43 localhost systemd[1]: Starting OpenSSH server daemon... Feb 2 02:53:43 localhost sshd[38776]: main: sshd: ssh-rsa algorithm is disabled Feb 2 02:53:43 localhost systemd[1]: Started OpenSSH server daemon. Feb 2 02:53:44 localhost python3[38793]: ansible-ipaclient_setup_automount Invoked with servers=['ipa.ooo.test'] sssd=True automount_location=None Feb 2 02:53:45 localhost python3[38810]: ansible-ipaclient_setup_nis Invoked with domain=ooo.test nisdomain=None Feb 2 02:53:45 localhost systemd[1]: Reloading. Feb 2 02:53:45 localhost systemd-rc-local-generator[38835]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:53:45 localhost systemd-sysv-generator[38839]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:53:45 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:53:45 localhost systemd[1]: nis-domainname.service: Deactivated successfully. Feb 2 02:53:45 localhost systemd[1]: Stopped Read and set NIS domainname from /etc/sysconfig/network. Feb 2 02:53:45 localhost systemd[1]: Stopping Read and set NIS domainname from /etc/sysconfig/network... Feb 2 02:53:45 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Feb 2 02:53:45 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Feb 2 02:53:46 localhost python3[38869]: ansible-ansible.builtin.file Invoked with path=/tmp/tmpz_bsah0h state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:53:46 localhost python3[38885]: ansible-ipaclient_setup_krb5 Invoked with realm=OOO.TEST domain=ooo.test servers=['ipa.ooo.test'] kdc=ipa.ooo.test dnsok=False client_domain=ooo.test hostname=np0005604725.ooo.test sssd=True force=True Feb 2 02:53:47 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:33:b6:81 MACPROTO=0800 SRC=52.90.120.137 DST=38.102.83.200 LEN=52 TOS=0x00 PREC=0x00 TTL=53 ID=14088 PROTO=TCP SPT=52390 DPT=9090 SEQ=3919052279 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40103030801010402) Feb 2 02:53:47 localhost python3[38906]: ansible-ipaclient_setup_certmonger Invoked with realm=OOO.TEST hostname=np0005604725.ooo.test subject_base=O=OOO.TEST ca_enabled=True request_cert=False Feb 2 02:53:48 localhost python3[38925]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:53:48 localhost python3[38941]: ansible-ansible.builtin.file Invoked with path=/tmp/tmpz_bsah0h state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:53:48 localhost python3[38957]: ansible-ansible.builtin.file Invoked with path=/tmp/tmpz_bsah0h.ipabkp state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:53:49 localhost python3[38973]: ansible-systemd Invoked with daemon_reload=True name=certmonger.service state=restarted daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Feb 2 02:53:49 localhost systemd[1]: Reloading. Feb 2 02:53:49 localhost systemd-sysv-generator[39001]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:53:49 localhost systemd-rc-local-generator[38996]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:53:49 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:53:49 localhost systemd[1]: Starting Certificate monitoring and PKI enrollment... Feb 2 02:53:49 localhost certmonger[39011]: 2026-02-02 07:53:49 [39011] Changing to root directory. Feb 2 02:53:49 localhost certmonger[39011]: 2026-02-02 07:53:49 [39011] Obtaining system lock. Feb 2 02:53:49 localhost systemd[1]: Started Certificate monitoring and PKI enrollment. Feb 2 02:53:49 localhost certmonger[39012]: 2026-02-02 07:53:49 [39012] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Feb 2 02:53:49 localhost certmonger[39013]: 2026-02-02 07:53:49 [39013] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Feb 2 02:53:49 localhost certmonger[39014]: 2026-02-02 07:53:49 [39014] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Feb 2 02:53:49 localhost certmonger[39015]: 2026-02-02 07:53:49 [39015] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Feb 2 02:53:49 localhost certmonger[39016]: 2026-02-02 07:53:49 [39016] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Feb 2 02:53:49 localhost certmonger[39017]: 2026-02-02 07:53:49 [39017] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Feb 2 02:53:49 localhost certmonger[39018]: 2026-02-02 07:53:49 [39018] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Feb 2 02:53:49 localhost certmonger[39019]: 2026-02-02 07:53:49 [39019] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Feb 2 02:53:49 localhost certmonger[39020]: 2026-02-02 07:53:49 [39020] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Feb 2 02:53:49 localhost certmonger[39021]: 2026-02-02 07:53:49 [39021] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Feb 2 02:53:49 localhost certmonger[39022]: 2026-02-02 07:53:49 [39022] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Feb 2 02:53:49 localhost certmonger[39023]: 2026-02-02 07:53:49 [39023] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Feb 2 02:53:49 localhost certmonger[39024]: 2026-02-02 07:53:49 [39024] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Feb 2 02:53:49 localhost certmonger[39025]: 2026-02-02 07:53:49 [39025] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Feb 2 02:53:49 localhost certmonger[39026]: 2026-02-02 07:53:49 [39026] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Feb 2 02:53:49 localhost certmonger[39027]: 2026-02-02 07:53:49 [39027] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Feb 2 02:53:49 localhost certmonger[39028]: 2026-02-02 07:53:49 [39028] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Feb 2 02:53:49 localhost certmonger[39029]: 2026-02-02 07:53:49 [39029] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Feb 2 02:53:49 localhost certmonger[39030]: 2026-02-02 07:53:49 [39030] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Feb 2 02:53:49 localhost certmonger[39031]: 2026-02-02 07:53:49 [39031] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Feb 2 02:53:49 localhost certmonger[39032]: 2026-02-02 07:53:49 [39032] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Feb 2 02:53:49 localhost certmonger[39033]: 2026-02-02 07:53:49 [39033] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Feb 2 02:53:49 localhost certmonger[39034]: 2026-02-02 07:53:49 [39034] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Feb 2 02:53:49 localhost certmonger[39035]: 2026-02-02 07:53:49 [39035] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Feb 2 02:53:50 localhost certmonger[39011]: 2026-02-02 07:53:50 [39011] No hooks set for ca-pre-save command. Feb 2 02:53:50 localhost certmonger[39011]: 2026-02-02 07:53:50 [39011] No hooks set for ca-post-save command. Feb 2 02:53:50 localhost certmonger[39038]: 2026-02-02 07:53:50 [39038] Certificate "OOO.TEST IPA CA" valid for 631151026s. Feb 2 02:53:50 localhost certmonger[39011]: 2026-02-02 07:53:50 [39011] No hooks set for ca-pre-save command. Feb 2 02:53:50 localhost certmonger[39011]: 2026-02-02 07:53:50 [39011] No hooks set for ca-post-save command. Feb 2 02:53:50 localhost certmonger[39041]: 2026-02-02 07:53:50 [39041] Certificate "Local Signing Authority" valid for 31535999s. Feb 2 02:53:59 localhost python3[39089]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/config_step.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 02:54:00 localhost python3[39132]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/config_step.json force=True mode=0600 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770018839.2567205-105011-221018076743479/source _original_basename=tmp1xp4p4tp follow=False checksum=dfdcc7695edd230e7a2c06fc7b739bfa56506d8f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:54:00 localhost python3[39162]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 02:54:01 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 2 02:54:02 localhost python3[39287]: ansible-file Invoked with path=/var/lib/container-puppet state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Feb 2 02:54:04 localhost python3[39408]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Feb 2 02:54:06 localhost python3[39424]: ansible-file Invoked with path=/etc/pki/tls/certs/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Feb 2 02:54:06 localhost python3[39440]: ansible-file Invoked with path=/etc/pki/tls/private/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Feb 2 02:54:07 localhost python3[39456]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 02:54:08 localhost python3[39476]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 02:54:11 localhost python3[39493]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 02:54:15 localhost python3[39510]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:54:15 localhost python3[39526]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 02:54:16 localhost python3[39542]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 02:54:17 localhost systemd[1]: Reloading. Feb 2 02:54:17 localhost systemd-rc-local-generator[39571]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 02:54:17 localhost systemd-sysv-generator[39576]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 02:54:17 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 02:54:17 localhost python3[39596]: ansible-certificate_request Invoked with name=httpd-ctlplane dns=['np0005604725.ctlplane.ooo.test'] principal=['HTTP/np0005604725.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-ctlplane.crt /etc/pki/tls/certs/httpd/httpd-ctlplane.crt#012cp /etc/pki/tls/private/httpd-ctlplane.key /etc/pki/tls/private/httpd/httpd-ctlplane.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39606]: 2026-02-02 07:54:18 [39606] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.ctlplane.ooo.test" for child. Feb 2 02:54:18 localhost certmonger[39606]: 2026-02-02 07:54:18 [39606] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.ctlplane.ooo.test Feb 2 02:54:18 localhost certmonger[39606]: " for child. Feb 2 02:54:18 localhost certmonger[39606]: 2026-02-02 07:54:18 [39606] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005604725.ctlplane.ooo.test@OOO.TEST Feb 2 02:54:18 localhost certmonger[39606]: " for child. Feb 2 02:54:18 localhost certmonger[39606]: 2026-02-02 07:54:18 [39606] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 02:54:18 localhost certmonger[39606]: 2026-02-02 07:54:18 [39606] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 02:54:18 localhost certmonger[39606]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NjA0NzI1LmN0bHBsYW5lLm9v Feb 2 02:54:18 localhost certmonger[39606]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0dQeIrf6ltVQ Feb 2 02:54:18 localhost certmonger[39606]: thrfdFroxAvlxPEO6FxEXEMm2LkOI1pDxiuKMRuYtN5sZlIB4KZxiLimKuA4z3rK Feb 2 02:54:18 localhost certmonger[39606]: Jqo29HMfjv/NIrEXCLb8OjESl88SZSOkUPT7/XBGME0UauhVVy5Ec1zTDeK+o0/T Feb 2 02:54:18 localhost certmonger[39606]: IbZSOj+Cd/Peq8nNp7i3oyiaVQ5taGuHHNOptztK9fYaQ6VrADL11Ocifj997PNy Feb 2 02:54:18 localhost certmonger[39606]: 655rb+1+583FpuMIUXlBD0T0RDGHdL3tHByN05U5uiDwLBuPxFiF37ksShAsQJWE Feb 2 02:54:18 localhost certmonger[39606]: D1/Ob8Q2tjO/TPrT4Qrj6m0xvkhFJAziqfK/IL9TJ9T6qLBFemzQ7MZrhmtGY/jZ Feb 2 02:54:18 localhost certmonger[39606]: 7BLF3NaZFwIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAyADAA Feb 2 02:54:18 localhost certmonger[39606]: MgAwADcANQA0ADEAODCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Feb 2 02:54:18 localhost certmonger[39606]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU2MDQ3MjUuY3RscGxhbmUub29vLnRlc3Sg Feb 2 02:54:18 localhost certmonger[39606]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTYwNDcyNS5jdGxwbGFuZS5vb28u Feb 2 02:54:18 localhost certmonger[39606]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Feb 2 02:54:18 localhost certmonger[39606]: oSgwJhsESFRUUBsebnAwMDA1NjA0NzI1LmN0bHBsYW5lLm9vby50ZXN0MB0GA1Ud Feb 2 02:54:18 localhost certmonger[39606]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Feb 2 02:54:18 localhost certmonger[39606]: BBRWt0WK4xjNdlOIEvLLneQyXN4hazANBgkqhkiG9w0BAQsFAAOCAQEAHxK0BgDI Feb 2 02:54:18 localhost certmonger[39606]: s8o48czBYa7T2R9elUDaLJC6GOupFRdXsJJJz/CJoVhfvAIVYokHfhk3WiDUH0qp Feb 2 02:54:18 localhost certmonger[39606]: P8tn3bbBiyGD4cnsiwjmuoDCN/nhxCVkRvlLor8WzOcqTp3nY+ZNqsAO0m1Ggrxd Feb 2 02:54:18 localhost certmonger[39606]: DU1iD3mL6leeFgoQrw9qcMRzIXza93pUtrRd3yGBEVpNtpL9lNSMs126vL6qrhpZ Feb 2 02:54:18 localhost certmonger[39606]: m5Rmf+ci6dqO+Jt/OsXAcCiTG48IiWzhYqSO2NoE4kYfcguQrk4VJ41a7xUUhUzn Feb 2 02:54:18 localhost certmonger[39606]: 7lRNf2XAf53o4eqbjmIgqAxdnhOsFttvwNXd3tTtPqpYYQbcbizuMLAeV18Bp/EE Feb 2 02:54:18 localhost certmonger[39606]: 7zHhGYI2zaPZOQ== Feb 2 02:54:18 localhost certmonger[39606]: -----END CERTIFICATE REQUEST----- Feb 2 02:54:18 localhost certmonger[39606]: " for child. Feb 2 02:54:18 localhost certmonger[39606]: 2026-02-02 07:54:18 [39606] Setting "CERTMONGER_SPKAC" to "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" for child. Feb 2 02:54:18 localhost certmonger[39606]: 2026-02-02 07:54:18 [39606] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0dQeIrf6ltVQthrfdFroxAvlxPEO6FxEXEMm2LkOI1pDxiuKMRuYtN5sZlIB4KZxiLimKuA4z3rKJqo29HMfjv/NIrEXCLb8OjESl88SZSOkUPT7/XBGME0UauhVVy5Ec1zTDeK+o0/TIbZSOj+Cd/Peq8nNp7i3oyiaVQ5taGuHHNOptztK9fYaQ6VrADL11Ocifj997PNy655rb+1+583FpuMIUXlBD0T0RDGHdL3tHByN05U5uiDwLBuPxFiF37ksShAsQJWED1/Ob8Q2tjO/TPrT4Qrj6m0xvkhFJAziqfK/IL9TJ9T6qLBFemzQ7MZrhmtGY/jZ7BLF3NaZFwIDAQAB" for child. Feb 2 02:54:18 localhost certmonger[39606]: 2026-02-02 07:54:18 [39606] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 02:54:18 localhost certmonger[39606]: 2026-02-02 07:54:18 [39606] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 02:54:18 localhost certmonger[39606]: 2026-02-02 07:54:18 [39606] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 02:54:18 localhost certmonger[39606]: 2026-02-02 07:54:18 [39606] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 02:54:18 localhost certmonger[39606]: 2026-02-02 07:54:18 [39606] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39606]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 02:54:18 localhost certmonger[39606]: Certificate: "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" Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Certificate submission still ongoing. Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Certificate submission attempt complete. Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Child status = 0. Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Child output: Feb 2 02:54:18 localhost certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 02:54:18 localhost certmonger[39011]: MIIFWDCCA8CgAwIBAgIQUo8wsfpvrcHvwnGfGjxPLjANBgkqhkiG9w0BAQsFADAz Feb 2 02:54:18 localhost certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 02:54:18 localhost certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTQxOFoXDTI4MDIwMzA3NTQxOFowPDERMA8GA1UECgwI Feb 2 02:54:18 localhost certmonger[39011]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTYwNDcyNS5jdGxwbGFuZS5vb28udGVz Feb 2 02:54:18 localhost certmonger[39011]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANHUHiK3+pbVULYa33Ra Feb 2 02:54:18 localhost certmonger[39011]: 6MQL5cTxDuhcRFxDJti5DiNaQ8YrijEbmLTebGZSAeCmcYi4pirgOM96yiaqNvRz Feb 2 02:54:18 localhost certmonger[39011]: H47/zSKxFwi2/DoxEpfPEmUjpFD0+/1wRjBNFGroVVcuRHNc0w3ivqNP0yG2Ujo/ Feb 2 02:54:18 localhost certmonger[39011]: gnfz3qvJzae4t6MomlUObWhrhxzTqbc7SvX2GkOlawAy9dTnIn4/fezzcuuea2/t Feb 2 02:54:18 localhost certmonger[39011]: fufNxabjCFF5QQ9E9EQxh3S97RwcjdOVObog8Cwbj8RYhd+5LEoQLECVhA9fzm/E Feb 2 02:54:18 localhost certmonger[39011]: NrYzv0z60+EK4+ptMb5IRSQM4qnyvyC/UyfU+qiwRXps0OzGa4ZrRmP42ewSxdzW Feb 2 02:54:18 localhost certmonger[39011]: mRcCAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1DkesA+pp Feb 2 02:54:18 localhost certmonger[39011]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:18 localhost certmonger[39011]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Feb 2 02:54:18 localhost certmonger[39011]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:18 localhost certmonger[39011]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Feb 2 02:54:18 localhost certmonger[39011]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNNlacrC Feb 2 02:54:18 localhost certmonger[39011]: oVwKBuC/po1PlqkdE+ucMIG2BgNVHREEga4wgauCHm5wMDAwNTYwNDcyNS5jdGxw Feb 2 02:54:18 localhost certmonger[39011]: bGFuZS5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NjA0NzI1 Feb 2 02:54:18 localhost certmonger[39011]: LmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09P Feb 2 02:54:18 localhost certmonger[39011]: LlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU2MDQ3MjUuY3RscGxhbmUu Feb 2 02:54:18 localhost certmonger[39011]: b29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBACGOtur2hVKV9YZhLJ1vamLe5T4z Feb 2 02:54:18 localhost certmonger[39011]: JArNQEmSeQL2NoMKzvwGsmm3c17e7M2XyHrPSqciM/7ivbMWUG8pTlRfJywJ9io5 Feb 2 02:54:18 localhost certmonger[39011]: yVqncok66SB0a0scjPz6YkvRkZkdoKP220lZO0guJhySwZIjRDuSFTm2u5kVw1T5 Feb 2 02:54:18 localhost certmonger[39011]: QIZjaBBXmQ32WXF8DqMCTWw4bkqJuo1IMefTUeup2yORUwNQLfyQqSJjndAcB5PZ Feb 2 02:54:18 localhost certmonger[39011]: hdpeuJnAl0RhpuU1FMD88kjaHwK1S4cWyV8U6Po9/bhW8eNigfB403B4ZtDj98rA Feb 2 02:54:18 localhost certmonger[39011]: gpApZokUe0nzGNMbAJ5tzeiPvUQVu9EmhvjMwJUr+M2i+P7v7X+Yjgce+JnVf67o Feb 2 02:54:18 localhost certmonger[39011]: 3mPnQ6tk3+E8v+HcXjLsHvauCpzJvvU+J0hVQSBd3EvSCuW30yUZ1/+0in1LKLTU Feb 2 02:54:18 localhost certmonger[39011]: bIsrYklIjjEJpt0pEbbg+vHSoGxvLtoQVTvCfLgQObEpVnySl+iEzQV85BztVp0i Feb 2 02:54:18 localhost certmonger[39011]: 0vVe4FGybDm3wSQjJU2UJeJlmOQ3yaqLCGYD5g== Feb 2 02:54:18 localhost certmonger[39011]: -----END CERTIFICATE----- Feb 2 02:54:18 localhost certmonger[39011]: " Feb 2 02:54:18 localhost certmonger[39608]: 2026-02-02 07:54:18 [39608] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 02:54:18 localhost certmonger[39608]: MIIFWDCCA8CgAwIBAgIQUo8wsfpvrcHvwnGfGjxPLjANBgkqhkiG9w0BAQsFADAz Feb 2 02:54:18 localhost certmonger[39608]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 02:54:18 localhost certmonger[39608]: aXR5MB4XDTI2MDIwMjA3NTQxOFoXDTI4MDIwMzA3NTQxOFowPDERMA8GA1UECgwI Feb 2 02:54:18 localhost certmonger[39608]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTYwNDcyNS5jdGxwbGFuZS5vb28udGVz Feb 2 02:54:18 localhost certmonger[39608]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANHUHiK3+pbVULYa33Ra Feb 2 02:54:18 localhost certmonger[39608]: 6MQL5cTxDuhcRFxDJti5DiNaQ8YrijEbmLTebGZSAeCmcYi4pirgOM96yiaqNvRz Feb 2 02:54:18 localhost certmonger[39608]: H47/zSKxFwi2/DoxEpfPEmUjpFD0+/1wRjBNFGroVVcuRHNc0w3ivqNP0yG2Ujo/ Feb 2 02:54:18 localhost certmonger[39608]: gnfz3qvJzae4t6MomlUObWhrhxzTqbc7SvX2GkOlawAy9dTnIn4/fezzcuuea2/t Feb 2 02:54:18 localhost certmonger[39608]: fufNxabjCFF5QQ9E9EQxh3S97RwcjdOVObog8Cwbj8RYhd+5LEoQLECVhA9fzm/E Feb 2 02:54:18 localhost certmonger[39608]: NrYzv0z60+EK4+ptMb5IRSQM4qnyvyC/UyfU+qiwRXps0OzGa4ZrRmP42ewSxdzW Feb 2 02:54:18 localhost certmonger[39608]: mRcCAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1DkesA+pp Feb 2 02:54:18 localhost certmonger[39608]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:18 localhost certmonger[39608]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Feb 2 02:54:18 localhost certmonger[39608]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:18 localhost certmonger[39608]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Feb 2 02:54:18 localhost certmonger[39608]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNNlacrC Feb 2 02:54:18 localhost certmonger[39608]: oVwKBuC/po1PlqkdE+ucMIG2BgNVHREEga4wgauCHm5wMDAwNTYwNDcyNS5jdGxw Feb 2 02:54:18 localhost certmonger[39608]: bGFuZS5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NjA0NzI1 Feb 2 02:54:18 localhost certmonger[39608]: LmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09P Feb 2 02:54:18 localhost certmonger[39608]: LlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU2MDQ3MjUuY3RscGxhbmUu Feb 2 02:54:18 localhost certmonger[39608]: b29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBACGOtur2hVKV9YZhLJ1vamLe5T4z Feb 2 02:54:18 localhost certmonger[39608]: JArNQEmSeQL2NoMKzvwGsmm3c17e7M2XyHrPSqciM/7ivbMWUG8pTlRfJywJ9io5 Feb 2 02:54:18 localhost certmonger[39608]: yVqncok66SB0a0scjPz6YkvRkZkdoKP220lZO0guJhySwZIjRDuSFTm2u5kVw1T5 Feb 2 02:54:18 localhost certmonger[39608]: QIZjaBBXmQ32WXF8DqMCTWw4bkqJuo1IMefTUeup2yORUwNQLfyQqSJjndAcB5PZ Feb 2 02:54:18 localhost certmonger[39608]: hdpeuJnAl0RhpuU1FMD88kjaHwK1S4cWyV8U6Po9/bhW8eNigfB403B4ZtDj98rA Feb 2 02:54:18 localhost certmonger[39608]: gpApZokUe0nzGNMbAJ5tzeiPvUQVu9EmhvjMwJUr+M2i+P7v7X+Yjgce+JnVf67o Feb 2 02:54:18 localhost certmonger[39608]: 3mPnQ6tk3+E8v+HcXjLsHvauCpzJvvU+J0hVQSBd3EvSCuW30yUZ1/+0in1LKLTU Feb 2 02:54:18 localhost certmonger[39608]: bIsrYklIjjEJpt0pEbbg+vHSoGxvLtoQVTvCfLgQObEpVnySl+iEzQV85BztVp0i Feb 2 02:54:18 localhost certmonger[39608]: 0vVe4FGybDm3wSQjJU2UJeJlmOQ3yaqLCGYD5g== Feb 2 02:54:18 localhost certmonger[39608]: -----END CERTIFICATE----- Feb 2 02:54:18 localhost certmonger[39608]: ". Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Certificate submission still ongoing. Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Certificate submission postprocessing complete. Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Child status = 0. Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Child output: Feb 2 02:54:18 localhost certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n0vVe4FGybDm3wSQjJU2UJeJlmOQ3yaqLCGYD5g==\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 02:54:18 localhost certmonger[39011]: " Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 02:54:18 localhost certmonger[39011]: MIIFWDCCA8CgAwIBAgIQUo8wsfpvrcHvwnGfGjxPLjANBgkqhkiG9w0BAQsFADAz Feb 2 02:54:18 localhost certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 02:54:18 localhost certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTQxOFoXDTI4MDIwMzA3NTQxOFowPDERMA8GA1UECgwI Feb 2 02:54:18 localhost certmonger[39011]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTYwNDcyNS5jdGxwbGFuZS5vb28udGVz Feb 2 02:54:18 localhost certmonger[39011]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANHUHiK3+pbVULYa33Ra Feb 2 02:54:18 localhost certmonger[39011]: 6MQL5cTxDuhcRFxDJti5DiNaQ8YrijEbmLTebGZSAeCmcYi4pirgOM96yiaqNvRz Feb 2 02:54:18 localhost certmonger[39011]: H47/zSKxFwi2/DoxEpfPEmUjpFD0+/1wRjBNFGroVVcuRHNc0w3ivqNP0yG2Ujo/ Feb 2 02:54:18 localhost certmonger[39011]: gnfz3qvJzae4t6MomlUObWhrhxzTqbc7SvX2GkOlawAy9dTnIn4/fezzcuuea2/t Feb 2 02:54:18 localhost certmonger[39011]: fufNxabjCFF5QQ9E9EQxh3S97RwcjdOVObog8Cwbj8RYhd+5LEoQLECVhA9fzm/E Feb 2 02:54:18 localhost certmonger[39011]: NrYzv0z60+EK4+ptMb5IRSQM4qnyvyC/UyfU+qiwRXps0OzGa4ZrRmP42ewSxdzW Feb 2 02:54:18 localhost certmonger[39011]: mRcCAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1DkesA+pp Feb 2 02:54:18 localhost certmonger[39011]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:18 localhost certmonger[39011]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Feb 2 02:54:18 localhost certmonger[39011]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:18 localhost certmonger[39011]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Feb 2 02:54:18 localhost certmonger[39011]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNNlacrC Feb 2 02:54:18 localhost certmonger[39011]: oVwKBuC/po1PlqkdE+ucMIG2BgNVHREEga4wgauCHm5wMDAwNTYwNDcyNS5jdGxw Feb 2 02:54:18 localhost certmonger[39011]: bGFuZS5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NjA0NzI1 Feb 2 02:54:18 localhost certmonger[39011]: LmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09P Feb 2 02:54:18 localhost certmonger[39011]: LlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU2MDQ3MjUuY3RscGxhbmUu Feb 2 02:54:18 localhost certmonger[39011]: b29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBACGOtur2hVKV9YZhLJ1vamLe5T4z Feb 2 02:54:18 localhost certmonger[39011]: JArNQEmSeQL2NoMKzvwGsmm3c17e7M2XyHrPSqciM/7ivbMWUG8pTlRfJywJ9io5 Feb 2 02:54:18 localhost certmonger[39011]: yVqncok66SB0a0scjPz6YkvRkZkdoKP220lZO0guJhySwZIjRDuSFTm2u5kVw1T5 Feb 2 02:54:18 localhost certmonger[39011]: QIZjaBBXmQ32WXF8DqMCTWw4bkqJuo1IMefTUeup2yORUwNQLfyQqSJjndAcB5PZ Feb 2 02:54:18 localhost certmonger[39011]: hdpeuJnAl0RhpuU1FMD88kjaHwK1S4cWyV8U6Po9/bhW8eNigfB403B4ZtDj98rA Feb 2 02:54:18 localhost certmonger[39011]: gpApZokUe0nzGNMbAJ5tzeiPvUQVu9EmhvjMwJUr+M2i+P7v7X+Yjgce+JnVf67o Feb 2 02:54:18 localhost certmonger[39011]: 3mPnQ6tk3+E8v+HcXjLsHvauCpzJvvU+J0hVQSBd3EvSCuW30yUZ1/+0in1LKLTU Feb 2 02:54:18 localhost certmonger[39011]: bIsrYklIjjEJpt0pEbbg+vHSoGxvLtoQVTvCfLgQObEpVnySl+iEzQV85BztVp0i Feb 2 02:54:18 localhost certmonger[39011]: 0vVe4FGybDm3wSQjJU2UJeJlmOQ3yaqLCGYD5g== Feb 2 02:54:18 localhost certmonger[39011]: -----END CERTIFICATE----- Feb 2 02:54:18 localhost certmonger[39011]: ". Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] No hooks set for pre-save command. Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:18 localhost certmonger[39616]: Certificate in file "/etc/pki/tls/certs/httpd-ctlplane.crt" issued by CA and saved. Feb 2 02:54:18 localhost certmonger[39011]: 2026-02-02 07:54:18 [39011] Wrote to /var/lib/certmonger/requests/20260202075418 Feb 2 02:54:19 localhost systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 2 02:54:19 localhost python3[39633]: ansible-certificate_request Invoked with name=httpd-storage dns=['np0005604725.storage.ooo.test'] principal=['HTTP/np0005604725.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage.crt /etc/pki/tls/certs/httpd/httpd-storage.crt#012cp /etc/pki/tls/private/httpd-storage.key /etc/pki/tls/private/httpd/httpd-storage.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost certmonger[39650]: 2026-02-02 07:54:19 [39650] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.storage.ooo.test" for child. Feb 2 02:54:19 localhost certmonger[39650]: 2026-02-02 07:54:19 [39650] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.storage.ooo.test Feb 2 02:54:19 localhost certmonger[39650]: " for child. Feb 2 02:54:19 localhost certmonger[39650]: 2026-02-02 07:54:19 [39650] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005604725.storage.ooo.test@OOO.TEST Feb 2 02:54:19 localhost certmonger[39650]: " for child. Feb 2 02:54:19 localhost certmonger[39650]: 2026-02-02 07:54:19 [39650] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 02:54:19 localhost certmonger[39650]: 2026-02-02 07:54:19 [39650] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 02:54:19 localhost certmonger[39650]: MIIDwjCCAqoCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NjA0NzI1LnN0b3JhZ2Uub29v Feb 2 02:54:19 localhost certmonger[39650]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQClMvmrzwzHCTV7 Feb 2 02:54:19 localhost certmonger[39650]: LZDFyC2jeyh6qKrbGfBxGqhdM6H2j6eVLKisUJgPAj1joIYHRyYU30qyVS2T/7Jn Feb 2 02:54:19 localhost certmonger[39650]: 6bWjzo/sqkJVLTbIq12rE6FAY2Ar01Hy+n1QBIjwxwO2fPvXovrkD1NDJj/Hkzyq Feb 2 02:54:19 localhost certmonger[39650]: GyKSOql6l0ZC0CMrqzcP1k+qwaeQHaJi9CDwlIHsiVW6+nQACQ8NKfeGt4pKywyQ Feb 2 02:54:19 localhost certmonger[39650]: bv6JvkgnUiTEE6XmQelO8xs+PNBEM25J851JPH5tqRma9vQqOgPGAox5l6vUfRXi Feb 2 02:54:19 localhost certmonger[39650]: OxdKrpkXNPE5RttE6R0kQQi04gRRsxRVnMFJtLn5etPqtf8LlSQ1TVsOc7FKK0x5 Feb 2 02:54:19 localhost certmonger[39650]: KgH3FFC/AgMBAAGgggFTMCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANgAwADIAMAAy Feb 2 02:54:19 localhost certmonger[39650]: ADAANwA1ADQAMQA5MIIBIgYJKoZIhvcNAQkOMYIBEzCCAQ8wCwYDVR0PBAQDAgWg Feb 2 02:54:19 localhost certmonger[39650]: MIGzBgNVHREEgaswgaiCHW5wMDAwNTYwNDcyNS5zdG9yYWdlLm9vby50ZXN0oDsG Feb 2 02:54:19 localhost certmonger[39650]: CisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU2MDQ3MjUuc3RvcmFnZS5vb28udGVz Feb 2 02:54:19 localhost certmonger[39650]: dEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5URVNUoTAwLqADAgEBoScw Feb 2 02:54:19 localhost certmonger[39650]: JRsESFRUUBsdbnAwMDA1NjA0NzI1LnN0b3JhZ2Uub29vLnRlc3QwHQYDVR0lBBYw Feb 2 02:54:19 localhost certmonger[39650]: FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFNSm Feb 2 02:54:19 localhost certmonger[39650]: NNYQW1+9NpQ7LKYDlFys/evwMA0GCSqGSIb3DQEBCwUAA4IBAQBfQPeXvZneXrpa Feb 2 02:54:19 localhost certmonger[39650]: DVZ1DUhvOx0PnlXcxUcfklQ8CIA8guPNeRZp1dITduR2FCBMopqkFVQyHCivRxNG Feb 2 02:54:19 localhost certmonger[39650]: KrVDJ9su54W7tKSXmKipawMwnyEbV0+tWIbINmKvHDDsSsTKm3FyErmX2rTl+Xcp Feb 2 02:54:19 localhost certmonger[39650]: MVvzz40MC7qNJxIxXZPXtnoRM+R97V/azyw7w5tGwp5/Twdl78hJUlLz+GK1VuBl Feb 2 02:54:19 localhost certmonger[39650]: TwRfEIGCVgQFHCq5aW0QNQyIgmJRPSunZp840QZCF3B6SOUaXeFLVHqEtNEAB0tE Feb 2 02:54:19 localhost certmonger[39650]: K60NbyYDfnGnkwVOW9kt4WsyngS7MSASJPD8OqSlpkz9wIdk6BxlWtBZWIb7Awfx Feb 2 02:54:19 localhost certmonger[39650]: 1c48c/wk Feb 2 02:54:19 localhost certmonger[39650]: -----END CERTIFICATE REQUEST----- Feb 2 02:54:19 localhost certmonger[39650]: " for child. Feb 2 02:54:19 localhost certmonger[39650]: 2026-02-02 07:54:19 [39650] Setting "CERTMONGER_SPKAC" to "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" for child. Feb 2 02:54:19 localhost certmonger[39650]: 2026-02-02 07:54:19 [39650] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApTL5q88Mxwk1ey2Qxcgto3soeqiq2xnwcRqoXTOh9o+nlSyorFCYDwI9Y6CGB0cmFN9KslUtk/+yZ+m1o86P7KpCVS02yKtdqxOhQGNgK9NR8vp9UASI8McDtnz716L65A9TQyY/x5M8qhsikjqpepdGQtAjK6s3D9ZPqsGnkB2iYvQg8JSB7IlVuvp0AAkPDSn3hreKSssMkG7+ib5IJ1IkxBOl5kHpTvMbPjzQRDNuSfOdSTx+bakZmvb0KjoDxgKMeZer1H0V4jsXSq6ZFzTxOUbbROkdJEEItOIEUbMUVZzBSbS5+XrT6rX/C5UkNU1bDnOxSitMeSoB9xRQvwIDAQAB" for child. Feb 2 02:54:19 localhost certmonger[39650]: 2026-02-02 07:54:19 [39650] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 02:54:19 localhost certmonger[39650]: 2026-02-02 07:54:19 [39650] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 02:54:19 localhost certmonger[39650]: 2026-02-02 07:54:19 [39650] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 02:54:19 localhost certmonger[39650]: 2026-02-02 07:54:19 [39650] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 02:54:19 localhost certmonger[39650]: 2026-02-02 07:54:19 [39650] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 02:54:19 localhost certmonger[39011]: 2026-02-02 07:54:19 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:19 localhost systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Feb 2 02:54:19 localhost systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Feb 2 02:54:19 localhost certmonger[39650]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 02:54:20 localhost certmonger[39650]: Certificate: "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" Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Certificate submission attempt complete. Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Child status = 0. Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Child output: Feb 2 02:54:20 localhost certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 02:54:20 localhost certmonger[39011]: MIIFVTCCA72gAwIBAgIRAO0hVzOznXmTz5jNamBedhwwDQYJKoZIhvcNAQELBQAw Feb 2 02:54:20 localhost certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 02:54:20 localhost certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU0MjBaFw0yODAyMDMwNzU0MjBaMDsxETAPBgNVBAoM Feb 2 02:54:20 localhost certmonger[39011]: CE9PTy5URVNUMSYwJAYDVQQDDB1ucDAwMDU2MDQ3MjUuc3RvcmFnZS5vb28udGVz Feb 2 02:54:20 localhost certmonger[39011]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKUy+avPDMcJNXstkMXI Feb 2 02:54:20 localhost certmonger[39011]: LaN7KHqoqtsZ8HEaqF0zofaPp5UsqKxQmA8CPWOghgdHJhTfSrJVLZP/smfptaPO Feb 2 02:54:20 localhost certmonger[39011]: j+yqQlUtNsirXasToUBjYCvTUfL6fVAEiPDHA7Z8+9ei+uQPU0MmP8eTPKobIpI6 Feb 2 02:54:20 localhost certmonger[39011]: qXqXRkLQIyurNw/WT6rBp5AdomL0IPCUgeyJVbr6dAAJDw0p94a3ikrLDJBu/om+ Feb 2 02:54:20 localhost certmonger[39011]: SCdSJMQTpeZB6U7zGz480EQzbknznUk8fm2pGZr29Co6A8YCjHmXq9R9FeI7F0qu Feb 2 02:54:20 localhost certmonger[39011]: mRc08TlG20TpHSRBCLTiBFGzFFWcwUm0ufl60+q1/wuVJDVNWw5zsUorTHkqAfcU Feb 2 02:54:20 localhost certmonger[39011]: UL8CAwEAAaOCAdowggHWMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1DkesA+pp Feb 2 02:54:20 localhost certmonger[39011]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:20 localhost certmonger[39011]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Feb 2 02:54:20 localhost certmonger[39011]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:20 localhost certmonger[39011]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Feb 2 02:54:20 localhost certmonger[39011]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFO82ifg8 Feb 2 02:54:20 localhost certmonger[39011]: 6TWjK3I6ZQbL7ywnsu+SMIGzBgNVHREEgaswgaiCHW5wMDAwNTYwNDcyNS5zdG9y Feb 2 02:54:20 localhost certmonger[39011]: YWdlLm9vby50ZXN0oDsGCisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU2MDQ3MjUu Feb 2 02:54:20 localhost certmonger[39011]: c3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5U Feb 2 02:54:20 localhost certmonger[39011]: RVNUoTAwLqADAgEBoScwJRsESFRUUBsdbnAwMDA1NjA0NzI1LnN0b3JhZ2Uub29v Feb 2 02:54:20 localhost certmonger[39011]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBABg11BadeM0s35OxPfJVSBeZ1ewBtuea Feb 2 02:54:20 localhost certmonger[39011]: M7f02Hi1DKQvu1A4g/NeNSHhXY0Ul7b/Xu4BHdzK6pw61XX4NAyG9Wtv1giU6fhZ Feb 2 02:54:20 localhost certmonger[39011]: M9yfkz0BY3IeuCyM8QGYj2F4pvn+eh4fAax7xQKUUMTH2HY4IXoRNkNce+jtp0qZ Feb 2 02:54:20 localhost certmonger[39011]: NlvRuRJne2OSU8WhY7gkdqDw6ad+K3fxqdpkQLayhj8bu514I6JQjWBRn53bki06 Feb 2 02:54:20 localhost certmonger[39011]: 4Ps4LGLd00YnorpNNdrWKTKb/9pD+qRyotGxuzg5gS3U9MIjSPyPQznlWUHPiWHP Feb 2 02:54:20 localhost certmonger[39011]: uA3rwOXwbh3yFZE7y/W7SuA9fLVeELExm4Junj8PblLeEk71bEZuiRwk6ywjLlzY Feb 2 02:54:20 localhost certmonger[39011]: xHSPX/f88Xh9aMv4xjKYCI7PTW4yj2kdbWKC+030yEeX9yAWZ/BcpVqysbHJkml4 Feb 2 02:54:20 localhost certmonger[39011]: VWUd/aouxBXxV5t5dcxPV6o4yLGZ+/mZ4IYTiHXzJDswBKpFddtkLy72KTd7Virw Feb 2 02:54:20 localhost certmonger[39011]: Wo/ul7ZjxTO4+Lqxgf6AIpHNM+hsceRstQ== Feb 2 02:54:20 localhost certmonger[39011]: -----END CERTIFICATE----- Feb 2 02:54:20 localhost certmonger[39011]: " Feb 2 02:54:20 localhost certmonger[39655]: 2026-02-02 07:54:20 [39655] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 02:54:20 localhost certmonger[39655]: MIIFVTCCA72gAwIBAgIRAO0hVzOznXmTz5jNamBedhwwDQYJKoZIhvcNAQELBQAw Feb 2 02:54:20 localhost certmonger[39655]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 02:54:20 localhost certmonger[39655]: cml0eTAeFw0yNjAyMDIwNzU0MjBaFw0yODAyMDMwNzU0MjBaMDsxETAPBgNVBAoM Feb 2 02:54:20 localhost certmonger[39655]: CE9PTy5URVNUMSYwJAYDVQQDDB1ucDAwMDU2MDQ3MjUuc3RvcmFnZS5vb28udGVz Feb 2 02:54:20 localhost certmonger[39655]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKUy+avPDMcJNXstkMXI Feb 2 02:54:20 localhost certmonger[39655]: LaN7KHqoqtsZ8HEaqF0zofaPp5UsqKxQmA8CPWOghgdHJhTfSrJVLZP/smfptaPO Feb 2 02:54:20 localhost certmonger[39655]: j+yqQlUtNsirXasToUBjYCvTUfL6fVAEiPDHA7Z8+9ei+uQPU0MmP8eTPKobIpI6 Feb 2 02:54:20 localhost certmonger[39655]: qXqXRkLQIyurNw/WT6rBp5AdomL0IPCUgeyJVbr6dAAJDw0p94a3ikrLDJBu/om+ Feb 2 02:54:20 localhost certmonger[39655]: SCdSJMQTpeZB6U7zGz480EQzbknznUk8fm2pGZr29Co6A8YCjHmXq9R9FeI7F0qu Feb 2 02:54:20 localhost certmonger[39655]: mRc08TlG20TpHSRBCLTiBFGzFFWcwUm0ufl60+q1/wuVJDVNWw5zsUorTHkqAfcU Feb 2 02:54:20 localhost certmonger[39655]: UL8CAwEAAaOCAdowggHWMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1DkesA+pp Feb 2 02:54:20 localhost certmonger[39655]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:20 localhost certmonger[39655]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Feb 2 02:54:20 localhost certmonger[39655]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:20 localhost certmonger[39655]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Feb 2 02:54:20 localhost certmonger[39655]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFO82ifg8 Feb 2 02:54:20 localhost certmonger[39655]: 6TWjK3I6ZQbL7ywnsu+SMIGzBgNVHREEgaswgaiCHW5wMDAwNTYwNDcyNS5zdG9y Feb 2 02:54:20 localhost certmonger[39655]: YWdlLm9vby50ZXN0oDsGCisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU2MDQ3MjUu Feb 2 02:54:20 localhost certmonger[39655]: c3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5U Feb 2 02:54:20 localhost certmonger[39655]: RVNUoTAwLqADAgEBoScwJRsESFRUUBsdbnAwMDA1NjA0NzI1LnN0b3JhZ2Uub29v Feb 2 02:54:20 localhost certmonger[39655]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBABg11BadeM0s35OxPfJVSBeZ1ewBtuea Feb 2 02:54:20 localhost certmonger[39655]: M7f02Hi1DKQvu1A4g/NeNSHhXY0Ul7b/Xu4BHdzK6pw61XX4NAyG9Wtv1giU6fhZ Feb 2 02:54:20 localhost certmonger[39655]: M9yfkz0BY3IeuCyM8QGYj2F4pvn+eh4fAax7xQKUUMTH2HY4IXoRNkNce+jtp0qZ Feb 2 02:54:20 localhost certmonger[39655]: NlvRuRJne2OSU8WhY7gkdqDw6ad+K3fxqdpkQLayhj8bu514I6JQjWBRn53bki06 Feb 2 02:54:20 localhost certmonger[39655]: 4Ps4LGLd00YnorpNNdrWKTKb/9pD+qRyotGxuzg5gS3U9MIjSPyPQznlWUHPiWHP Feb 2 02:54:20 localhost certmonger[39655]: uA3rwOXwbh3yFZE7y/W7SuA9fLVeELExm4Junj8PblLeEk71bEZuiRwk6ywjLlzY Feb 2 02:54:20 localhost certmonger[39655]: xHSPX/f88Xh9aMv4xjKYCI7PTW4yj2kdbWKC+030yEeX9yAWZ/BcpVqysbHJkml4 Feb 2 02:54:20 localhost certmonger[39655]: VWUd/aouxBXxV5t5dcxPV6o4yLGZ+/mZ4IYTiHXzJDswBKpFddtkLy72KTd7Virw Feb 2 02:54:20 localhost certmonger[39655]: Wo/ul7ZjxTO4+Lqxgf6AIpHNM+hsceRstQ== Feb 2 02:54:20 localhost certmonger[39655]: -----END CERTIFICATE----- Feb 2 02:54:20 localhost certmonger[39655]: ". Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Certificate submission still ongoing. Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Certificate submission postprocessing complete. Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Child status = 0. Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Child output: Feb 2 02:54:20 localhost certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFVTCCA72gAwIBAgIRAO0hVzOznXmTz5jNamBedhwwDQYJKoZIhvcNAQELBQAw\nMzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv\ncml0eTAeFw0yNjAyMDIwNzU0MjBaFw0yODAyMDMwNzU0MjBaMDsxETAPBgNVBAoM\nCE9PTy5URVNUMSYwJAYDVQQDDB1ucDAwMDU2MDQ3MjUuc3RvcmFnZS5vb28udGVz\ndDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKUy+avPDMcJNXstkMXI\nLaN7KHqoqtsZ8HEaqF0zofaPp5UsqKxQmA8CPWOghgdHJhTfSrJVLZP/smfptaPO\nj+yqQlUtNsirXasToUBjYCvTUfL6fVAEiPDHA7Z8+9ei+uQPU0MmP8eTPKobIpI6\nqXqXRkLQIyurNw/WT6rBp5AdomL0IPCUgeyJVbr6dAAJDw0p94a3ikrLDJBu/om+\nSCdSJMQTpeZB6U7zGz480EQzbknznUk8fm2pGZr29Co6A8YCjHmXq9R9FeI7F0qu\nmRc08TlG20TpHSRBCLTiBFGzFFWcwUm0ufl60+q1/wuVJDVNWw5zsUorTHkqAfcU\nUL8CAwEAAaOCAdowggHWMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1DkesA+pp\nMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u\ndGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD\nAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u\ndGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh\nMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFO82ifg8\n6TWjK3I6ZQbL7ywnsu+SMIGzBgNVHREEgaswgaiCHW5wMDAwNTYwNDcyNS5zdG9y\nYWdlLm9vby50ZXN0oDsGCisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU2MDQ3MjUu\nc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5U\nRVNUoTAwLqADAgEBoScwJRsESFRUUBsdbnAwMDA1NjA0NzI1LnN0b3JhZ2Uub29v\nLnRlc3QwDQYJKoZIhvcNAQELBQADggGBABg11BadeM0s35OxPfJVSBeZ1ewBtuea\nM7f02Hi1DKQvu1A4g/NeNSHhXY0Ul7b/Xu4BHdzK6pw61XX4NAyG9Wtv1giU6fhZ\nM9yfkz0BY3IeuCyM8QGYj2F4pvn+eh4fAax7xQKUUMTH2HY4IXoRNkNce+jtp0qZ\nNlvRuRJne2OSU8WhY7gkdqDw6ad+K3fxqdpkQLayhj8bu514I6JQjWBRn53bki06\n4Ps4LGLd00YnorpNNdrWKTKb/9pD+qRyotGxuzg5gS3U9MIjSPyPQznlWUHPiWHP\nuA3rwOXwbh3yFZE7y/W7SuA9fLVeELExm4Junj8PblLeEk71bEZuiRwk6ywjLlzY\nxHSPX/f88Xh9aMv4xjKYCI7PTW4yj2kdbWKC+030yEeX9yAWZ/BcpVqysbHJkml4\nVWUd/aouxBXxV5t5dcxPV6o4yLGZ+/mZ4IYTiHXzJDswBKpFddtkLy72KTd7Virw\nWo/ul7ZjxTO4+Lqxgf6AIpHNM+hsceRstQ==\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 02:54:20 localhost certmonger[39011]: " Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 02:54:20 localhost certmonger[39011]: MIIFVTCCA72gAwIBAgIRAO0hVzOznXmTz5jNamBedhwwDQYJKoZIhvcNAQELBQAw Feb 2 02:54:20 localhost certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 02:54:20 localhost certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU0MjBaFw0yODAyMDMwNzU0MjBaMDsxETAPBgNVBAoM Feb 2 02:54:20 localhost certmonger[39011]: CE9PTy5URVNUMSYwJAYDVQQDDB1ucDAwMDU2MDQ3MjUuc3RvcmFnZS5vb28udGVz Feb 2 02:54:20 localhost certmonger[39011]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKUy+avPDMcJNXstkMXI Feb 2 02:54:20 localhost certmonger[39011]: LaN7KHqoqtsZ8HEaqF0zofaPp5UsqKxQmA8CPWOghgdHJhTfSrJVLZP/smfptaPO Feb 2 02:54:20 localhost certmonger[39011]: j+yqQlUtNsirXasToUBjYCvTUfL6fVAEiPDHA7Z8+9ei+uQPU0MmP8eTPKobIpI6 Feb 2 02:54:20 localhost certmonger[39011]: qXqXRkLQIyurNw/WT6rBp5AdomL0IPCUgeyJVbr6dAAJDw0p94a3ikrLDJBu/om+ Feb 2 02:54:20 localhost certmonger[39011]: SCdSJMQTpeZB6U7zGz480EQzbknznUk8fm2pGZr29Co6A8YCjHmXq9R9FeI7F0qu Feb 2 02:54:20 localhost certmonger[39011]: mRc08TlG20TpHSRBCLTiBFGzFFWcwUm0ufl60+q1/wuVJDVNWw5zsUorTHkqAfcU Feb 2 02:54:20 localhost certmonger[39011]: UL8CAwEAAaOCAdowggHWMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1DkesA+pp Feb 2 02:54:20 localhost certmonger[39011]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:20 localhost certmonger[39011]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Feb 2 02:54:20 localhost certmonger[39011]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:20 localhost certmonger[39011]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Feb 2 02:54:20 localhost certmonger[39011]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFO82ifg8 Feb 2 02:54:20 localhost certmonger[39011]: 6TWjK3I6ZQbL7ywnsu+SMIGzBgNVHREEgaswgaiCHW5wMDAwNTYwNDcyNS5zdG9y Feb 2 02:54:20 localhost certmonger[39011]: YWdlLm9vby50ZXN0oDsGCisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU2MDQ3MjUu Feb 2 02:54:20 localhost certmonger[39011]: c3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5U Feb 2 02:54:20 localhost certmonger[39011]: RVNUoTAwLqADAgEBoScwJRsESFRUUBsdbnAwMDA1NjA0NzI1LnN0b3JhZ2Uub29v Feb 2 02:54:20 localhost certmonger[39011]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBABg11BadeM0s35OxPfJVSBeZ1ewBtuea Feb 2 02:54:20 localhost certmonger[39011]: M7f02Hi1DKQvu1A4g/NeNSHhXY0Ul7b/Xu4BHdzK6pw61XX4NAyG9Wtv1giU6fhZ Feb 2 02:54:20 localhost certmonger[39011]: M9yfkz0BY3IeuCyM8QGYj2F4pvn+eh4fAax7xQKUUMTH2HY4IXoRNkNce+jtp0qZ Feb 2 02:54:20 localhost certmonger[39011]: NlvRuRJne2OSU8WhY7gkdqDw6ad+K3fxqdpkQLayhj8bu514I6JQjWBRn53bki06 Feb 2 02:54:20 localhost certmonger[39011]: 4Ps4LGLd00YnorpNNdrWKTKb/9pD+qRyotGxuzg5gS3U9MIjSPyPQznlWUHPiWHP Feb 2 02:54:20 localhost certmonger[39011]: uA3rwOXwbh3yFZE7y/W7SuA9fLVeELExm4Junj8PblLeEk71bEZuiRwk6ywjLlzY Feb 2 02:54:20 localhost certmonger[39011]: xHSPX/f88Xh9aMv4xjKYCI7PTW4yj2kdbWKC+030yEeX9yAWZ/BcpVqysbHJkml4 Feb 2 02:54:20 localhost certmonger[39011]: VWUd/aouxBXxV5t5dcxPV6o4yLGZ+/mZ4IYTiHXzJDswBKpFddtkLy72KTd7Virw Feb 2 02:54:20 localhost certmonger[39011]: Wo/ul7ZjxTO4+Lqxgf6AIpHNM+hsceRstQ== Feb 2 02:54:20 localhost certmonger[39011]: -----END CERTIFICATE----- Feb 2 02:54:20 localhost certmonger[39011]: ". Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] No hooks set for pre-save command. Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:20 localhost certmonger[39663]: Certificate in file "/etc/pki/tls/certs/httpd-storage.crt" issued by CA and saved. Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075419 Feb 2 02:54:20 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:20 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:20 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:20 localhost python3[39679]: ansible-certificate_request Invoked with name=httpd-storage_mgmt dns=['np0005604725.storagemgmt.ooo.test'] principal=['HTTP/np0005604725.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage_mgmt.crt /etc/pki/tls/certs/httpd/httpd-storage_mgmt.crt#012cp /etc/pki/tls/private/httpd-storage_mgmt.key /etc/pki/tls/private/httpd/httpd-storage_mgmt.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 02:54:20 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:20 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:20 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:20 localhost certmonger[39011]: 2026-02-02 07:54:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:20 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost certmonger[39690]: 2026-02-02 07:54:21 [39690] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.storagemgmt.ooo.test" for child. Feb 2 02:54:21 localhost certmonger[39690]: 2026-02-02 07:54:21 [39690] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.storagemgmt.ooo.test Feb 2 02:54:21 localhost certmonger[39690]: " for child. Feb 2 02:54:21 localhost certmonger[39690]: 2026-02-02 07:54:21 [39690] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005604725.storagemgmt.ooo.test@OOO.TEST Feb 2 02:54:21 localhost certmonger[39690]: " for child. Feb 2 02:54:21 localhost certmonger[39690]: 2026-02-02 07:54:21 [39690] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 02:54:21 localhost certmonger[39690]: 2026-02-02 07:54:21 [39690] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 02:54:21 localhost certmonger[39690]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NjA0NzI1LnN0b3JhZ2VtZ210 Feb 2 02:54:21 localhost certmonger[39690]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAua9DLhEy Feb 2 02:54:21 localhost certmonger[39690]: mSdp/au26Do2M7PKYEHW8To99QqrJy4G4HIU9VaYA9hj1Vu0lE/tU3S4HR/Wpppt Feb 2 02:54:21 localhost certmonger[39690]: bM7pzmnG95X97/JPP5BmwfniPiHaLhtzGkqI12SIyDyze1taM/7rLpz5vYowhehU Feb 2 02:54:21 localhost certmonger[39690]: 5y5Q67rutsKzUUPZklumfaeBbuxQfel/Kc3XE2BXlX+suIRIVyCFvJ+nVPt4j+h0 Feb 2 02:54:21 localhost certmonger[39690]: hOLDKg5qEL0Jg9MQmjCJ9kqwty/ZqXq9cng5lYhBPZahRNakSB6JTQDSx237FftI Feb 2 02:54:21 localhost certmonger[39690]: dn//RXwdsJAa21lAeCfHwSPqN5LhS0lceK9djtAqHo+HBNxliseFg0IEqa2HeBDw Feb 2 02:54:21 localhost certmonger[39690]: /HDRY3DZpqYGeQIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAy Feb 2 02:54:21 localhost certmonger[39690]: ADAAMgAwADcANQA0ADIAMDCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Feb 2 02:54:21 localhost certmonger[39690]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU2MDQ3MjUuc3RvcmFnZW1nbXQub29v Feb 2 02:54:21 localhost certmonger[39690]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTYwNDcyNS5zdG9yYWdl Feb 2 02:54:21 localhost certmonger[39690]: bWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Feb 2 02:54:21 localhost certmonger[39690]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NjA0NzI1LnN0b3JhZ2VtZ210Lm9v Feb 2 02:54:21 localhost certmonger[39690]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Feb 2 02:54:21 localhost certmonger[39690]: AjAAMB0GA1UdDgQWBBSjXq2MYgznD3mDmaVFLH3orIsoOTANBgkqhkiG9w0BAQsF Feb 2 02:54:21 localhost certmonger[39690]: AAOCAQEAsaPO+iYkRuE5YvT3vH0C+TeLuNZKYI976SrJ/isEEL0q1LuYebmeEv0G Feb 2 02:54:21 localhost certmonger[39690]: m8ACy6k3/vfmybg+54WvD5XPCvV5xM6u4K7vjnJjviDYKqyo3qz+EtS0B6DoRHut Feb 2 02:54:21 localhost certmonger[39690]: Br63NyTIn21qkdIbNP1mj9SH7pNlbJDDLKTuuHFJpB3gZCXYJufZty3fO0ntZNGI Feb 2 02:54:21 localhost certmonger[39690]: dpFhZ6Pr/60PGUjqQtTpBHVlvA+Wt/gpT+8/KdJv+jlyXb39kl35YafK0G5xWyPV Feb 2 02:54:21 localhost certmonger[39690]: Rhqla5893WanK4ekx14sY3qaHfyFlfiU7Hf/On+/nfL2jY5uv1tt/FQW47fpzFuv Feb 2 02:54:21 localhost certmonger[39690]: ElhB+Il9hn5kQ1k7+hqG5O4kTL/jqg== Feb 2 02:54:21 localhost certmonger[39690]: -----END CERTIFICATE REQUEST----- Feb 2 02:54:21 localhost certmonger[39690]: " for child. Feb 2 02:54:21 localhost certmonger[39690]: 2026-02-02 07:54:21 [39690] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC5r0MuETKZJ2n9q7boOjYzs8pgQdbxOj31CqsnLgbgchT1VpgD2GPVW7SUT+1TdLgdH9ammm1szunOacb3lf3v8k8/kGbB+eI+IdouG3MaSojXZIjIPLN7W1oz/usunPm9ijCF6FTnLlDruu62wrNRQ9mSW6Z9p4Fu7FB96X8pzdcTYFeVf6y4hEhXIIW8n6dU+3iP6HSE4sMqDmoQvQmD0xCaMIn2SrC3L9mper1yeDmViEE9lqFE1qRIHolNANLHbfsV+0h2f/9FfB2wkBrbWUB4J8fBI+o3kuFLSVx4r12O0Coej4cE3GWKx4WDQgSprYd4EPD8cNFjcNmmpgZ5AgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAY7OjOvfsQhTWsykSa0WYZ1uJNNZdgqCZW6Oa0U/kVoncX2aIFbvYXGZJ030IiwlqcOu9b/vDSiSPIGRYEls28bg5RhkVbxzhdsqfP8vfAQpuWYrrMKVZdnt4GmIKx2+6loT2qoOpWAwaKpwdI+QTmvYOXpbH72q5l1WepTjVd9oM8vO9vgWdNOnniCASWJGcHuO+N1pWPAB2uiDk8bFqHDyw96viIUwRJ1XPT5BS59wojtWkvPGutnmtfiU9sQw2DL500tC90A4AZRFAgSJYb/pJCsWZmFT/BXZOgFdszxEUcycPX//ZVsxaOueMlpYExJGLbZWiYiZU0KaujnQQvg==" for child. Feb 2 02:54:21 localhost certmonger[39690]: 2026-02-02 07:54:21 [39690] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAua9DLhEymSdp/au26Do2M7PKYEHW8To99QqrJy4G4HIU9VaYA9hj1Vu0lE/tU3S4HR/WppptbM7pzmnG95X97/JPP5BmwfniPiHaLhtzGkqI12SIyDyze1taM/7rLpz5vYowhehU5y5Q67rutsKzUUPZklumfaeBbuxQfel/Kc3XE2BXlX+suIRIVyCFvJ+nVPt4j+h0hOLDKg5qEL0Jg9MQmjCJ9kqwty/ZqXq9cng5lYhBPZahRNakSB6JTQDSx237FftIdn//RXwdsJAa21lAeCfHwSPqN5LhS0lceK9djtAqHo+HBNxliseFg0IEqa2HeBDw/HDRY3DZpqYGeQIDAQAB" for child. Feb 2 02:54:21 localhost certmonger[39690]: 2026-02-02 07:54:21 [39690] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 02:54:21 localhost certmonger[39690]: 2026-02-02 07:54:21 [39690] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 02:54:21 localhost certmonger[39690]: 2026-02-02 07:54:21 [39690] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 02:54:21 localhost certmonger[39690]: 2026-02-02 07:54:21 [39690] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 02:54:21 localhost certmonger[39690]: 2026-02-02 07:54:21 [39690] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost certmonger[39690]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost certmonger[39690]: Certificate: "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" Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Certificate submission still ongoing. Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Certificate submission attempt complete. Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Child status = 0. Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Child output: Feb 2 02:54:21 localhost certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 02:54:21 localhost certmonger[39011]: MIIFZDCCA8ygAwIBAgIQBIHKFiZ+PzEEcr42oI63vzANBgkqhkiG9w0BAQsFADAz Feb 2 02:54:21 localhost certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 02:54:21 localhost certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTQyMVoXDTI4MDIwMzA3NTQyMVowPzERMA8GA1UECgwI Feb 2 02:54:21 localhost certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5zdG9yYWdlbWdtdC5vb28u Feb 2 02:54:21 localhost certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALmvQy4RMpknaf2r Feb 2 02:54:21 localhost certmonger[39011]: tug6NjOzymBB1vE6PfUKqycuBuByFPVWmAPYY9VbtJRP7VN0uB0f1qaabWzO6c5p Feb 2 02:54:21 localhost certmonger[39011]: xveV/e/yTz+QZsH54j4h2i4bcxpKiNdkiMg8s3tbWjP+6y6c+b2KMIXoVOcuUOu6 Feb 2 02:54:21 localhost certmonger[39011]: 7rbCs1FD2ZJbpn2ngW7sUH3pfynN1xNgV5V/rLiESFcghbyfp1T7eI/odITiwyoO Feb 2 02:54:21 localhost certmonger[39011]: ahC9CYPTEJowifZKsLcv2al6vXJ4OZWIQT2WoUTWpEgeiU0A0sdt+xX7SHZ//0V8 Feb 2 02:54:21 localhost certmonger[39011]: HbCQGttZQHgnx8Ej6jeS4UtJXHivXY7QKh6PhwTcZYrHhYNCBKmth3gQ8Pxw0WNw Feb 2 02:54:21 localhost certmonger[39011]: 2aamBnkCAwEAAaOCAeYwggHiMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 02:54:21 localhost certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 02:54:21 localhost certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 02:54:21 localhost certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 02:54:21 localhost certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 02:54:21 localhost certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBrt Feb 2 02:54:21 localhost certmonger[39011]: yhfqMWfkun+FlKPrSYDMVaYGMIG/BgNVHREEgbcwgbSCIW5wMDAwNTYwNDcyNS5z Feb 2 02:54:21 localhost certmonger[39011]: dG9yYWdlbWdtdC5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1 Feb 2 02:54:21 localhost certmonger[39011]: NjA0NzI1LnN0b3JhZ2VtZ210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBE Feb 2 02:54:21 localhost certmonger[39011]: MEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU2MDQ3MjUu Feb 2 02:54:21 localhost certmonger[39011]: c3RvcmFnZW1nbXQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHAdlZK3/th5 Feb 2 02:54:21 localhost certmonger[39011]: oeBJ29vLfrECVnZo3/VQI9aVZ3aIyo9GYXusOzYHSBWRrCWMPkuDt7HY9196KHU3 Feb 2 02:54:21 localhost certmonger[39011]: W3x9QDk8Hb897gtSXihVfBuPeYkJcrcrIDsFVCVA3QehmNStPL2yF/w9ON0r8U8x Feb 2 02:54:21 localhost certmonger[39011]: XLFU4rYMge0hdWeDtQu5GHxB+ufuZxLe0FJVqMyppKA+M/CoUodR+sk4WV+YGVDe Feb 2 02:54:21 localhost certmonger[39011]: OCSgOT/dbZeLyBBeju2xfzOlGwbBXgAxKMJddaMEfUAWPXjHqth3At+JkqBMGeDN Feb 2 02:54:21 localhost certmonger[39011]: rf+IOb3WV3t8bOV9zIgDZ0uEZIcxJtRRq8ZUSIs4KbYAuZTUuMXoVX24nqmfCN7v Feb 2 02:54:21 localhost certmonger[39011]: y9gJVU4vSdq4+25cGFO5f2CUGbooomcF2NGC6L4KBdbVBPVczwfUBb6P0SS0keyU Feb 2 02:54:21 localhost certmonger[39011]: egFdWOGj51uNvM3b52Gaq+IjJBtG1dNClV0g4MUYbfQd33HAR4hoSvbV03QhSJjS Feb 2 02:54:21 localhost certmonger[39011]: 9t/CBLlxjxeL4UBWQsA2CxI1ID+hStEHAgB7PKdk+tWPCHyfE9KZ3A== Feb 2 02:54:21 localhost certmonger[39011]: -----END CERTIFICATE----- Feb 2 02:54:21 localhost certmonger[39011]: " Feb 2 02:54:21 localhost certmonger[39692]: 2026-02-02 07:54:21 [39692] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 02:54:21 localhost certmonger[39692]: MIIFZDCCA8ygAwIBAgIQBIHKFiZ+PzEEcr42oI63vzANBgkqhkiG9w0BAQsFADAz Feb 2 02:54:21 localhost certmonger[39692]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 02:54:21 localhost certmonger[39692]: aXR5MB4XDTI2MDIwMjA3NTQyMVoXDTI4MDIwMzA3NTQyMVowPzERMA8GA1UECgwI Feb 2 02:54:21 localhost certmonger[39692]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5zdG9yYWdlbWdtdC5vb28u Feb 2 02:54:21 localhost certmonger[39692]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALmvQy4RMpknaf2r Feb 2 02:54:21 localhost certmonger[39692]: tug6NjOzymBB1vE6PfUKqycuBuByFPVWmAPYY9VbtJRP7VN0uB0f1qaabWzO6c5p Feb 2 02:54:21 localhost certmonger[39692]: xveV/e/yTz+QZsH54j4h2i4bcxpKiNdkiMg8s3tbWjP+6y6c+b2KMIXoVOcuUOu6 Feb 2 02:54:21 localhost certmonger[39692]: 7rbCs1FD2ZJbpn2ngW7sUH3pfynN1xNgV5V/rLiESFcghbyfp1T7eI/odITiwyoO Feb 2 02:54:21 localhost certmonger[39692]: ahC9CYPTEJowifZKsLcv2al6vXJ4OZWIQT2WoUTWpEgeiU0A0sdt+xX7SHZ//0V8 Feb 2 02:54:21 localhost certmonger[39692]: HbCQGttZQHgnx8Ej6jeS4UtJXHivXY7QKh6PhwTcZYrHhYNCBKmth3gQ8Pxw0WNw Feb 2 02:54:21 localhost certmonger[39692]: 2aamBnkCAwEAAaOCAeYwggHiMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 02:54:21 localhost certmonger[39692]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 02:54:21 localhost certmonger[39692]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 02:54:21 localhost certmonger[39692]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 02:54:21 localhost certmonger[39692]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 02:54:21 localhost certmonger[39692]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBrt Feb 2 02:54:21 localhost certmonger[39692]: yhfqMWfkun+FlKPrSYDMVaYGMIG/BgNVHREEgbcwgbSCIW5wMDAwNTYwNDcyNS5z Feb 2 02:54:21 localhost certmonger[39692]: dG9yYWdlbWdtdC5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1 Feb 2 02:54:21 localhost certmonger[39692]: NjA0NzI1LnN0b3JhZ2VtZ210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBE Feb 2 02:54:21 localhost certmonger[39692]: MEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU2MDQ3MjUu Feb 2 02:54:21 localhost certmonger[39692]: c3RvcmFnZW1nbXQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHAdlZK3/th5 Feb 2 02:54:21 localhost certmonger[39692]: oeBJ29vLfrECVnZo3/VQI9aVZ3aIyo9GYXusOzYHSBWRrCWMPkuDt7HY9196KHU3 Feb 2 02:54:21 localhost certmonger[39692]: W3x9QDk8Hb897gtSXihVfBuPeYkJcrcrIDsFVCVA3QehmNStPL2yF/w9ON0r8U8x Feb 2 02:54:21 localhost certmonger[39692]: XLFU4rYMge0hdWeDtQu5GHxB+ufuZxLe0FJVqMyppKA+M/CoUodR+sk4WV+YGVDe Feb 2 02:54:21 localhost certmonger[39692]: OCSgOT/dbZeLyBBeju2xfzOlGwbBXgAxKMJddaMEfUAWPXjHqth3At+JkqBMGeDN Feb 2 02:54:21 localhost certmonger[39692]: rf+IOb3WV3t8bOV9zIgDZ0uEZIcxJtRRq8ZUSIs4KbYAuZTUuMXoVX24nqmfCN7v Feb 2 02:54:21 localhost certmonger[39692]: y9gJVU4vSdq4+25cGFO5f2CUGbooomcF2NGC6L4KBdbVBPVczwfUBb6P0SS0keyU Feb 2 02:54:21 localhost certmonger[39692]: egFdWOGj51uNvM3b52Gaq+IjJBtG1dNClV0g4MUYbfQd33HAR4hoSvbV03QhSJjS Feb 2 02:54:21 localhost certmonger[39692]: 9t/CBLlxjxeL4UBWQsA2CxI1ID+hStEHAgB7PKdk+tWPCHyfE9KZ3A== Feb 2 02:54:21 localhost certmonger[39692]: -----END CERTIFICATE----- Feb 2 02:54:21 localhost certmonger[39692]: ". Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Certificate submission still ongoing. Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Certificate submission postprocessing complete. Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Child status = 0. Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Child output: Feb 2 02:54:21 localhost certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n9t/CBLlxjxeL4UBWQsA2CxI1ID+hStEHAgB7PKdk+tWPCHyfE9KZ3A==\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 02:54:21 localhost certmonger[39011]: " Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 02:54:21 localhost certmonger[39011]: MIIFZDCCA8ygAwIBAgIQBIHKFiZ+PzEEcr42oI63vzANBgkqhkiG9w0BAQsFADAz Feb 2 02:54:21 localhost certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 02:54:21 localhost certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTQyMVoXDTI4MDIwMzA3NTQyMVowPzERMA8GA1UECgwI Feb 2 02:54:21 localhost certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5zdG9yYWdlbWdtdC5vb28u Feb 2 02:54:21 localhost certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALmvQy4RMpknaf2r Feb 2 02:54:21 localhost certmonger[39011]: tug6NjOzymBB1vE6PfUKqycuBuByFPVWmAPYY9VbtJRP7VN0uB0f1qaabWzO6c5p Feb 2 02:54:21 localhost certmonger[39011]: xveV/e/yTz+QZsH54j4h2i4bcxpKiNdkiMg8s3tbWjP+6y6c+b2KMIXoVOcuUOu6 Feb 2 02:54:21 localhost certmonger[39011]: 7rbCs1FD2ZJbpn2ngW7sUH3pfynN1xNgV5V/rLiESFcghbyfp1T7eI/odITiwyoO Feb 2 02:54:21 localhost certmonger[39011]: ahC9CYPTEJowifZKsLcv2al6vXJ4OZWIQT2WoUTWpEgeiU0A0sdt+xX7SHZ//0V8 Feb 2 02:54:21 localhost certmonger[39011]: HbCQGttZQHgnx8Ej6jeS4UtJXHivXY7QKh6PhwTcZYrHhYNCBKmth3gQ8Pxw0WNw Feb 2 02:54:21 localhost certmonger[39011]: 2aamBnkCAwEAAaOCAeYwggHiMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 02:54:21 localhost certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 02:54:21 localhost certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 02:54:21 localhost certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 02:54:21 localhost certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 02:54:21 localhost certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBrt Feb 2 02:54:21 localhost certmonger[39011]: yhfqMWfkun+FlKPrSYDMVaYGMIG/BgNVHREEgbcwgbSCIW5wMDAwNTYwNDcyNS5z Feb 2 02:54:21 localhost certmonger[39011]: dG9yYWdlbWdtdC5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1 Feb 2 02:54:21 localhost certmonger[39011]: NjA0NzI1LnN0b3JhZ2VtZ210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBE Feb 2 02:54:21 localhost certmonger[39011]: MEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU2MDQ3MjUu Feb 2 02:54:21 localhost certmonger[39011]: c3RvcmFnZW1nbXQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHAdlZK3/th5 Feb 2 02:54:21 localhost certmonger[39011]: oeBJ29vLfrECVnZo3/VQI9aVZ3aIyo9GYXusOzYHSBWRrCWMPkuDt7HY9196KHU3 Feb 2 02:54:21 localhost certmonger[39011]: W3x9QDk8Hb897gtSXihVfBuPeYkJcrcrIDsFVCVA3QehmNStPL2yF/w9ON0r8U8x Feb 2 02:54:21 localhost certmonger[39011]: XLFU4rYMge0hdWeDtQu5GHxB+ufuZxLe0FJVqMyppKA+M/CoUodR+sk4WV+YGVDe Feb 2 02:54:21 localhost certmonger[39011]: OCSgOT/dbZeLyBBeju2xfzOlGwbBXgAxKMJddaMEfUAWPXjHqth3At+JkqBMGeDN Feb 2 02:54:21 localhost certmonger[39011]: rf+IOb3WV3t8bOV9zIgDZ0uEZIcxJtRRq8ZUSIs4KbYAuZTUuMXoVX24nqmfCN7v Feb 2 02:54:21 localhost certmonger[39011]: y9gJVU4vSdq4+25cGFO5f2CUGbooomcF2NGC6L4KBdbVBPVczwfUBb6P0SS0keyU Feb 2 02:54:21 localhost certmonger[39011]: egFdWOGj51uNvM3b52Gaq+IjJBtG1dNClV0g4MUYbfQd33HAR4hoSvbV03QhSJjS Feb 2 02:54:21 localhost certmonger[39011]: 9t/CBLlxjxeL4UBWQsA2CxI1ID+hStEHAgB7PKdk+tWPCHyfE9KZ3A== Feb 2 02:54:21 localhost certmonger[39011]: -----END CERTIFICATE----- Feb 2 02:54:21 localhost certmonger[39011]: ". Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] No hooks set for pre-save command. Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:21 localhost certmonger[39011]: 2026-02-02 07:54:21 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:22 localhost certmonger[39011]: 2026-02-02 07:54:22 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost certmonger[39011]: 2026-02-02 07:54:22 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:22 localhost certmonger[39011]: 2026-02-02 07:54:22 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:22 localhost certmonger[39700]: Certificate in file "/etc/pki/tls/certs/httpd-storage_mgmt.crt" issued by CA and saved. Feb 2 02:54:22 localhost certmonger[39011]: 2026-02-02 07:54:22 [39011] Wrote to /var/lib/certmonger/requests/20260202075420 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost auditd[725]: queue to plugins is full - dropping event Feb 2 02:54:22 localhost auditd[725]: queue to plugins is full - dropping event Feb 2 02:54:22 localhost auditd[725]: queue to plugins is full - dropping event Feb 2 02:54:22 localhost auditd[725]: queue to plugins is full - dropping event Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost auditd[725]: queue to plugins is full - dropping event Feb 2 02:54:22 localhost auditd[725]: auditd queue full reporting limit reached - ending dropped event notifications Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost python3[39716]: ansible-certificate_request Invoked with name=httpd-internal_api dns=['np0005604725.internalapi.ooo.test'] principal=['HTTP/np0005604725.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-internal_api.crt /etc/pki/tls/certs/httpd/httpd-internal_api.crt#012cp /etc/pki/tls/private/httpd-internal_api.key /etc/pki/tls/private/httpd/httpd-internal_api.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost certmonger[39011]: 2026-02-02 07:54:22 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:22 localhost certmonger[39011]: 2026-02-02 07:54:22 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:22 localhost certmonger[39011]: 2026-02-02 07:54:22 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:22 localhost certmonger[39011]: 2026-02-02 07:54:22 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:22 localhost certmonger[39011]: 2026-02-02 07:54:22 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:22 localhost certmonger[39011]: 2026-02-02 07:54:22 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:22 localhost certmonger[39011]: 2026-02-02 07:54:22 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:22 localhost certmonger[39011]: 2026-02-02 07:54:22 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:22 localhost certmonger[39011]: 2026-02-02 07:54:22 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:22 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39726]: 2026-02-02 07:54:23 [39726] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.internalapi.ooo.test" for child. Feb 2 02:54:23 localhost certmonger[39726]: 2026-02-02 07:54:23 [39726] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.internalapi.ooo.test Feb 2 02:54:23 localhost certmonger[39726]: " for child. Feb 2 02:54:23 localhost certmonger[39726]: 2026-02-02 07:54:23 [39726] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005604725.internalapi.ooo.test@OOO.TEST Feb 2 02:54:23 localhost certmonger[39726]: " for child. Feb 2 02:54:23 localhost certmonger[39726]: 2026-02-02 07:54:23 [39726] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 02:54:23 localhost certmonger[39726]: 2026-02-02 07:54:23 [39726] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 02:54:23 localhost certmonger[39726]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NjA0NzI1LmludGVybmFsYXBp Feb 2 02:54:23 localhost certmonger[39726]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsG9QGUlu Feb 2 02:54:23 localhost certmonger[39726]: piTk5G4o/VpVVLJJvrybDB6Xd3N6u3iHmOtTu+pgaNrOpu68CdLAX4q0OQ47x3OV Feb 2 02:54:23 localhost certmonger[39726]: f4HgGkA4UmX9y1Chwksw07YAgkmBJ72RQOmqIqzGraVehOuLBF2hD/yojakiDh84 Feb 2 02:54:23 localhost certmonger[39726]: 73bkWZeZRZIPZHNYU8bMLqGHH8OfEUTb7pCp0YYqe03/ebCHui54puUY31t9lf3z Feb 2 02:54:23 localhost certmonger[39726]: /+86Fqya+bC3YKLPYPNvUNerBkLAm2auqCT+xinhPF0vHpwnlaLG+T9JAgINmvHu Feb 2 02:54:23 localhost certmonger[39726]: YkSQFBRqy2TDx4OstX4w0+r/WuFP8xnRohDVbAX0C8tObO1As3Fr1aOuSlCGAAzE Feb 2 02:54:23 localhost certmonger[39726]: pkMSdG3MxcYYaQIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAy Feb 2 02:54:23 localhost certmonger[39726]: ADAAMgAwADcANQA0ADIAMjCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Feb 2 02:54:23 localhost certmonger[39726]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 02:54:23 localhost certmonger[39726]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTYwNDcyNS5pbnRlcm5h Feb 2 02:54:23 localhost certmonger[39726]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Feb 2 02:54:23 localhost certmonger[39726]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NjA0NzI1LmludGVybmFsYXBpLm9v Feb 2 02:54:23 localhost certmonger[39726]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Feb 2 02:54:23 localhost certmonger[39726]: AjAAMB0GA1UdDgQWBBTnu+rxea7XHS0VcXRejqORcjQ2fjANBgkqhkiG9w0BAQsF Feb 2 02:54:23 localhost certmonger[39726]: AAOCAQEAlUAybkKUevnaroqO2L1rdSDuCaN6rcZQi6m0+9ksBVJsLH2ByPeoAdii Feb 2 02:54:23 localhost certmonger[39726]: osVXVaTZuxWnuvtN8k/04+Ah5pmbbU5hkfDryWQeMuJJzgGHXAagSApPvxtFfpTt Feb 2 02:54:23 localhost certmonger[39726]: pVV5VEYkxl9QgxMYFvlZUyrBqrg0eO5TSsbfevDw2Si8dpKu2R1Hbeel1pNQXGGE Feb 2 02:54:23 localhost certmonger[39726]: 34HlbjD74zLBWWB4xJGSHEHTHhjVfdKa2r/b8RCmt996vl/qHOCYWdBM05oKgMRg Feb 2 02:54:23 localhost certmonger[39726]: tzUEPK07B6FrKBd8al/0S0TZwszhIdEGNI8J0QycYYcQI7SXQePP887pteRMLlWq Feb 2 02:54:23 localhost certmonger[39726]: Wz8DUj9bl7ir7i0iT6f/fxsiFz/JPw== Feb 2 02:54:23 localhost certmonger[39726]: -----END CERTIFICATE REQUEST----- Feb 2 02:54:23 localhost certmonger[39726]: " for child. Feb 2 02:54:23 localhost certmonger[39726]: 2026-02-02 07:54:23 [39726] Setting "CERTMONGER_SPKAC" to "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" for child. Feb 2 02:54:23 localhost certmonger[39726]: 2026-02-02 07:54:23 [39726] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsG9QGUlupiTk5G4o/VpVVLJJvrybDB6Xd3N6u3iHmOtTu+pgaNrOpu68CdLAX4q0OQ47x3OVf4HgGkA4UmX9y1Chwksw07YAgkmBJ72RQOmqIqzGraVehOuLBF2hD/yojakiDh8473bkWZeZRZIPZHNYU8bMLqGHH8OfEUTb7pCp0YYqe03/ebCHui54puUY31t9lf3z/+86Fqya+bC3YKLPYPNvUNerBkLAm2auqCT+xinhPF0vHpwnlaLG+T9JAgINmvHuYkSQFBRqy2TDx4OstX4w0+r/WuFP8xnRohDVbAX0C8tObO1As3Fr1aOuSlCGAAzEpkMSdG3MxcYYaQIDAQAB" for child. Feb 2 02:54:23 localhost certmonger[39726]: 2026-02-02 07:54:23 [39726] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 02:54:23 localhost certmonger[39726]: 2026-02-02 07:54:23 [39726] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 02:54:23 localhost certmonger[39726]: 2026-02-02 07:54:23 [39726] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 02:54:23 localhost certmonger[39726]: 2026-02-02 07:54:23 [39726] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 02:54:23 localhost certmonger[39726]: 2026-02-02 07:54:23 [39726] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost certmonger[39726]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost certmonger[39726]: Certificate: "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" Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Certificate submission still ongoing. Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Certificate submission attempt complete. Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Child status = 0. Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Child output: Feb 2 02:54:23 localhost certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 02:54:23 localhost certmonger[39011]: MIIFZTCCA82gAwIBAgIRAOQtWIS2cHR2cOY8hsJBvdEwDQYJKoZIhvcNAQELBQAw Feb 2 02:54:23 localhost certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 02:54:23 localhost certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU0MjNaFw0yODAyMDMwNzU0MjNaMD8xETAPBgNVBAoM Feb 2 02:54:23 localhost certmonger[39011]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 02:54:23 localhost certmonger[39011]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCwb1AZSW6mJOTk Feb 2 02:54:23 localhost certmonger[39011]: bij9WlVUskm+vJsMHpd3c3q7eIeY61O76mBo2s6m7rwJ0sBfirQ5DjvHc5V/geAa Feb 2 02:54:23 localhost certmonger[39011]: QDhSZf3LUKHCSzDTtgCCSYEnvZFA6aoirMatpV6E64sEXaEP/KiNqSIOHzjvduRZ Feb 2 02:54:23 localhost certmonger[39011]: l5lFkg9kc1hTxswuoYcfw58RRNvukKnRhip7Tf95sIe6Lnim5RjfW32V/fP/7zoW Feb 2 02:54:23 localhost certmonger[39011]: rJr5sLdgos9g829Q16sGQsCbZq6oJP7GKeE8XS8enCeVosb5P0kCAg2a8e5iRJAU Feb 2 02:54:23 localhost certmonger[39011]: FGrLZMPHg6y1fjDT6v9a4U/zGdGiENVsBfQLy05s7UCzcWvVo65KUIYADMSmQxJ0 Feb 2 02:54:23 localhost certmonger[39011]: bczFxhhpAgMBAAGjggHmMIIB4jAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 02:54:23 localhost certmonger[39011]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 02:54:23 localhost certmonger[39011]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 02:54:23 localhost certmonger[39011]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 02:54:23 localhost certmonger[39011]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 02:54:23 localhost certmonger[39011]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBRj Feb 2 02:54:23 localhost certmonger[39011]: O6p3pYggDML7+c3qIrRHDvIh3jCBvwYDVR0RBIG3MIG0giFucDAwMDU2MDQ3MjUu Feb 2 02:54:23 localhost certmonger[39011]: aW50ZXJuYWxhcGkub29vLnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAw Feb 2 02:54:23 localhost certmonger[39011]: NTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKg Feb 2 02:54:23 localhost certmonger[39011]: RDBCoAobCE9PTy5URVNUoTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NjA0NzI1 Feb 2 02:54:23 localhost certmonger[39011]: LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQBallSdeREU Feb 2 02:54:23 localhost certmonger[39011]: agUxHNf709HWHcshalGuh+2Hemwc9KUB4EbwivddmYtVLc5pTt/Awoh11jPAPPdd Feb 2 02:54:23 localhost certmonger[39011]: i6T//2mAiNFftKYTQ5OiRgHvDV6s1D3zslLcNd3kJ5whrSgxPHJjmjExkbtnmYIH Feb 2 02:54:23 localhost certmonger[39011]: zLgghh018Ud1qbFrI6SH7vHku0ibBLjKWa+1THdUgrBdEBGD0gl57+3TK2fwYLyH Feb 2 02:54:23 localhost certmonger[39011]: TwQyql9x1kB3sVtlhb9TFMt2H5ThN51ZMdg4lHoMkbElOHSrc/rEVP50PpW61ecg Feb 2 02:54:23 localhost certmonger[39011]: JMGjhMaJ98Xs30Zl7fHoRtdwGYPCwn/pZGlcR+dazpNlSA16HHWCULnWvY+WDqhe Feb 2 02:54:23 localhost certmonger[39011]: 11JEh1j650J+E/BRt3qB1FF5R98LL+WJybq3orcSZhzl4IaMIShIh84uUck1hjXm Feb 2 02:54:23 localhost certmonger[39011]: 0K30t2SfsQ+f7IJvrO/0eMqg8WC7SQc481hiFg2o7eYj7Ya4m1cAgBJg2FzbW657 Feb 2 02:54:23 localhost certmonger[39011]: pTYSHDpdbriyRUiKNnGrf7hTTT3izdrNrFhVbScdZu6kq2S372BynIw= Feb 2 02:54:23 localhost certmonger[39011]: -----END CERTIFICATE----- Feb 2 02:54:23 localhost certmonger[39011]: " Feb 2 02:54:23 localhost certmonger[39728]: 2026-02-02 07:54:23 [39728] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 02:54:23 localhost certmonger[39728]: MIIFZTCCA82gAwIBAgIRAOQtWIS2cHR2cOY8hsJBvdEwDQYJKoZIhvcNAQELBQAw Feb 2 02:54:23 localhost certmonger[39728]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 02:54:23 localhost certmonger[39728]: cml0eTAeFw0yNjAyMDIwNzU0MjNaFw0yODAyMDMwNzU0MjNaMD8xETAPBgNVBAoM Feb 2 02:54:23 localhost certmonger[39728]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 02:54:23 localhost certmonger[39728]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCwb1AZSW6mJOTk Feb 2 02:54:23 localhost certmonger[39728]: bij9WlVUskm+vJsMHpd3c3q7eIeY61O76mBo2s6m7rwJ0sBfirQ5DjvHc5V/geAa Feb 2 02:54:23 localhost certmonger[39728]: QDhSZf3LUKHCSzDTtgCCSYEnvZFA6aoirMatpV6E64sEXaEP/KiNqSIOHzjvduRZ Feb 2 02:54:23 localhost certmonger[39728]: l5lFkg9kc1hTxswuoYcfw58RRNvukKnRhip7Tf95sIe6Lnim5RjfW32V/fP/7zoW Feb 2 02:54:23 localhost certmonger[39728]: rJr5sLdgos9g829Q16sGQsCbZq6oJP7GKeE8XS8enCeVosb5P0kCAg2a8e5iRJAU Feb 2 02:54:23 localhost certmonger[39728]: FGrLZMPHg6y1fjDT6v9a4U/zGdGiENVsBfQLy05s7UCzcWvVo65KUIYADMSmQxJ0 Feb 2 02:54:23 localhost certmonger[39728]: bczFxhhpAgMBAAGjggHmMIIB4jAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 02:54:23 localhost certmonger[39728]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 02:54:23 localhost certmonger[39728]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 02:54:23 localhost certmonger[39728]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 02:54:23 localhost certmonger[39728]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 02:54:23 localhost certmonger[39728]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBRj Feb 2 02:54:23 localhost certmonger[39728]: O6p3pYggDML7+c3qIrRHDvIh3jCBvwYDVR0RBIG3MIG0giFucDAwMDU2MDQ3MjUu Feb 2 02:54:23 localhost certmonger[39728]: aW50ZXJuYWxhcGkub29vLnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAw Feb 2 02:54:23 localhost certmonger[39728]: NTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKg Feb 2 02:54:23 localhost certmonger[39728]: RDBCoAobCE9PTy5URVNUoTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NjA0NzI1 Feb 2 02:54:23 localhost certmonger[39728]: LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQBallSdeREU Feb 2 02:54:23 localhost certmonger[39728]: agUxHNf709HWHcshalGuh+2Hemwc9KUB4EbwivddmYtVLc5pTt/Awoh11jPAPPdd Feb 2 02:54:23 localhost certmonger[39728]: i6T//2mAiNFftKYTQ5OiRgHvDV6s1D3zslLcNd3kJ5whrSgxPHJjmjExkbtnmYIH Feb 2 02:54:23 localhost certmonger[39728]: zLgghh018Ud1qbFrI6SH7vHku0ibBLjKWa+1THdUgrBdEBGD0gl57+3TK2fwYLyH Feb 2 02:54:23 localhost certmonger[39728]: TwQyql9x1kB3sVtlhb9TFMt2H5ThN51ZMdg4lHoMkbElOHSrc/rEVP50PpW61ecg Feb 2 02:54:23 localhost certmonger[39728]: JMGjhMaJ98Xs30Zl7fHoRtdwGYPCwn/pZGlcR+dazpNlSA16HHWCULnWvY+WDqhe Feb 2 02:54:23 localhost certmonger[39728]: 11JEh1j650J+E/BRt3qB1FF5R98LL+WJybq3orcSZhzl4IaMIShIh84uUck1hjXm Feb 2 02:54:23 localhost certmonger[39728]: 0K30t2SfsQ+f7IJvrO/0eMqg8WC7SQc481hiFg2o7eYj7Ya4m1cAgBJg2FzbW657 Feb 2 02:54:23 localhost certmonger[39728]: pTYSHDpdbriyRUiKNnGrf7hTTT3izdrNrFhVbScdZu6kq2S372BynIw= Feb 2 02:54:23 localhost certmonger[39728]: -----END CERTIFICATE----- Feb 2 02:54:23 localhost certmonger[39728]: ". Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Certificate submission still ongoing. Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Certificate submission postprocessing complete. Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Child status = 0. Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Child output: Feb 2 02:54:23 localhost certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----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\npTYSHDpdbriyRUiKNnGrf7hTTT3izdrNrFhVbScdZu6kq2S372BynIw=\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 02:54:23 localhost certmonger[39011]: " Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 02:54:23 localhost certmonger[39011]: MIIFZTCCA82gAwIBAgIRAOQtWIS2cHR2cOY8hsJBvdEwDQYJKoZIhvcNAQELBQAw Feb 2 02:54:23 localhost certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 02:54:23 localhost certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU0MjNaFw0yODAyMDMwNzU0MjNaMD8xETAPBgNVBAoM Feb 2 02:54:23 localhost certmonger[39011]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 02:54:23 localhost certmonger[39011]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCwb1AZSW6mJOTk Feb 2 02:54:23 localhost certmonger[39011]: bij9WlVUskm+vJsMHpd3c3q7eIeY61O76mBo2s6m7rwJ0sBfirQ5DjvHc5V/geAa Feb 2 02:54:23 localhost certmonger[39011]: QDhSZf3LUKHCSzDTtgCCSYEnvZFA6aoirMatpV6E64sEXaEP/KiNqSIOHzjvduRZ Feb 2 02:54:23 localhost certmonger[39011]: l5lFkg9kc1hTxswuoYcfw58RRNvukKnRhip7Tf95sIe6Lnim5RjfW32V/fP/7zoW Feb 2 02:54:23 localhost certmonger[39011]: rJr5sLdgos9g829Q16sGQsCbZq6oJP7GKeE8XS8enCeVosb5P0kCAg2a8e5iRJAU Feb 2 02:54:23 localhost certmonger[39011]: FGrLZMPHg6y1fjDT6v9a4U/zGdGiENVsBfQLy05s7UCzcWvVo65KUIYADMSmQxJ0 Feb 2 02:54:23 localhost certmonger[39011]: bczFxhhpAgMBAAGjggHmMIIB4jAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 02:54:23 localhost certmonger[39011]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 02:54:23 localhost certmonger[39011]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 02:54:23 localhost certmonger[39011]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 02:54:23 localhost certmonger[39011]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 02:54:23 localhost certmonger[39011]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBRj Feb 2 02:54:23 localhost certmonger[39011]: O6p3pYggDML7+c3qIrRHDvIh3jCBvwYDVR0RBIG3MIG0giFucDAwMDU2MDQ3MjUu Feb 2 02:54:23 localhost certmonger[39011]: aW50ZXJuYWxhcGkub29vLnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAw Feb 2 02:54:23 localhost certmonger[39011]: NTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKg Feb 2 02:54:23 localhost certmonger[39011]: RDBCoAobCE9PTy5URVNUoTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NjA0NzI1 Feb 2 02:54:23 localhost certmonger[39011]: LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQBallSdeREU Feb 2 02:54:23 localhost certmonger[39011]: agUxHNf709HWHcshalGuh+2Hemwc9KUB4EbwivddmYtVLc5pTt/Awoh11jPAPPdd Feb 2 02:54:23 localhost certmonger[39011]: i6T//2mAiNFftKYTQ5OiRgHvDV6s1D3zslLcNd3kJ5whrSgxPHJjmjExkbtnmYIH Feb 2 02:54:23 localhost certmonger[39011]: zLgghh018Ud1qbFrI6SH7vHku0ibBLjKWa+1THdUgrBdEBGD0gl57+3TK2fwYLyH Feb 2 02:54:23 localhost certmonger[39011]: TwQyql9x1kB3sVtlhb9TFMt2H5ThN51ZMdg4lHoMkbElOHSrc/rEVP50PpW61ecg Feb 2 02:54:23 localhost certmonger[39011]: JMGjhMaJ98Xs30Zl7fHoRtdwGYPCwn/pZGlcR+dazpNlSA16HHWCULnWvY+WDqhe Feb 2 02:54:23 localhost certmonger[39011]: 11JEh1j650J+E/BRt3qB1FF5R98LL+WJybq3orcSZhzl4IaMIShIh84uUck1hjXm Feb 2 02:54:23 localhost certmonger[39011]: 0K30t2SfsQ+f7IJvrO/0eMqg8WC7SQc481hiFg2o7eYj7Ya4m1cAgBJg2FzbW657 Feb 2 02:54:23 localhost certmonger[39011]: pTYSHDpdbriyRUiKNnGrf7hTTT3izdrNrFhVbScdZu6kq2S372BynIw= Feb 2 02:54:23 localhost certmonger[39011]: -----END CERTIFICATE----- Feb 2 02:54:23 localhost certmonger[39011]: ". Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] No hooks set for pre-save command. Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost certmonger[39736]: Certificate in file "/etc/pki/tls/certs/httpd-internal_api.crt" issued by CA and saved. Feb 2 02:54:23 localhost certmonger[39011]: 2026-02-02 07:54:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075422 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:23 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost python3[39752]: ansible-certificate_request Invoked with name=httpd-external dns=['np0005604725.external.ooo.test'] principal=['HTTP/np0005604725.external.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-external.crt /etc/pki/tls/certs/httpd/httpd-external.crt#012cp /etc/pki/tls/private/httpd-external.key /etc/pki/tls/private/httpd/httpd-external.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost certmonger[39011]: 2026-02-02 07:54:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:24 localhost certmonger[39011]: 2026-02-02 07:54:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:24 localhost certmonger[39011]: 2026-02-02 07:54:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:24 localhost certmonger[39011]: 2026-02-02 07:54:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:24 localhost certmonger[39011]: 2026-02-02 07:54:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:24 localhost certmonger[39011]: 2026-02-02 07:54:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:24 localhost certmonger[39011]: 2026-02-02 07:54:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:24 localhost certmonger[39011]: 2026-02-02 07:54:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:24 localhost certmonger[39011]: 2026-02-02 07:54:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:24 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39762]: 2026-02-02 07:54:25 [39762] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.external.ooo.test" for child. Feb 2 02:54:25 localhost certmonger[39762]: 2026-02-02 07:54:25 [39762] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.external.ooo.test Feb 2 02:54:25 localhost certmonger[39762]: " for child. Feb 2 02:54:25 localhost certmonger[39762]: 2026-02-02 07:54:25 [39762] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005604725.external.ooo.test@OOO.TEST Feb 2 02:54:25 localhost certmonger[39762]: " for child. Feb 2 02:54:25 localhost certmonger[39762]: 2026-02-02 07:54:25 [39762] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 02:54:25 localhost certmonger[39762]: 2026-02-02 07:54:25 [39762] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 02:54:25 localhost certmonger[39762]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NjA0NzI1LmV4dGVybmFsLm9v Feb 2 02:54:25 localhost certmonger[39762]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAhSRHRlD6V2hS Feb 2 02:54:25 localhost certmonger[39762]: iauCYFlulbyfCLtxD7mbm/mz7yfKzZ9e1/mLADGmMjeOfgmTJ+vHU4zkdeMJYSI7 Feb 2 02:54:25 localhost certmonger[39762]: Tmsmyz56fykwIDmq5dm5Ii/CWCxgfJCqdMue4T43jNTDjTAXonaaoghvVnxqe52k Feb 2 02:54:25 localhost certmonger[39762]: mh4i2dOvXOULz5CEN1AUKuBTWDN6IqkuMPyYgcLHTyUHBfubFX9l493Lch/6jWlU Feb 2 02:54:25 localhost certmonger[39762]: wGN2br9q/9Q7vue37VS62XSnhl9v62R2eLqsyQyYAbdrwhPl+Ri5Iy7zxpHftNqJ Feb 2 02:54:25 localhost certmonger[39762]: Sb6y7X7isoBrsUzGpMbOg3KbJVc2lioVeI15hPCuZwlsqOJa/OAQe+pz06V82B8a Feb 2 02:54:25 localhost certmonger[39762]: ApxcusaGfQIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAyADAA Feb 2 02:54:25 localhost certmonger[39762]: MgAwADcANQA0ADIANDCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Feb 2 02:54:25 localhost certmonger[39762]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU2MDQ3MjUuZXh0ZXJuYWwub29vLnRlc3Sg Feb 2 02:54:25 localhost certmonger[39762]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTYwNDcyNS5leHRlcm5hbC5vb28u Feb 2 02:54:25 localhost certmonger[39762]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Feb 2 02:54:25 localhost certmonger[39762]: oSgwJhsESFRUUBsebnAwMDA1NjA0NzI1LmV4dGVybmFsLm9vby50ZXN0MB0GA1Ud Feb 2 02:54:25 localhost certmonger[39762]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Feb 2 02:54:25 localhost certmonger[39762]: BBRDdSNfwL0WikQiJd+wiw0OSG2YkzANBgkqhkiG9w0BAQsFAAOCAQEAF7FV2K14 Feb 2 02:54:25 localhost certmonger[39762]: q4Y6+XVgjWxGihjDsb3zGOAZP7kyI4RYLliOCSGDiI1CBr6xw3qaneknJyB6Wwhs Feb 2 02:54:25 localhost certmonger[39762]: 2S9aWciuC2baiwAf4PkXbfsj9eQ0Leqa7RtkuMS12o4lL6wMughSi6sEBJ976Y7N Feb 2 02:54:25 localhost certmonger[39762]: vSh9UZnLRqcej9wH+/ZyVu724+dqMFivBSDhX/L4uW7ieOlClpSjTAO09qLwE61S Feb 2 02:54:25 localhost certmonger[39762]: zez/r1IsHOpW+0eYEfmoEMwjVYVkMcG1hVZI9cYysQ5+QQggQoG1T1B5XBl0wrFG Feb 2 02:54:25 localhost certmonger[39762]: Qc7/kz2tzALzt8bcSbtcDtdQtW6nXhk4vNHbXeEMfHdBIFesLKad/fPLomCCZt3I Feb 2 02:54:25 localhost certmonger[39762]: g5+BWCRo8g8PEA== Feb 2 02:54:25 localhost certmonger[39762]: -----END CERTIFICATE REQUEST----- Feb 2 02:54:25 localhost certmonger[39762]: " for child. Feb 2 02:54:25 localhost certmonger[39762]: 2026-02-02 07:54:25 [39762] Setting "CERTMONGER_SPKAC" to "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" for child. Feb 2 02:54:25 localhost certmonger[39762]: 2026-02-02 07:54:25 [39762] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAhSRHRlD6V2hSiauCYFlulbyfCLtxD7mbm/mz7yfKzZ9e1/mLADGmMjeOfgmTJ+vHU4zkdeMJYSI7Tmsmyz56fykwIDmq5dm5Ii/CWCxgfJCqdMue4T43jNTDjTAXonaaoghvVnxqe52kmh4i2dOvXOULz5CEN1AUKuBTWDN6IqkuMPyYgcLHTyUHBfubFX9l493Lch/6jWlUwGN2br9q/9Q7vue37VS62XSnhl9v62R2eLqsyQyYAbdrwhPl+Ri5Iy7zxpHftNqJSb6y7X7isoBrsUzGpMbOg3KbJVc2lioVeI15hPCuZwlsqOJa/OAQe+pz06V82B8aApxcusaGfQIDAQAB" for child. Feb 2 02:54:25 localhost certmonger[39762]: 2026-02-02 07:54:25 [39762] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 02:54:25 localhost certmonger[39762]: 2026-02-02 07:54:25 [39762] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 02:54:25 localhost certmonger[39762]: 2026-02-02 07:54:25 [39762] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 02:54:25 localhost certmonger[39762]: 2026-02-02 07:54:25 [39762] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 02:54:25 localhost certmonger[39762]: 2026-02-02 07:54:25 [39762] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39762]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ca82db6-cac5-4491-b94b-02e2a41dfa2a Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6f31b069-22ba-4415-9b51-c41030ff92fa Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost sedispatch[727]: AVC Message regarding setroubleshoot, ignoring message Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f61a942f-9775-43dc-ba2a-352558cc1a85 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost certmonger[39762]: Certificate: "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" Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Certificate submission still ongoing. Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Certificate submission attempt complete. Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Child status = 0. Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Child output: Feb 2 02:54:25 localhost certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 02:54:25 localhost certmonger[39011]: MIIFWDCCA8CgAwIBAgIQZa7Zaafh2zuADLLdW+wkDjANBgkqhkiG9w0BAQsFADAz Feb 2 02:54:25 localhost certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 02:54:25 localhost certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTQyNVoXDTI4MDIwMzA3NTQyNVowPDERMA8GA1UECgwI Feb 2 02:54:25 localhost certmonger[39011]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTYwNDcyNS5leHRlcm5hbC5vb28udGVz Feb 2 02:54:25 localhost certmonger[39011]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIUkR0ZQ+ldoUomrgmBZ Feb 2 02:54:25 localhost certmonger[39011]: bpW8nwi7cQ+5m5v5s+8nys2fXtf5iwAxpjI3jn4Jkyfrx1OM5HXjCWEiO05rJss+ Feb 2 02:54:25 localhost certmonger[39011]: en8pMCA5quXZuSIvwlgsYHyQqnTLnuE+N4zUw40wF6J2mqIIb1Z8anudpJoeItnT Feb 2 02:54:25 localhost certmonger[39011]: r1zlC8+QhDdQFCrgU1gzeiKpLjD8mIHCx08lBwX7mxV/ZePdy3If+o1pVMBjdm6/ Feb 2 02:54:25 localhost certmonger[39011]: av/UO77nt+1Uutl0p4Zfb+tkdni6rMkMmAG3a8IT5fkYuSMu88aR37TaiUm+su1+ Feb 2 02:54:25 localhost certmonger[39011]: 4rKAa7FMxqTGzoNymyVXNpYqFXiNeYTwrmcJbKjiWvzgEHvqc9OlfNgfGgKcXLrG Feb 2 02:54:25 localhost certmonger[39011]: hn0CAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1DkesA+pp Feb 2 02:54:25 localhost certmonger[39011]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:25 localhost certmonger[39011]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Feb 2 02:54:25 localhost certmonger[39011]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:25 localhost certmonger[39011]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Feb 2 02:54:25 localhost certmonger[39011]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKjRANsf Feb 2 02:54:25 localhost certmonger[39011]: RxPlebmkcLhSis3yCHDHMIG2BgNVHREEga4wgauCHm5wMDAwNTYwNDcyNS5leHRl Feb 2 02:54:25 localhost certmonger[39011]: cm5hbC5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NjA0NzI1 Feb 2 02:54:25 localhost certmonger[39011]: LmV4dGVybmFsLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09P Feb 2 02:54:25 localhost certmonger[39011]: LlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU2MDQ3MjUuZXh0ZXJuYWwu Feb 2 02:54:25 localhost certmonger[39011]: b29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAJ2ia5V2HAdLWYdYY5mC3sXnA1KG Feb 2 02:54:25 localhost certmonger[39011]: OF1EVXzyxZ2i+ebNNVXNZhV6KAJpRb5AE1nVqPfWDBtrujeCIehHqG5bcQCdnkrt Feb 2 02:54:25 localhost certmonger[39011]: USpwUz3CNnJW9Fu85dGiAusj00JDyoa4z0GYzBo9ErwCMuzP/+86K+AkRO2kapaz Feb 2 02:54:25 localhost certmonger[39011]: fcy1xQO+WuJwRephJ7jCNSx5xsalffD5YGm0huGnBpnDR/SPqXVaborkPzzvdRRf Feb 2 02:54:25 localhost certmonger[39011]: q4kYvvcyFv5YLYxuhS+J1ekFBQfT8waza3TiV+YyxWfaO0YknmqIZHlvEPCOejpC Feb 2 02:54:25 localhost certmonger[39011]: fxLtjkmGVMiiaPJReAe4WhVa4pI2ysYOePYE9BwOgGXIGggErLc2B8Qri6Lb7iC/ Feb 2 02:54:25 localhost certmonger[39011]: Yg57/GVy8xImBBctyt2pLk5m58rFp/Pt0HlGsQJuXr/DYKCDKGmElRSfuffJfnWf Feb 2 02:54:25 localhost certmonger[39011]: IhSOnjGQ2OwnEKDax5uJ2IOZfg1O169nwZdEofK55hI4SPOAaTFUzWloemAvaeLd Feb 2 02:54:25 localhost certmonger[39011]: aXoyOaQ0ChnHnYDmUnhbME1tJesl2hMRjQjvYQ== Feb 2 02:54:25 localhost certmonger[39011]: -----END CERTIFICATE----- Feb 2 02:54:25 localhost certmonger[39011]: " Feb 2 02:54:25 localhost certmonger[39764]: 2026-02-02 07:54:25 [39764] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 02:54:25 localhost certmonger[39764]: MIIFWDCCA8CgAwIBAgIQZa7Zaafh2zuADLLdW+wkDjANBgkqhkiG9w0BAQsFADAz Feb 2 02:54:25 localhost certmonger[39764]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 02:54:25 localhost certmonger[39764]: aXR5MB4XDTI2MDIwMjA3NTQyNVoXDTI4MDIwMzA3NTQyNVowPDERMA8GA1UECgwI Feb 2 02:54:25 localhost certmonger[39764]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTYwNDcyNS5leHRlcm5hbC5vb28udGVz Feb 2 02:54:25 localhost certmonger[39764]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIUkR0ZQ+ldoUomrgmBZ Feb 2 02:54:25 localhost certmonger[39764]: bpW8nwi7cQ+5m5v5s+8nys2fXtf5iwAxpjI3jn4Jkyfrx1OM5HXjCWEiO05rJss+ Feb 2 02:54:25 localhost certmonger[39764]: en8pMCA5quXZuSIvwlgsYHyQqnTLnuE+N4zUw40wF6J2mqIIb1Z8anudpJoeItnT Feb 2 02:54:25 localhost certmonger[39764]: r1zlC8+QhDdQFCrgU1gzeiKpLjD8mIHCx08lBwX7mxV/ZePdy3If+o1pVMBjdm6/ Feb 2 02:54:25 localhost certmonger[39764]: av/UO77nt+1Uutl0p4Zfb+tkdni6rMkMmAG3a8IT5fkYuSMu88aR37TaiUm+su1+ Feb 2 02:54:25 localhost certmonger[39764]: 4rKAa7FMxqTGzoNymyVXNpYqFXiNeYTwrmcJbKjiWvzgEHvqc9OlfNgfGgKcXLrG Feb 2 02:54:25 localhost certmonger[39764]: hn0CAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1DkesA+pp Feb 2 02:54:25 localhost certmonger[39764]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:25 localhost certmonger[39764]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Feb 2 02:54:25 localhost certmonger[39764]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:25 localhost certmonger[39764]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Feb 2 02:54:25 localhost certmonger[39764]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKjRANsf Feb 2 02:54:25 localhost certmonger[39764]: RxPlebmkcLhSis3yCHDHMIG2BgNVHREEga4wgauCHm5wMDAwNTYwNDcyNS5leHRl Feb 2 02:54:25 localhost certmonger[39764]: cm5hbC5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NjA0NzI1 Feb 2 02:54:25 localhost certmonger[39764]: LmV4dGVybmFsLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09P Feb 2 02:54:25 localhost certmonger[39764]: LlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU2MDQ3MjUuZXh0ZXJuYWwu Feb 2 02:54:25 localhost certmonger[39764]: b29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAJ2ia5V2HAdLWYdYY5mC3sXnA1KG Feb 2 02:54:25 localhost certmonger[39764]: OF1EVXzyxZ2i+ebNNVXNZhV6KAJpRb5AE1nVqPfWDBtrujeCIehHqG5bcQCdnkrt Feb 2 02:54:25 localhost certmonger[39764]: USpwUz3CNnJW9Fu85dGiAusj00JDyoa4z0GYzBo9ErwCMuzP/+86K+AkRO2kapaz Feb 2 02:54:25 localhost certmonger[39764]: fcy1xQO+WuJwRephJ7jCNSx5xsalffD5YGm0huGnBpnDR/SPqXVaborkPzzvdRRf Feb 2 02:54:25 localhost certmonger[39764]: q4kYvvcyFv5YLYxuhS+J1ekFBQfT8waza3TiV+YyxWfaO0YknmqIZHlvEPCOejpC Feb 2 02:54:25 localhost certmonger[39764]: fxLtjkmGVMiiaPJReAe4WhVa4pI2ysYOePYE9BwOgGXIGggErLc2B8Qri6Lb7iC/ Feb 2 02:54:25 localhost certmonger[39764]: Yg57/GVy8xImBBctyt2pLk5m58rFp/Pt0HlGsQJuXr/DYKCDKGmElRSfuffJfnWf Feb 2 02:54:25 localhost certmonger[39764]: IhSOnjGQ2OwnEKDax5uJ2IOZfg1O169nwZdEofK55hI4SPOAaTFUzWloemAvaeLd Feb 2 02:54:25 localhost certmonger[39764]: aXoyOaQ0ChnHnYDmUnhbME1tJesl2hMRjQjvYQ== Feb 2 02:54:25 localhost certmonger[39764]: -----END CERTIFICATE----- Feb 2 02:54:25 localhost certmonger[39764]: ". Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Certificate submission still ongoing. Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Certificate submission postprocessing complete. Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Child status = 0. Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Child output: Feb 2 02:54:25 localhost certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----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\naXoyOaQ0ChnHnYDmUnhbME1tJesl2hMRjQjvYQ==\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 02:54:25 localhost certmonger[39011]: " Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 02:54:25 localhost certmonger[39011]: MIIFWDCCA8CgAwIBAgIQZa7Zaafh2zuADLLdW+wkDjANBgkqhkiG9w0BAQsFADAz Feb 2 02:54:25 localhost certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 02:54:25 localhost certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTQyNVoXDTI4MDIwMzA3NTQyNVowPDERMA8GA1UECgwI Feb 2 02:54:25 localhost certmonger[39011]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTYwNDcyNS5leHRlcm5hbC5vb28udGVz Feb 2 02:54:25 localhost certmonger[39011]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIUkR0ZQ+ldoUomrgmBZ Feb 2 02:54:25 localhost certmonger[39011]: bpW8nwi7cQ+5m5v5s+8nys2fXtf5iwAxpjI3jn4Jkyfrx1OM5HXjCWEiO05rJss+ Feb 2 02:54:25 localhost certmonger[39011]: en8pMCA5quXZuSIvwlgsYHyQqnTLnuE+N4zUw40wF6J2mqIIb1Z8anudpJoeItnT Feb 2 02:54:25 localhost certmonger[39011]: r1zlC8+QhDdQFCrgU1gzeiKpLjD8mIHCx08lBwX7mxV/ZePdy3If+o1pVMBjdm6/ Feb 2 02:54:25 localhost certmonger[39011]: av/UO77nt+1Uutl0p4Zfb+tkdni6rMkMmAG3a8IT5fkYuSMu88aR37TaiUm+su1+ Feb 2 02:54:25 localhost certmonger[39011]: 4rKAa7FMxqTGzoNymyVXNpYqFXiNeYTwrmcJbKjiWvzgEHvqc9OlfNgfGgKcXLrG Feb 2 02:54:25 localhost certmonger[39011]: hn0CAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1DkesA+pp Feb 2 02:54:25 localhost certmonger[39011]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:25 localhost certmonger[39011]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Feb 2 02:54:25 localhost certmonger[39011]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Feb 2 02:54:25 localhost certmonger[39011]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Feb 2 02:54:25 localhost certmonger[39011]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKjRANsf Feb 2 02:54:25 localhost certmonger[39011]: RxPlebmkcLhSis3yCHDHMIG2BgNVHREEga4wgauCHm5wMDAwNTYwNDcyNS5leHRl Feb 2 02:54:25 localhost certmonger[39011]: cm5hbC5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NjA0NzI1 Feb 2 02:54:25 localhost certmonger[39011]: LmV4dGVybmFsLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09P Feb 2 02:54:25 localhost certmonger[39011]: LlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU2MDQ3MjUuZXh0ZXJuYWwu Feb 2 02:54:25 localhost certmonger[39011]: b29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAJ2ia5V2HAdLWYdYY5mC3sXnA1KG Feb 2 02:54:25 localhost certmonger[39011]: OF1EVXzyxZ2i+ebNNVXNZhV6KAJpRb5AE1nVqPfWDBtrujeCIehHqG5bcQCdnkrt Feb 2 02:54:25 localhost certmonger[39011]: USpwUz3CNnJW9Fu85dGiAusj00JDyoa4z0GYzBo9ErwCMuzP/+86K+AkRO2kapaz Feb 2 02:54:25 localhost certmonger[39011]: fcy1xQO+WuJwRephJ7jCNSx5xsalffD5YGm0huGnBpnDR/SPqXVaborkPzzvdRRf Feb 2 02:54:25 localhost certmonger[39011]: q4kYvvcyFv5YLYxuhS+J1ekFBQfT8waza3TiV+YyxWfaO0YknmqIZHlvEPCOejpC Feb 2 02:54:25 localhost certmonger[39011]: fxLtjkmGVMiiaPJReAe4WhVa4pI2ysYOePYE9BwOgGXIGggErLc2B8Qri6Lb7iC/ Feb 2 02:54:25 localhost certmonger[39011]: Yg57/GVy8xImBBctyt2pLk5m58rFp/Pt0HlGsQJuXr/DYKCDKGmElRSfuffJfnWf Feb 2 02:54:25 localhost certmonger[39011]: IhSOnjGQ2OwnEKDax5uJ2IOZfg1O169nwZdEofK55hI4SPOAaTFUzWloemAvaeLd Feb 2 02:54:25 localhost certmonger[39011]: aXoyOaQ0ChnHnYDmUnhbME1tJesl2hMRjQjvYQ== Feb 2 02:54:25 localhost certmonger[39011]: -----END CERTIFICATE----- Feb 2 02:54:25 localhost certmonger[39011]: ". Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] No hooks set for pre-save command. Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 85f262c7-c808-4424-92f5-34ce94d24045 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost certmonger[39772]: Certificate in file "/etc/pki/tls/certs/httpd-external.crt" issued by CA and saved. Feb 2 02:54:25 localhost certmonger[39011]: 2026-02-02 07:54:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075424 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 85f262c7-c808-4424-92f5-34ce94d24045 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8a1ed71e-8109-47fa-a618-28f205479cdd Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8a1ed71e-8109-47fa-a618-28f205479cdd Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5074b064-d670-458d-976c-35c221e60d9a Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ca82db6-cac5-4491-b94b-02e2a41dfa2a Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b8d705e4-3b3f-4bfb-8497-1b0e6954dd3b Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 786f950f-eb94-4850-b8eb-beb23eb8f132 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a45551a0-3877-4491-8584-b55cac85153d Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9e1298b4-25e1-446c-91be-5a0fb75715b8 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 172d6434-fadd-4fbe-8a9b-9daa358b6fc3 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 172d6434-fadd-4fbe-8a9b-9daa358b6fc3 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 77fb7b43-af24-4180-a892-a56bb188c72a Feb 2 02:54:25 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b8d705e4-3b3f-4bfb-8497-1b0e6954dd3b Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7a391459-4d98-45e8-be25-d4bd44f6b889 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f9f338d7-dd4c-4a63-9c06-d99f539c07d5 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f9f338d7-dd4c-4a63-9c06-d99f539c07d5 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2401e850-6062-4f54-b94c-0556fe3ded99 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost python3[39788]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 14a24048-0fb1-4202-bfaf-c4b148fe234e Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 14a24048-0fb1-4202-bfaf-c4b148fe234e Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 598807b5-d66d-4164-90de-30d83576fcd9 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:26 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 598807b5-d66d-4164-90de-30d83576fcd9 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:27 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost sedispatch[727]: AVC Message regarding setroubleshoot, ignoring message Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:28 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:29 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost kernel: VFS: idmapped mount is not enabled. Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost sedispatch[727]: AVC Message regarding setroubleshoot, ignoring message Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:30 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:31 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:32 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac0a2efe-f50e-4157-82d5-998d2d3cbac7 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost sedispatch[727]: AVC Message regarding setroubleshoot, ignoring message Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c9d3da5d-7298-41a8-a6ba-c2d2e1402471 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a89d43b1-9b25-4670-85dc-1964f960d375 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 598807b5-d66d-4164-90de-30d83576fcd9 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:33 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ca82db6-cac5-4491-b94b-02e2a41dfa2a Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6f31b069-22ba-4415-9b51-c41030ff92fa Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f61a942f-9775-43dc-ba2a-352558cc1a85 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 85f262c7-c808-4424-92f5-34ce94d24045 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 85f262c7-c808-4424-92f5-34ce94d24045 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8a1ed71e-8109-47fa-a618-28f205479cdd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8a1ed71e-8109-47fa-a618-28f205479cdd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5074b064-d670-458d-976c-35c221e60d9a Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ca82db6-cac5-4491-b94b-02e2a41dfa2a Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b8d705e4-3b3f-4bfb-8497-1b0e6954dd3b Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 786f950f-eb94-4850-b8eb-beb23eb8f132 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a45551a0-3877-4491-8584-b55cac85153d Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9e1298b4-25e1-446c-91be-5a0fb75715b8 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 172d6434-fadd-4fbe-8a9b-9daa358b6fc3 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 172d6434-fadd-4fbe-8a9b-9daa358b6fc3 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 77fb7b43-af24-4180-a892-a56bb188c72a Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b8d705e4-3b3f-4bfb-8497-1b0e6954dd3b Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7a391459-4d98-45e8-be25-d4bd44f6b889 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f9f338d7-dd4c-4a63-9c06-d99f539c07d5 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f9f338d7-dd4c-4a63-9c06-d99f539c07d5 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2401e850-6062-4f54-b94c-0556fe3ded99 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 14a24048-0fb1-4202-bfaf-c4b148fe234e Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 14a24048-0fb1-4202-bfaf-c4b148fe234e Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 598807b5-d66d-4164-90de-30d83576fcd9 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 598807b5-d66d-4164-90de-30d83576fcd9 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:34 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac0a2efe-f50e-4157-82d5-998d2d3cbac7 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c9d3da5d-7298-41a8-a6ba-c2d2e1402471 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a89d43b1-9b25-4670-85dc-1964f960d375 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 598807b5-d66d-4164-90de-30d83576fcd9 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a1fa9158-493d-4822-ad29-1b8fc0a32618 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ca82db6-cac5-4491-b94b-02e2a41dfa2a Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6f31b069-22ba-4415-9b51-c41030ff92fa Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f61a942f-9775-43dc-ba2a-352558cc1a85 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 85f262c7-c808-4424-92f5-34ce94d24045 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 85f262c7-c808-4424-92f5-34ce94d24045 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8a1ed71e-8109-47fa-a618-28f205479cdd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8a1ed71e-8109-47fa-a618-28f205479cdd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5074b064-d670-458d-976c-35c221e60d9a Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ca82db6-cac5-4491-b94b-02e2a41dfa2a Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b8d705e4-3b3f-4bfb-8497-1b0e6954dd3b Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 786f950f-eb94-4850-b8eb-beb23eb8f132 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a45551a0-3877-4491-8584-b55cac85153d Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9e1298b4-25e1-446c-91be-5a0fb75715b8 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 172d6434-fadd-4fbe-8a9b-9daa358b6fc3 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 172d6434-fadd-4fbe-8a9b-9daa358b6fc3 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 77fb7b43-af24-4180-a892-a56bb188c72a Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b8d705e4-3b3f-4bfb-8497-1b0e6954dd3b Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7a391459-4d98-45e8-be25-d4bd44f6b889 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f9f338d7-dd4c-4a63-9c06-d99f539c07d5 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f9f338d7-dd4c-4a63-9c06-d99f539c07d5 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2401e850-6062-4f54-b94c-0556fe3ded99 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 598807b5-d66d-4164-90de-30d83576fcd9 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 598807b5-d66d-4164-90de-30d83576fcd9 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:35 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c9d3da5d-7298-41a8-a6ba-c2d2e1402471 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a89d43b1-9b25-4670-85dc-1964f960d375 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 598807b5-d66d-4164-90de-30d83576fcd9 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a1fa9158-493d-4822-ad29-1b8fc0a32618 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ca82db6-cac5-4491-b94b-02e2a41dfa2a Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6f31b069-22ba-4415-9b51-c41030ff92fa Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f61a942f-9775-43dc-ba2a-352558cc1a85 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 85f262c7-c808-4424-92f5-34ce94d24045 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 85f262c7-c808-4424-92f5-34ce94d24045 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8a1ed71e-8109-47fa-a618-28f205479cdd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8a1ed71e-8109-47fa-a618-28f205479cdd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5074b064-d670-458d-976c-35c221e60d9a Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ca82db6-cac5-4491-b94b-02e2a41dfa2a Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b8d705e4-3b3f-4bfb-8497-1b0e6954dd3b Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 77fb7b43-af24-4180-a892-a56bb188c72a Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b8d705e4-3b3f-4bfb-8497-1b0e6954dd3b Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7a391459-4d98-45e8-be25-d4bd44f6b889 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f9f338d7-dd4c-4a63-9c06-d99f539c07d5 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f9f338d7-dd4c-4a63-9c06-d99f539c07d5 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2401e850-6062-4f54-b94c-0556fe3ded99 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 14a24048-0fb1-4202-bfaf-c4b148fe234e Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 14a24048-0fb1-4202-bfaf-c4b148fe234e Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 598807b5-d66d-4164-90de-30d83576fcd9 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 598807b5-d66d-4164-90de-30d83576fcd9 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:36 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac0a2efe-f50e-4157-82d5-998d2d3cbac7 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c9d3da5d-7298-41a8-a6ba-c2d2e1402471 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a89d43b1-9b25-4670-85dc-1964f960d375 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 598807b5-d66d-4164-90de-30d83576fcd9 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a1fa9158-493d-4822-ad29-1b8fc0a32618 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ca82db6-cac5-4491-b94b-02e2a41dfa2a Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6f31b069-22ba-4415-9b51-c41030ff92fa Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f61a942f-9775-43dc-ba2a-352558cc1a85 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 85f262c7-c808-4424-92f5-34ce94d24045 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 85f262c7-c808-4424-92f5-34ce94d24045 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8a1ed71e-8109-47fa-a618-28f205479cdd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8a1ed71e-8109-47fa-a618-28f205479cdd Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5074b064-d670-458d-976c-35c221e60d9a Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ca82db6-cac5-4491-b94b-02e2a41dfa2a Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b8d705e4-3b3f-4bfb-8497-1b0e6954dd3b Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 786f950f-eb94-4850-b8eb-beb23eb8f132 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a45551a0-3877-4491-8584-b55cac85153d Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9e1298b4-25e1-446c-91be-5a0fb75715b8 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 172d6434-fadd-4fbe-8a9b-9daa358b6fc3 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 172d6434-fadd-4fbe-8a9b-9daa358b6fc3 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:37 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 77fb7b43-af24-4180-a892-a56bb188c72a Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b8d705e4-3b3f-4bfb-8497-1b0e6954dd3b Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7a391459-4d98-45e8-be25-d4bd44f6b889 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f9f338d7-dd4c-4a63-9c06-d99f539c07d5 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f9f338d7-dd4c-4a63-9c06-d99f539c07d5 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2401e850-6062-4f54-b94c-0556fe3ded99 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 14a24048-0fb1-4202-bfaf-c4b148fe234e Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 14a24048-0fb1-4202-bfaf-c4b148fe234e Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 598807b5-d66d-4164-90de-30d83576fcd9 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 598807b5-d66d-4164-90de-30d83576fcd9 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac0a2efe-f50e-4157-82d5-998d2d3cbac7 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c9d3da5d-7298-41a8-a6ba-c2d2e1402471 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be2dfc1b-cbea-4c55-ace7-13e229da37cd Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a89d43b1-9b25-4670-85dc-1964f960d375 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7062c57-b5ce-4a61-828f-fb574e9acd25 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 598807b5-d66d-4164-90de-30d83576fcd9 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a1fa9158-493d-4822-ad29-1b8fc0a32618 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79aab21f-d11a-408c-ae37-32c5613d5ffb Feb 2 02:54:38 localhost setroubleshoot[39622]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Feb 2 02:54:40 localhost podman[39789]: 2026-02-02 07:54:26.382666088 +0000 UTC m=+0.050074088 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 Feb 2 02:54:40 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 02:54:40 localhost python3[39903]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 cluster.common.tag/cinder-backup:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:54:40 localhost podman[39904]: 2026-02-02 07:54:40.60216126 +0000 UTC m=+0.038848878 image tag 8778bf815403ad609bba0db728b48b06803e16f59a6611aa872ed829d22e5dff cluster.common.tag/cinder-backup:pcmklatest Feb 2 02:54:40 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 02:54:41 localhost python3[39933]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:54:44 localhost podman[39934]: 2026-02-02 07:54:41.271085233 +0000 UTC m=+0.047812066 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 Feb 2 02:54:45 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 02:54:45 localhost python3[40000]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 cluster.common.tag/cinder-volume:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:54:45 localhost podman[40001]: 2026-02-02 07:54:45.463020655 +0000 UTC m=+0.046281130 image tag 9d7e73f3c621e8ed8cb4df18422498c037360127ffb3244364fadcf4c909aa66 cluster.common.tag/cinder-volume:pcmklatest Feb 2 02:54:45 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 02:54:46 localhost python3[40028]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active rsyslog _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 02:54:46 localhost python3[40045]: ansible-blockinfile Invoked with content=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 create=True path=/etc/rsyslog.d/openstack-haproxy.conf block=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:54:46 np0005604725 python3[40061]: ansible-ansible.legacy.systemd Invoked with name=rsyslog state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Feb 2 07:54:47 np0005604725 systemd[1]: Stopping System Logging Service... Feb 2 07:54:47 np0005604725 rsyslogd[758]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="758" x-info="https://www.rsyslog.com"] exiting on signal 15. Feb 2 07:54:47 np0005604725 systemd[1]: rsyslog.service: Deactivated successfully. Feb 2 07:54:47 np0005604725 systemd[1]: Stopped System Logging Service. Feb 2 07:54:47 np0005604725 systemd[1]: rsyslog.service: Consumed 1.306s CPU time, read 920.0K from disk, written 3.4M to disk. Feb 2 07:54:47 np0005604725 systemd[1]: Starting System Logging Service... Feb 2 07:54:47 np0005604725 rsyslogd[40064]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="40064" x-info="https://www.rsyslog.com"] start Feb 2 07:54:47 np0005604725 systemd[1]: Started System Logging Service. Feb 2 07:54:47 np0005604725 rsyslogd[40064]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Feb 2 07:54:47 np0005604725 python3[40083]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 07:54:48 np0005604725 systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Feb 2 07:54:48 np0005604725 systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.849s CPU time. Feb 2 07:54:49 np0005604725 systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 2 07:54:49 np0005604725 systemd[1]: setroubleshootd.service: Consumed 19.002s CPU time. Feb 2 07:54:52 np0005604725 podman[40084]: 2026-02-02 07:54:48.042685123 +0000 UTC m=+0.048228451 image pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Feb 2 07:54:52 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:54:52 np0005604725 python3[40150]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 cluster.common.tag/haproxy:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 07:54:52 np0005604725 podman[40151]: 2026-02-02 07:54:52.650536299 +0000 UTC m=+0.031324771 image tag 86df3e140b7b746fad293f0d95dd48dd7a064454a56f93c98960b9ebd7490eda cluster.common.tag/haproxy:pcmklatest Feb 2 07:54:52 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:54:53 np0005604725 python3[40178]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:54:56 np0005604725 python3[40195]: ansible-systemd Invoked with enabled=True masked=False name=certmonger.service state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None Feb 2 07:54:56 np0005604725 python3[40214]: ansible-file Invoked with path=/etc/pki/tls/certs/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Feb 2 07:54:57 np0005604725 python3[40230]: ansible-file Invoked with path=/etc/pki/tls/private/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Feb 2 07:54:57 np0005604725 python3[40246]: ansible-ansible.legacy.command Invoked with _raw_params=set -e#012ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012chmod 0644 ${ca_pem}#012update-ca-trust extract#012test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 07:54:59 np0005604725 python3[40272]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 07:54:59 np0005604725 python3[40292]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:55:03 np0005604725 python3[40309]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:55:08 np0005604725 python3[40577]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:55:08 np0005604725 python3[40593]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:55:09 np0005604725 python3[40609]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 07:55:10 np0005604725 python3[40627]: ansible-certificate_request Invoked with name=haproxy-external-cert dns=['overcloud.ooo.test'] ip=[] principal=['haproxy/overcloud.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-external-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012cp "/etc/pki/tls/private/haproxy-external-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012#012ca_type=ipa#012if [ "$ca_type" = "self-sign" ]; then#012 # refresh the ca cert just in case the ca cert has been renewed#012 ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012 openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012 chmod 0644 ${ca_pem}#012 update-ca-trust extract#012 test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 openssl x509 -in ${ca_pem} -out /tmp/cm-local-ca.pem#012 ca_path="/tmp/cm-local-ca.pem"#012else#012 ca_path="/etc/ipa/ca.crt"#012fi#012#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012service_pem="/etc/pki/tls/private/overcloud_endpoint.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[40637]: 2026-02-02 07:55:10 [40637] Setting "CERTMONGER_REQ_SUBJECT" to "CN=overcloud.ooo.test" for child. Feb 2 07:55:10 np0005604725 certmonger[40637]: 2026-02-02 07:55:10 [40637] Setting "CERTMONGER_REQ_HOSTNAME" to "overcloud.ooo.test Feb 2 07:55:10 np0005604725 certmonger[40637]: " for child. Feb 2 07:55:10 np0005604725 certmonger[40637]: 2026-02-02 07:55:10 [40637] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/overcloud.ooo.test@OOO.TEST Feb 2 07:55:10 np0005604725 certmonger[40637]: " for child. Feb 2 07:55:10 np0005604725 certmonger[40637]: 2026-02-02 07:55:10 [40637] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 07:55:10 np0005604725 certmonger[40637]: 2026-02-02 07:55:10 [40637] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 07:55:10 np0005604725 certmonger[40637]: MIIDmjCCAoICAQAwHTEbMBkGA1UEAxMSb3ZlcmNsb3VkLm9vby50ZXN0MIIBIjAN Feb 2 07:55:10 np0005604725 certmonger[40637]: BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAszKIampptgM10zV5zhmeoFJpdsYH Feb 2 07:55:10 np0005604725 certmonger[40637]: 0/ADPzvjx6KBc6uZ+D6gOk/dXr0AhnLmAqLMYj1ilF+KGlHarVZHyOIQO0BOvtu4 Feb 2 07:55:10 np0005604725 certmonger[40637]: ALvXkF41IpoZX3yXm2Hf/O2sk4SYEZt2OtHmjz0QrkiJx3LAfZvCu78iibfaPCov Feb 2 07:55:10 np0005604725 certmonger[40637]: xWAreGBAklpsj+tkdjYmKs0K5EO4UNuaZUWzsmuLuRLgiUnZDHgSqz3Mxt7VnBrH Feb 2 07:55:10 np0005604725 certmonger[40637]: jYffHFAtnU8OdcLVLX8XcbHbp9yF4itg577kZaC2YX5a01Hdg6knqkTutqroFOBb Feb 2 07:55:10 np0005604725 certmonger[40637]: 3PYJOWHtfhRJ50ZQWpQX14RaXwYdRFc4ArpDsoFoR+042v/TivVcS3F+pQIDAQAB Feb 2 07:55:10 np0005604725 certmonger[40637]: oIIBNjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAyADAAMgAwADcANQA1ADEA Feb 2 07:55:10 np0005604725 certmonger[40637]: MDCCAQUGCSqGSIb3DQEJDjGB9zCB9DALBgNVHQ8EBAMCBaAwgZgGA1UdEQSBkDCB Feb 2 07:55:10 np0005604725 certmonger[40637]: jYISb3ZlcmNsb3VkLm9vby50ZXN0oDMGCisGAQQBgjcUAgOgJQwjaGFwcm94eS9v Feb 2 07:55:10 np0005604725 certmonger[40637]: dmVyY2xvdWQub29vLnRlc3RAT09PLlRFU1SgQgYGKwYBBQICoDgwNqAKGwhPT08u Feb 2 07:55:10 np0005604725 certmonger[40637]: VEVTVKEoMCagAwIBAaEfMB0bB2hhcHJveHkbEm92ZXJjbG91ZC5vb28udGVzdDAd Feb 2 07:55:10 np0005604725 certmonger[40637]: BgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNV Feb 2 07:55:10 np0005604725 certmonger[40637]: HQ4EFgQUYaMeaxvk9w3tgSw5n4a0oWxAU60wDQYJKoZIhvcNAQELBQADggEBAAFt Feb 2 07:55:10 np0005604725 certmonger[40637]: SF3yE4QvGNHXU8gmd4MXe4Daq/6FaBWYw98hpESbTV7+GysjFzcM55NcxBVVWO0C Feb 2 07:55:10 np0005604725 certmonger[40637]: 8xW1oZ8QH7WWtAQt3lCISSr1KBNw3u7drWI8DpMCvnnlaGqhorvsDTTp2X4Bdeg4 Feb 2 07:55:10 np0005604725 certmonger[40637]: LpnYuAaDeBgFWhmFpHO0VowzF8d/o7m4A8hAea6I1czKotO/ahBKmw2SHWAT8Rud Feb 2 07:55:10 np0005604725 certmonger[40637]: ++ven6OtFdDtpjGks2kqX0epiigDU4tK/QruWpFUntlrZ/EOVk6KdcRsLwkS96Hh Feb 2 07:55:10 np0005604725 certmonger[40637]: mxk/Ix7BvFWPMy4aoQA8C6IwHZvzYMxpPAkNa3r0JU5zVMdm7jlwT8vZ2ZmMYfCR Feb 2 07:55:10 np0005604725 certmonger[40637]: wW8EezZ6L+U8+5/pBOE= Feb 2 07:55:10 np0005604725 certmonger[40637]: -----END CERTIFICATE REQUEST----- Feb 2 07:55:10 np0005604725 certmonger[40637]: " for child. Feb 2 07:55:10 np0005604725 certmonger[40637]: 2026-02-02 07:55:10 [40637] Setting "CERTMONGER_SPKAC" to "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" for child. Feb 2 07:55:10 np0005604725 certmonger[40637]: 2026-02-02 07:55:10 [40637] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAszKIampptgM10zV5zhmeoFJpdsYH0/ADPzvjx6KBc6uZ+D6gOk/dXr0AhnLmAqLMYj1ilF+KGlHarVZHyOIQO0BOvtu4ALvXkF41IpoZX3yXm2Hf/O2sk4SYEZt2OtHmjz0QrkiJx3LAfZvCu78iibfaPCovxWAreGBAklpsj+tkdjYmKs0K5EO4UNuaZUWzsmuLuRLgiUnZDHgSqz3Mxt7VnBrHjYffHFAtnU8OdcLVLX8XcbHbp9yF4itg577kZaC2YX5a01Hdg6knqkTutqroFOBb3PYJOWHtfhRJ50ZQWpQX14RaXwYdRFc4ArpDsoFoR+042v/TivVcS3F+pQIDAQAB" for child. Feb 2 07:55:10 np0005604725 certmonger[40637]: 2026-02-02 07:55:10 [40637] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 07:55:10 np0005604725 certmonger[40637]: 2026-02-02 07:55:10 [40637] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 07:55:10 np0005604725 certmonger[40637]: 2026-02-02 07:55:10 [40637] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 07:55:10 np0005604725 certmonger[40637]: 2026-02-02 07:55:10 [40637] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 07:55:10 np0005604725 certmonger[40637]: 2026-02-02 07:55:10 [40637] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[40637]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 07:55:10 np0005604725 certmonger[40637]: Certificate: "MIIFLjCCA5agAwIBAgIQf1J6xs6o5iZf3kLOXFxufjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI2MDIwMjA3NTUxMFoXDTI4MDIwMzA3NTUxMFowMDERMA8GA1UECgwIT09PLlRFU1QxGzAZBgNVBAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALMyiGpqabYDNdM1ec4ZnqBSaXbGB9PwAz8748eigXOrmfg+oDpP3V69AIZy5gKizGI9YpRfihpR2q1WR8jiEDtATr7buAC715BeNSKaGV98l5th3/ztrJOEmBGbdjrR5o89EK5IicdywH2bwru/Iom32jwqL8VgK3hgQJJabI/rZHY2JirNCuRDuFDbmmVFs7Jri7kS4IlJ2Qx4Eqs9zMbe1Zwax42H3xxQLZ1PDnXC1S1/F3Gx26fcheIrYOe+5GWgtmF+WtNR3YOpJ6pE7raq6BTgW9z2CTlh7X4USedGUFqUF9eEWl8GHURXOAK6Q7KBaEftONr/04r1XEtxfqUCAwEAAaOCAb8wggG7MB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1DkesA+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKMu/8t9Hdtvow/PNdeGpvqBUiI+MIGYBgNVHREEgZAwgY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3FAIDoCUMI2hhcHJveHkvb3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisGAQUCAqA4MDagChsIT09PLlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVyY2xvdWQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBALBgW4so/rODzICXfO02QCTP6Fj1uIh7tVSI+GxIatSHkU1Jc0e0WP8mY+cELPEJb/l92zlwqFMF2z9yLsmlGZYwJKJGnSvp8c+/HoQeqJp/dZnHJ4KvXMjSplMFreNkeLjro/vJQQD8Owp7NFm/P1lisdmmJLSKZW/g6zFbsTq5gJQWCzFzUdAiAc8hAepiSGnodyaCObNFrc6aESmQTiw19pnrh9sytI8RkZ2Bb/LM3IaEvJyXWx+SgN0c04Xto0fZttBF8jk0Br+bDxCzoH2/piwHJm30bhH7I+qpEvU6bk4czKCb41QFwCGZg6qN86vfs5CE7gpKwKo/omAKR7Rva4ZFVPeh0L2DgTGD0wQQt86fIVUj9Wg8kunjqDrxdEfri90Kk/xNaGSiq0YLiYrvy2v7gT/67Zo9+p2qKhA60RJQWyUcmNBSpIANkn481xV+ufXWojwoGsKqIFz9b6BdkLoS87xLUSLfKnybR4hugA9mRKX6E9iLqrXbS2uTxQ==" Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Certificate submission still ongoing. Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Certificate submission attempt complete. Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Child status = 0. Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Child output: Feb 2 07:55:10 np0005604725 certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 07:55:10 np0005604725 certmonger[39011]: MIIFLjCCA5agAwIBAgIQf1J6xs6o5iZf3kLOXFxufjANBgkqhkiG9w0BAQsFADAz Feb 2 07:55:10 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:55:10 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTUxMFoXDTI4MDIwMzA3NTUxMFowMDERMA8GA1UECgwI Feb 2 07:55:10 np0005604725 certmonger[39011]: T09PLlRFU1QxGzAZBgNVBAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZI Feb 2 07:55:10 np0005604725 certmonger[39011]: hvcNAQEBBQADggEPADCCAQoCggEBALMyiGpqabYDNdM1ec4ZnqBSaXbGB9PwAz87 Feb 2 07:55:10 np0005604725 certmonger[39011]: 48eigXOrmfg+oDpP3V69AIZy5gKizGI9YpRfihpR2q1WR8jiEDtATr7buAC715Be Feb 2 07:55:10 np0005604725 certmonger[39011]: NSKaGV98l5th3/ztrJOEmBGbdjrR5o89EK5IicdywH2bwru/Iom32jwqL8VgK3hg Feb 2 07:55:10 np0005604725 certmonger[39011]: QJJabI/rZHY2JirNCuRDuFDbmmVFs7Jri7kS4IlJ2Qx4Eqs9zMbe1Zwax42H3xxQ Feb 2 07:55:10 np0005604725 certmonger[39011]: LZ1PDnXC1S1/F3Gx26fcheIrYOe+5GWgtmF+WtNR3YOpJ6pE7raq6BTgW9z2CTlh Feb 2 07:55:10 np0005604725 certmonger[39011]: 7X4USedGUFqUF9eEWl8GHURXOAK6Q7KBaEftONr/04r1XEtxfqUCAwEAAaOCAb8w Feb 2 07:55:10 np0005604725 certmonger[39011]: ggG7MB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1DkesA+ppMDoGCCsGAQUFBwEB Feb 2 07:55:10 np0005604725 certmonger[39011]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Feb 2 07:55:10 np0005604725 certmonger[39011]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Feb 2 07:55:10 np0005604725 certmonger[39011]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Feb 2 07:55:10 np0005604725 certmonger[39011]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Feb 2 07:55:10 np0005604725 certmonger[39011]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKMu/8t9Hdtvow/PNdeGpvqB Feb 2 07:55:10 np0005604725 certmonger[39011]: UiI+MIGYBgNVHREEgZAwgY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3 Feb 2 07:55:10 np0005604725 certmonger[39011]: FAIDoCUMI2hhcHJveHkvb3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisG Feb 2 07:55:10 np0005604725 certmonger[39011]: AQUCAqA4MDagChsIT09PLlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVy Feb 2 07:55:10 np0005604725 certmonger[39011]: Y2xvdWQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBALBgW4so/rODzICXfO02 Feb 2 07:55:10 np0005604725 certmonger[39011]: QCTP6Fj1uIh7tVSI+GxIatSHkU1Jc0e0WP8mY+cELPEJb/l92zlwqFMF2z9yLsml Feb 2 07:55:10 np0005604725 certmonger[39011]: GZYwJKJGnSvp8c+/HoQeqJp/dZnHJ4KvXMjSplMFreNkeLjro/vJQQD8Owp7NFm/ Feb 2 07:55:10 np0005604725 certmonger[39011]: P1lisdmmJLSKZW/g6zFbsTq5gJQWCzFzUdAiAc8hAepiSGnodyaCObNFrc6aESmQ Feb 2 07:55:10 np0005604725 certmonger[39011]: Tiw19pnrh9sytI8RkZ2Bb/LM3IaEvJyXWx+SgN0c04Xto0fZttBF8jk0Br+bDxCz Feb 2 07:55:10 np0005604725 certmonger[39011]: oH2/piwHJm30bhH7I+qpEvU6bk4czKCb41QFwCGZg6qN86vfs5CE7gpKwKo/omAK Feb 2 07:55:10 np0005604725 certmonger[39011]: R7Rva4ZFVPeh0L2DgTGD0wQQt86fIVUj9Wg8kunjqDrxdEfri90Kk/xNaGSiq0YL Feb 2 07:55:10 np0005604725 certmonger[39011]: iYrvy2v7gT/67Zo9+p2qKhA60RJQWyUcmNBSpIANkn481xV+ufXWojwoGsKqIFz9 Feb 2 07:55:10 np0005604725 certmonger[39011]: b6BdkLoS87xLUSLfKnybR4hugA9mRKX6E9iLqrXbS2uTxQ== Feb 2 07:55:10 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:55:10 np0005604725 certmonger[39011]: " Feb 2 07:55:10 np0005604725 certmonger[40639]: 2026-02-02 07:55:10 [40639] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 07:55:10 np0005604725 certmonger[40639]: MIIFLjCCA5agAwIBAgIQf1J6xs6o5iZf3kLOXFxufjANBgkqhkiG9w0BAQsFADAz Feb 2 07:55:10 np0005604725 certmonger[40639]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:55:10 np0005604725 certmonger[40639]: aXR5MB4XDTI2MDIwMjA3NTUxMFoXDTI4MDIwMzA3NTUxMFowMDERMA8GA1UECgwI Feb 2 07:55:10 np0005604725 certmonger[40639]: T09PLlRFU1QxGzAZBgNVBAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZI Feb 2 07:55:10 np0005604725 certmonger[40639]: hvcNAQEBBQADggEPADCCAQoCggEBALMyiGpqabYDNdM1ec4ZnqBSaXbGB9PwAz87 Feb 2 07:55:10 np0005604725 certmonger[40639]: 48eigXOrmfg+oDpP3V69AIZy5gKizGI9YpRfihpR2q1WR8jiEDtATr7buAC715Be Feb 2 07:55:10 np0005604725 certmonger[40639]: NSKaGV98l5th3/ztrJOEmBGbdjrR5o89EK5IicdywH2bwru/Iom32jwqL8VgK3hg Feb 2 07:55:10 np0005604725 certmonger[40639]: QJJabI/rZHY2JirNCuRDuFDbmmVFs7Jri7kS4IlJ2Qx4Eqs9zMbe1Zwax42H3xxQ Feb 2 07:55:10 np0005604725 certmonger[40639]: LZ1PDnXC1S1/F3Gx26fcheIrYOe+5GWgtmF+WtNR3YOpJ6pE7raq6BTgW9z2CTlh Feb 2 07:55:10 np0005604725 certmonger[40639]: 7X4USedGUFqUF9eEWl8GHURXOAK6Q7KBaEftONr/04r1XEtxfqUCAwEAAaOCAb8w Feb 2 07:55:10 np0005604725 certmonger[40639]: ggG7MB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1DkesA+ppMDoGCCsGAQUFBwEB Feb 2 07:55:10 np0005604725 certmonger[40639]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Feb 2 07:55:10 np0005604725 certmonger[40639]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Feb 2 07:55:10 np0005604725 certmonger[40639]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Feb 2 07:55:10 np0005604725 certmonger[40639]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Feb 2 07:55:10 np0005604725 certmonger[40639]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKMu/8t9Hdtvow/PNdeGpvqB Feb 2 07:55:10 np0005604725 certmonger[40639]: UiI+MIGYBgNVHREEgZAwgY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3 Feb 2 07:55:10 np0005604725 certmonger[40639]: FAIDoCUMI2hhcHJveHkvb3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisG Feb 2 07:55:10 np0005604725 certmonger[40639]: AQUCAqA4MDagChsIT09PLlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVy Feb 2 07:55:10 np0005604725 certmonger[40639]: Y2xvdWQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBALBgW4so/rODzICXfO02 Feb 2 07:55:10 np0005604725 certmonger[40639]: QCTP6Fj1uIh7tVSI+GxIatSHkU1Jc0e0WP8mY+cELPEJb/l92zlwqFMF2z9yLsml Feb 2 07:55:10 np0005604725 certmonger[40639]: GZYwJKJGnSvp8c+/HoQeqJp/dZnHJ4KvXMjSplMFreNkeLjro/vJQQD8Owp7NFm/ Feb 2 07:55:10 np0005604725 certmonger[40639]: P1lisdmmJLSKZW/g6zFbsTq5gJQWCzFzUdAiAc8hAepiSGnodyaCObNFrc6aESmQ Feb 2 07:55:10 np0005604725 certmonger[40639]: Tiw19pnrh9sytI8RkZ2Bb/LM3IaEvJyXWx+SgN0c04Xto0fZttBF8jk0Br+bDxCz Feb 2 07:55:10 np0005604725 certmonger[40639]: oH2/piwHJm30bhH7I+qpEvU6bk4czKCb41QFwCGZg6qN86vfs5CE7gpKwKo/omAK Feb 2 07:55:10 np0005604725 certmonger[40639]: R7Rva4ZFVPeh0L2DgTGD0wQQt86fIVUj9Wg8kunjqDrxdEfri90Kk/xNaGSiq0YL Feb 2 07:55:10 np0005604725 certmonger[40639]: iYrvy2v7gT/67Zo9+p2qKhA60RJQWyUcmNBSpIANkn481xV+ufXWojwoGsKqIFz9 Feb 2 07:55:10 np0005604725 certmonger[40639]: b6BdkLoS87xLUSLfKnybR4hugA9mRKX6E9iLqrXbS2uTxQ== Feb 2 07:55:10 np0005604725 certmonger[40639]: -----END CERTIFICATE----- Feb 2 07:55:10 np0005604725 certmonger[40639]: ". Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Certificate submission still ongoing. Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Certificate submission postprocessing complete. Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Child status = 0. Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Child output: Feb 2 07:55:10 np0005604725 certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFLjCCA5agAwIBAgIQf1J6xs6o5iZf3kLOXFxufjANBgkqhkiG9w0BAQsFADAz\nMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y\naXR5MB4XDTI2MDIwMjA3NTUxMFoXDTI4MDIwMzA3NTUxMFowMDERMA8GA1UECgwI\nT09PLlRFU1QxGzAZBgNVBAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBALMyiGpqabYDNdM1ec4ZnqBSaXbGB9PwAz87\n48eigXOrmfg+oDpP3V69AIZy5gKizGI9YpRfihpR2q1WR8jiEDtATr7buAC715Be\nNSKaGV98l5th3/ztrJOEmBGbdjrR5o89EK5IicdywH2bwru/Iom32jwqL8VgK3hg\nQJJabI/rZHY2JirNCuRDuFDbmmVFs7Jri7kS4IlJ2Qx4Eqs9zMbe1Zwax42H3xxQ\nLZ1PDnXC1S1/F3Gx26fcheIrYOe+5GWgtmF+WtNR3YOpJ6pE7raq6BTgW9z2CTlh\n7X4USedGUFqUF9eEWl8GHURXOAK6Q7KBaEftONr/04r1XEtxfqUCAwEAAaOCAb8w\nggG7MB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1DkesA+ppMDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKMu/8t9Hdtvow/PNdeGpvqB\nUiI+MIGYBgNVHREEgZAwgY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3\nFAIDoCUMI2hhcHJveHkvb3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisG\nAQUCAqA4MDagChsIT09PLlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVy\nY2xvdWQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBALBgW4so/rODzICXfO02\nQCTP6Fj1uIh7tVSI+GxIatSHkU1Jc0e0WP8mY+cELPEJb/l92zlwqFMF2z9yLsml\nGZYwJKJGnSvp8c+/HoQeqJp/dZnHJ4KvXMjSplMFreNkeLjro/vJQQD8Owp7NFm/\nP1lisdmmJLSKZW/g6zFbsTq5gJQWCzFzUdAiAc8hAepiSGnodyaCObNFrc6aESmQ\nTiw19pnrh9sytI8RkZ2Bb/LM3IaEvJyXWx+SgN0c04Xto0fZttBF8jk0Br+bDxCz\noH2/piwHJm30bhH7I+qpEvU6bk4czKCb41QFwCGZg6qN86vfs5CE7gpKwKo/omAK\nR7Rva4ZFVPeh0L2DgTGD0wQQt86fIVUj9Wg8kunjqDrxdEfri90Kk/xNaGSiq0YL\niYrvy2v7gT/67Zo9+p2qKhA60RJQWyUcmNBSpIANkn481xV+ufXWojwoGsKqIFz9\nb6BdkLoS87xLUSLfKnybR4hugA9mRKX6E9iLqrXbS2uTxQ==\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 07:55:10 np0005604725 certmonger[39011]: " Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 07:55:10 np0005604725 certmonger[39011]: MIIFLjCCA5agAwIBAgIQf1J6xs6o5iZf3kLOXFxufjANBgkqhkiG9w0BAQsFADAz Feb 2 07:55:10 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:55:10 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTUxMFoXDTI4MDIwMzA3NTUxMFowMDERMA8GA1UECgwI Feb 2 07:55:10 np0005604725 certmonger[39011]: T09PLlRFU1QxGzAZBgNVBAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZI Feb 2 07:55:10 np0005604725 certmonger[39011]: hvcNAQEBBQADggEPADCCAQoCggEBALMyiGpqabYDNdM1ec4ZnqBSaXbGB9PwAz87 Feb 2 07:55:10 np0005604725 certmonger[39011]: 48eigXOrmfg+oDpP3V69AIZy5gKizGI9YpRfihpR2q1WR8jiEDtATr7buAC715Be Feb 2 07:55:10 np0005604725 certmonger[39011]: NSKaGV98l5th3/ztrJOEmBGbdjrR5o89EK5IicdywH2bwru/Iom32jwqL8VgK3hg Feb 2 07:55:10 np0005604725 certmonger[39011]: QJJabI/rZHY2JirNCuRDuFDbmmVFs7Jri7kS4IlJ2Qx4Eqs9zMbe1Zwax42H3xxQ Feb 2 07:55:10 np0005604725 certmonger[39011]: LZ1PDnXC1S1/F3Gx26fcheIrYOe+5GWgtmF+WtNR3YOpJ6pE7raq6BTgW9z2CTlh Feb 2 07:55:10 np0005604725 certmonger[39011]: 7X4USedGUFqUF9eEWl8GHURXOAK6Q7KBaEftONr/04r1XEtxfqUCAwEAAaOCAb8w Feb 2 07:55:10 np0005604725 certmonger[39011]: ggG7MB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1DkesA+ppMDoGCCsGAQUFBwEB Feb 2 07:55:10 np0005604725 certmonger[39011]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Feb 2 07:55:10 np0005604725 certmonger[39011]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Feb 2 07:55:10 np0005604725 certmonger[39011]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Feb 2 07:55:10 np0005604725 certmonger[39011]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Feb 2 07:55:10 np0005604725 certmonger[39011]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKMu/8t9Hdtvow/PNdeGpvqB Feb 2 07:55:10 np0005604725 certmonger[39011]: UiI+MIGYBgNVHREEgZAwgY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3 Feb 2 07:55:10 np0005604725 certmonger[39011]: FAIDoCUMI2hhcHJveHkvb3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisG Feb 2 07:55:10 np0005604725 certmonger[39011]: AQUCAqA4MDagChsIT09PLlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVy Feb 2 07:55:10 np0005604725 certmonger[39011]: Y2xvdWQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBALBgW4so/rODzICXfO02 Feb 2 07:55:10 np0005604725 certmonger[39011]: QCTP6Fj1uIh7tVSI+GxIatSHkU1Jc0e0WP8mY+cELPEJb/l92zlwqFMF2z9yLsml Feb 2 07:55:10 np0005604725 certmonger[39011]: GZYwJKJGnSvp8c+/HoQeqJp/dZnHJ4KvXMjSplMFreNkeLjro/vJQQD8Owp7NFm/ Feb 2 07:55:10 np0005604725 certmonger[39011]: P1lisdmmJLSKZW/g6zFbsTq5gJQWCzFzUdAiAc8hAepiSGnodyaCObNFrc6aESmQ Feb 2 07:55:10 np0005604725 certmonger[39011]: Tiw19pnrh9sytI8RkZ2Bb/LM3IaEvJyXWx+SgN0c04Xto0fZttBF8jk0Br+bDxCz Feb 2 07:55:10 np0005604725 certmonger[39011]: oH2/piwHJm30bhH7I+qpEvU6bk4czKCb41QFwCGZg6qN86vfs5CE7gpKwKo/omAK Feb 2 07:55:10 np0005604725 certmonger[39011]: R7Rva4ZFVPeh0L2DgTGD0wQQt86fIVUj9Wg8kunjqDrxdEfri90Kk/xNaGSiq0YL Feb 2 07:55:10 np0005604725 certmonger[39011]: iYrvy2v7gT/67Zo9+p2qKhA60RJQWyUcmNBSpIANkn481xV+ufXWojwoGsKqIFz9 Feb 2 07:55:10 np0005604725 certmonger[39011]: b6BdkLoS87xLUSLfKnybR4hugA9mRKX6E9iLqrXbS2uTxQ== Feb 2 07:55:10 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:55:10 np0005604725 certmonger[39011]: ". Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] No hooks set for pre-save command. Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:10 np0005604725 certmonger[39011]: 2026-02-02 07:55:10 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:11 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:11 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:11 np0005604725 certmonger[39011]: 2026-02-02 07:55:11 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:11 np0005604725 certmonger[39011]: 2026-02-02 07:55:11 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:11 np0005604725 certmonger[40708]: Certificate in file "/etc/pki/tls/certs/haproxy-external-cert.crt" issued by CA and saved. Feb 2 07:55:11 np0005604725 certmonger[39011]: 2026-02-02 07:55:11 [39011] Wrote to /var/lib/certmonger/requests/20260202075510 Feb 2 07:55:12 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:13 np0005604725 python3[40724]: ansible-file Invoked with path=/etc/pki/tls/certs/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Feb 2 07:55:13 np0005604725 python3[40741]: ansible-file Invoked with path=/etc/pki/tls/private/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Feb 2 07:55:14 np0005604725 python3[40757]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 07:55:15 np0005604725 python3[40777]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:55:18 np0005604725 python3[40794]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:55:21 np0005604725 python3[40811]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:55:22 np0005604725 python3[40827]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:55:23 np0005604725 python3[40843]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 07:55:23 np0005604725 python3[40861]: ansible-certificate_request Invoked with name=haproxy-ctlplane-cert dns=['np0005604725.ctlplane.ooo.test', 'overcloud.ctlplane.ooo.test'] principal=['haproxy/np0005604725.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-ctlplane-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.crt"#012cp "/etc/pki/tls/private/haproxy-ctlplane-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-ctlplane.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-ctlplane.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 07:55:23 np0005604725 certmonger[39011]: 2026-02-02 07:55:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:23 np0005604725 certmonger[39011]: 2026-02-02 07:55:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:23 np0005604725 certmonger[39011]: 2026-02-02 07:55:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:23 np0005604725 certmonger[39011]: 2026-02-02 07:55:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:23 np0005604725 certmonger[39011]: 2026-02-02 07:55:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:23 np0005604725 certmonger[39011]: 2026-02-02 07:55:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:23 np0005604725 certmonger[39011]: 2026-02-02 07:55:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:23 np0005604725 certmonger[39011]: 2026-02-02 07:55:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:23 np0005604725 certmonger[39011]: 2026-02-02 07:55:23 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:24 np0005604725 certmonger[39011]: 2026-02-02 07:55:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:24 np0005604725 certmonger[39011]: 2026-02-02 07:55:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:24 np0005604725 certmonger[39011]: 2026-02-02 07:55:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:24 np0005604725 certmonger[39011]: 2026-02-02 07:55:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:24 np0005604725 certmonger[39011]: 2026-02-02 07:55:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:24 np0005604725 certmonger[39011]: 2026-02-02 07:55:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:24 np0005604725 certmonger[39011]: 2026-02-02 07:55:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:24 np0005604725 certmonger[39011]: 2026-02-02 07:55:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:24 np0005604725 certmonger[40871]: 2026-02-02 07:55:24 [40871] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.ctlplane.ooo.test" for child. Feb 2 07:55:24 np0005604725 certmonger[40871]: 2026-02-02 07:55:24 [40871] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.ctlplane.ooo.test Feb 2 07:55:24 np0005604725 certmonger[40871]: overcloud.ctlplane.ooo.test Feb 2 07:55:24 np0005604725 certmonger[40871]: " for child. Feb 2 07:55:24 np0005604725 certmonger[40871]: 2026-02-02 07:55:24 [40871] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005604725.ctlplane.ooo.test@OOO.TEST Feb 2 07:55:24 np0005604725 certmonger[40871]: " for child. Feb 2 07:55:24 np0005604725 certmonger[40871]: 2026-02-02 07:55:24 [40871] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 07:55:24 np0005604725 certmonger[40871]: 2026-02-02 07:55:24 [40871] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 07:55:24 np0005604725 certmonger[40871]: MIID6TCCAtECAQAwKTEnMCUGA1UEAxMebnAwMDA1NjA0NzI1LmN0bHBsYW5lLm9v Feb 2 07:55:24 np0005604725 certmonger[40871]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA37QCFTOgR7wb Feb 2 07:55:24 np0005604725 certmonger[40871]: uHNmsJkygcreyr0viUpJRy25VNaQ1WGuxlim1OWAPE3KOM1MBM6VodW616by4ca4 Feb 2 07:55:24 np0005604725 certmonger[40871]: Ni3BvLKMqft9Wnxh9fphaI0BwnfoK3rg4lBKt1bf7Ohu7KHKZW3wnZ37VzHfR/NJ Feb 2 07:55:24 np0005604725 certmonger[40871]: Yv7InPRM36+ZEpR0cX+Q+cURYArZkLddbAcausImmg/3PFYpQ8zt42F+NJ8HLfcr Feb 2 07:55:24 np0005604725 certmonger[40871]: G9nkhcIOoxyVbbiWX4S1SaCnk6TtYGf7Z1ScTpTuFH2fx8thjj3aDyyjGvWLIpPJ Feb 2 07:55:24 np0005604725 certmonger[40871]: lVOPsJDwWiL8ea0/C2J2q3F/tafcZjJWLDGzkx6iSN0rxYxAWoKT/IXPpxbGjHdH Feb 2 07:55:24 np0005604725 certmonger[40871]: eQBSgmnuRQIDAQABoIIBeTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAyADAA Feb 2 07:55:24 np0005604725 certmonger[40871]: MgAwADcANQA1ADIAMzCCAUgGCSqGSIb3DQEJDjGCATkwggE1MAsGA1UdDwQEAwIF Feb 2 07:55:24 np0005604725 certmonger[40871]: oDCB2QYDVR0RBIHRMIHOgh5ucDAwMDU2MDQ3MjUuY3RscGxhbmUub29vLnRlc3SC Feb 2 07:55:24 np0005604725 certmonger[40871]: G292ZXJjbG91ZC5jdGxwbGFuZS5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML2hh Feb 2 07:55:24 np0005604725 certmonger[40871]: cHJveHkvbnAwMDA1NjA0NzI1LmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoE4G Feb 2 07:55:24 np0005604725 certmonger[40871]: BisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwdoYXByb3h5Gx5u Feb 2 07:55:24 np0005604725 certmonger[40871]: cDAwMDU2MDQ3MjUuY3RscGxhbmUub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUH Feb 2 07:55:24 np0005604725 certmonger[40871]: AwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFCN+FOJoTYBjFnPv Feb 2 07:55:24 np0005604725 certmonger[40871]: RULkejzBNTlxMA0GCSqGSIb3DQEBCwUAA4IBAQDRoBLPmDq0BQ5+faOOL7q5vchj Feb 2 07:55:24 np0005604725 certmonger[40871]: dL0aoSPKi049cXqEHg35lkw5OWqmBsgrgqLiFd8mRXONiSGRiMEWG7bmCGrp6qOa Feb 2 07:55:24 np0005604725 certmonger[40871]: PESnvx3bVg0Wg+901JBVvfItu9G1ezwXgLgKhdXEYhouK/mX74/SF05IL/cZoP1P Feb 2 07:55:24 np0005604725 certmonger[40871]: LfhSh/Qw7pQK+PwNVcnk/7LP87qNNk4r7U1zcftHo6WCRLEDWbEiuViZEhTrmmwU Feb 2 07:55:24 np0005604725 certmonger[40871]: 88uu1i06hAnx1l39jCMujaUL/2QdQEzw4UVyxPAqopQW2Hwbcwvr5/GFYwAY0kUS Feb 2 07:55:24 np0005604725 certmonger[40871]: 2y/WpBmQKOf1DgnM1pOXL22gA4DTtx5ZucNLPypm9cvoaSA7+uPagfaLDXrM Feb 2 07:55:24 np0005604725 certmonger[40871]: -----END CERTIFICATE REQUEST----- Feb 2 07:55:24 np0005604725 certmonger[40871]: " for child. Feb 2 07:55:24 np0005604725 certmonger[40871]: 2026-02-02 07:55:24 [40871] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDftAIVM6BHvBu4c2awmTKByt7KvS+JSklHLblU1pDVYa7GWKbU5YA8Tco4zUwEzpWh1brXpvLhxrg2LcG8soyp+31afGH1+mFojQHCd+greuDiUEq3Vt/s6G7socplbfCdnftXMd9H80li/sic9Ezfr5kSlHRxf5D5xRFgCtmQt11sBxq6wiaaD/c8VilDzO3jYX40nwct9ysb2eSFwg6jHJVtuJZfhLVJoKeTpO1gZ/tnVJxOlO4UfZ/Hy2GOPdoPLKMa9Ysik8mVU4+wkPBaIvx5rT8LYnarcX+1p9xmMlYsMbOTHqJI3SvFjEBagpP8hc+nFsaMd0d5AFKCae5FAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAo5sy4F7CahQ9Q1UzQlWLTYncJ8M82N1Uh7hUJ7pP2o5YbN9IjS+eoy7k3z9bmk/KEq9O29RxYzLP8KBrw1gIAjIU7LZSKUzqD/qDuvmmREcG0qGGS39r0prq0rm9ZKHi+113WkkWS/Dl9efxHUConx4AQIS3lel+Ekov/lb2cDA4eOjhWIZmYR69q7iqKrGp39rWJqu63rB7X8HndIxoONzCCD5r1WBvtTdbMOWtSILwWPXzOCQDiw9BXctw8bTTYrz00nuGoXA+pgCjhZXi2i1fXrSJHzFmXKUVPnXyrZtn8UYH+0Q5As6yfuAMUQ+axzPNuWnJYmWa4TCKrV6B/g==" for child. Feb 2 07:55:24 np0005604725 certmonger[40871]: 2026-02-02 07:55:24 [40871] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA37QCFTOgR7wbuHNmsJkygcreyr0viUpJRy25VNaQ1WGuxlim1OWAPE3KOM1MBM6VodW616by4ca4Ni3BvLKMqft9Wnxh9fphaI0BwnfoK3rg4lBKt1bf7Ohu7KHKZW3wnZ37VzHfR/NJYv7InPRM36+ZEpR0cX+Q+cURYArZkLddbAcausImmg/3PFYpQ8zt42F+NJ8HLfcrG9nkhcIOoxyVbbiWX4S1SaCnk6TtYGf7Z1ScTpTuFH2fx8thjj3aDyyjGvWLIpPJlVOPsJDwWiL8ea0/C2J2q3F/tafcZjJWLDGzkx6iSN0rxYxAWoKT/IXPpxbGjHdHeQBSgmnuRQIDAQAB" for child. Feb 2 07:55:24 np0005604725 certmonger[40871]: 2026-02-02 07:55:24 [40871] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 07:55:24 np0005604725 certmonger[40871]: 2026-02-02 07:55:24 [40871] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 07:55:24 np0005604725 certmonger[40871]: 2026-02-02 07:55:24 [40871] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 07:55:24 np0005604725 certmonger[40871]: 2026-02-02 07:55:24 [40871] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 07:55:24 np0005604725 certmonger[40871]: 2026-02-02 07:55:24 [40871] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 07:55:24 np0005604725 certmonger[39011]: 2026-02-02 07:55:24 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:24 np0005604725 certmonger[40871]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 07:55:25 np0005604725 certmonger[40871]: Certificate: "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" Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Certificate submission still ongoing. Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Certificate submission attempt complete. Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Child status = 0. Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Child output: Feb 2 07:55:25 np0005604725 certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 07:55:25 np0005604725 certmonger[39011]: MIIFfDCCA+SgAwIBAgIRAPXmWz2JbWZJ0yZ1MCLIcsQwDQYJKoZIhvcNAQELBQAw Feb 2 07:55:25 np0005604725 certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:55:25 np0005604725 certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU1MjRaFw0yODAyMDMwNzU1MjRaMDwxETAPBgNVBAoM Feb 2 07:55:25 np0005604725 certmonger[39011]: CE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU2MDQ3MjUuY3RscGxhbmUub29vLnRl Feb 2 07:55:25 np0005604725 certmonger[39011]: c3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDftAIVM6BHvBu4c2aw Feb 2 07:55:25 np0005604725 certmonger[39011]: mTKByt7KvS+JSklHLblU1pDVYa7GWKbU5YA8Tco4zUwEzpWh1brXpvLhxrg2LcG8 Feb 2 07:55:25 np0005604725 certmonger[39011]: soyp+31afGH1+mFojQHCd+greuDiUEq3Vt/s6G7socplbfCdnftXMd9H80li/sic Feb 2 07:55:25 np0005604725 certmonger[39011]: 9Ezfr5kSlHRxf5D5xRFgCtmQt11sBxq6wiaaD/c8VilDzO3jYX40nwct9ysb2eSF Feb 2 07:55:25 np0005604725 certmonger[39011]: wg6jHJVtuJZfhLVJoKeTpO1gZ/tnVJxOlO4UfZ/Hy2GOPdoPLKMa9Ysik8mVU4+w Feb 2 07:55:25 np0005604725 certmonger[39011]: kPBaIvx5rT8LYnarcX+1p9xmMlYsMbOTHqJI3SvFjEBagpP8hc+nFsaMd0d5AFKC Feb 2 07:55:25 np0005604725 certmonger[39011]: ae5FAgMBAAGjggIAMIIB/DAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5HrAPq Feb 2 07:55:25 np0005604725 certmonger[39011]: aTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v Feb 2 07:55:25 np0005604725 certmonger[39011]: LnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH Feb 2 07:55:25 np0005604725 certmonger[39011]: AwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v Feb 2 07:55:25 np0005604725 certmonger[39011]: LnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj Feb 2 07:55:25 np0005604725 certmonger[39011]: YTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBR+6rti Feb 2 07:55:25 np0005604725 certmonger[39011]: 0/hE+zBq5WWh1ajkx0Hb3TCB2QYDVR0RBIHRMIHOgh5ucDAwMDU2MDQ3MjUuY3Rs Feb 2 07:55:25 np0005604725 certmonger[39011]: cGxhbmUub29vLnRlc3SCG292ZXJjbG91ZC5jdGxwbGFuZS5vb28udGVzdKA/Bgor Feb 2 07:55:25 np0005604725 certmonger[39011]: BgEEAYI3FAIDoDEML2hhcHJveHkvbnAwMDA1NjA0NzI1LmN0bHBsYW5lLm9vby50 Feb 2 07:55:25 np0005604725 certmonger[39011]: ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGh Feb 2 07:55:25 np0005604725 certmonger[39011]: KzApGwdoYXByb3h5Gx5ucDAwMDU2MDQ3MjUuY3RscGxhbmUub29vLnRlc3QwDQYJ Feb 2 07:55:25 np0005604725 certmonger[39011]: KoZIhvcNAQELBQADggGBAFqIGqyRRkjU3Uk24nkjUPFBkNDOTMjtS4DK5QiTbR9c Feb 2 07:55:25 np0005604725 certmonger[39011]: Bhs76t4n1yYTuTUPrr3acOSXOF5KZ6FmhJpbuBV2pwkj4u8iihrPwi9ZRbMupBMQ Feb 2 07:55:25 np0005604725 certmonger[39011]: Zk1Yl2N+1g7XZB0GbNKVjTv5UVgRkYp3valHSQdxiuWRG/XTXYD5eoGOGLNxKXAH Feb 2 07:55:25 np0005604725 certmonger[39011]: A0J0UnAVlHswVsP5W/PRsJc6ZeCsY5wxrdhgnvl1G20kITC8a7VeiRufKqvoWHix Feb 2 07:55:25 np0005604725 certmonger[39011]: cW+NxC/ITMv5t6dWvWbmo8/aZP7m/v/7p3+Uhon3VqhVad18GbPz+frdwF9H4+S6 Feb 2 07:55:25 np0005604725 certmonger[39011]: K0rtLtvdqlThRkW+cdZtSFSTfdQJbGycFgIDkYeOZtt6+lRiGmJYMNSk+k8ClLMh Feb 2 07:55:25 np0005604725 certmonger[39011]: IlcCW0tx/YRyNLgELXUn/fdCXwniAyrOttUdb38dR+iGe0E7aLPOD0VFAI3T+zwa Feb 2 07:55:25 np0005604725 certmonger[39011]: 2l/dj4UqEwnr+KXzZ8ewuQ24CmLN/xTn1wzMOejW5aXbNZ2T9UpCxOaJ/UYytE65 Feb 2 07:55:25 np0005604725 certmonger[39011]: hX+ipp5UdGpAKvcIUrGKDQ== Feb 2 07:55:25 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:55:25 np0005604725 certmonger[39011]: " Feb 2 07:55:25 np0005604725 certmonger[40873]: 2026-02-02 07:55:25 [40873] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 07:55:25 np0005604725 certmonger[40873]: MIIFfDCCA+SgAwIBAgIRAPXmWz2JbWZJ0yZ1MCLIcsQwDQYJKoZIhvcNAQELBQAw Feb 2 07:55:25 np0005604725 certmonger[40873]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:55:25 np0005604725 certmonger[40873]: cml0eTAeFw0yNjAyMDIwNzU1MjRaFw0yODAyMDMwNzU1MjRaMDwxETAPBgNVBAoM Feb 2 07:55:25 np0005604725 certmonger[40873]: CE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU2MDQ3MjUuY3RscGxhbmUub29vLnRl Feb 2 07:55:25 np0005604725 certmonger[40873]: c3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDftAIVM6BHvBu4c2aw Feb 2 07:55:25 np0005604725 certmonger[40873]: mTKByt7KvS+JSklHLblU1pDVYa7GWKbU5YA8Tco4zUwEzpWh1brXpvLhxrg2LcG8 Feb 2 07:55:25 np0005604725 certmonger[40873]: soyp+31afGH1+mFojQHCd+greuDiUEq3Vt/s6G7socplbfCdnftXMd9H80li/sic Feb 2 07:55:25 np0005604725 certmonger[40873]: 9Ezfr5kSlHRxf5D5xRFgCtmQt11sBxq6wiaaD/c8VilDzO3jYX40nwct9ysb2eSF Feb 2 07:55:25 np0005604725 certmonger[40873]: wg6jHJVtuJZfhLVJoKeTpO1gZ/tnVJxOlO4UfZ/Hy2GOPdoPLKMa9Ysik8mVU4+w Feb 2 07:55:25 np0005604725 certmonger[40873]: kPBaIvx5rT8LYnarcX+1p9xmMlYsMbOTHqJI3SvFjEBagpP8hc+nFsaMd0d5AFKC Feb 2 07:55:25 np0005604725 certmonger[40873]: ae5FAgMBAAGjggIAMIIB/DAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5HrAPq Feb 2 07:55:25 np0005604725 certmonger[40873]: aTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v Feb 2 07:55:25 np0005604725 certmonger[40873]: LnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH Feb 2 07:55:25 np0005604725 certmonger[40873]: AwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v Feb 2 07:55:25 np0005604725 certmonger[40873]: LnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj Feb 2 07:55:25 np0005604725 certmonger[40873]: YTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBR+6rti Feb 2 07:55:25 np0005604725 certmonger[40873]: 0/hE+zBq5WWh1ajkx0Hb3TCB2QYDVR0RBIHRMIHOgh5ucDAwMDU2MDQ3MjUuY3Rs Feb 2 07:55:25 np0005604725 certmonger[40873]: cGxhbmUub29vLnRlc3SCG292ZXJjbG91ZC5jdGxwbGFuZS5vb28udGVzdKA/Bgor Feb 2 07:55:25 np0005604725 certmonger[40873]: BgEEAYI3FAIDoDEML2hhcHJveHkvbnAwMDA1NjA0NzI1LmN0bHBsYW5lLm9vby50 Feb 2 07:55:25 np0005604725 certmonger[40873]: ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGh Feb 2 07:55:25 np0005604725 certmonger[40873]: KzApGwdoYXByb3h5Gx5ucDAwMDU2MDQ3MjUuY3RscGxhbmUub29vLnRlc3QwDQYJ Feb 2 07:55:25 np0005604725 certmonger[40873]: KoZIhvcNAQELBQADggGBAFqIGqyRRkjU3Uk24nkjUPFBkNDOTMjtS4DK5QiTbR9c Feb 2 07:55:25 np0005604725 certmonger[40873]: Bhs76t4n1yYTuTUPrr3acOSXOF5KZ6FmhJpbuBV2pwkj4u8iihrPwi9ZRbMupBMQ Feb 2 07:55:25 np0005604725 certmonger[40873]: Zk1Yl2N+1g7XZB0GbNKVjTv5UVgRkYp3valHSQdxiuWRG/XTXYD5eoGOGLNxKXAH Feb 2 07:55:25 np0005604725 certmonger[40873]: A0J0UnAVlHswVsP5W/PRsJc6ZeCsY5wxrdhgnvl1G20kITC8a7VeiRufKqvoWHix Feb 2 07:55:25 np0005604725 certmonger[40873]: cW+NxC/ITMv5t6dWvWbmo8/aZP7m/v/7p3+Uhon3VqhVad18GbPz+frdwF9H4+S6 Feb 2 07:55:25 np0005604725 certmonger[40873]: K0rtLtvdqlThRkW+cdZtSFSTfdQJbGycFgIDkYeOZtt6+lRiGmJYMNSk+k8ClLMh Feb 2 07:55:25 np0005604725 certmonger[40873]: IlcCW0tx/YRyNLgELXUn/fdCXwniAyrOttUdb38dR+iGe0E7aLPOD0VFAI3T+zwa Feb 2 07:55:25 np0005604725 certmonger[40873]: 2l/dj4UqEwnr+KXzZ8ewuQ24CmLN/xTn1wzMOejW5aXbNZ2T9UpCxOaJ/UYytE65 Feb 2 07:55:25 np0005604725 certmonger[40873]: hX+ipp5UdGpAKvcIUrGKDQ== Feb 2 07:55:25 np0005604725 certmonger[40873]: -----END CERTIFICATE----- Feb 2 07:55:25 np0005604725 certmonger[40873]: ". Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Certificate submission still ongoing. Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Certificate submission postprocessing complete. Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Child status = 0. Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Child output: Feb 2 07:55:25 np0005604725 certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nhX+ipp5UdGpAKvcIUrGKDQ==\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 07:55:25 np0005604725 certmonger[39011]: " Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 07:55:25 np0005604725 certmonger[39011]: MIIFfDCCA+SgAwIBAgIRAPXmWz2JbWZJ0yZ1MCLIcsQwDQYJKoZIhvcNAQELBQAw Feb 2 07:55:25 np0005604725 certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:55:25 np0005604725 certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU1MjRaFw0yODAyMDMwNzU1MjRaMDwxETAPBgNVBAoM Feb 2 07:55:25 np0005604725 certmonger[39011]: CE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU2MDQ3MjUuY3RscGxhbmUub29vLnRl Feb 2 07:55:25 np0005604725 certmonger[39011]: c3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDftAIVM6BHvBu4c2aw Feb 2 07:55:25 np0005604725 certmonger[39011]: mTKByt7KvS+JSklHLblU1pDVYa7GWKbU5YA8Tco4zUwEzpWh1brXpvLhxrg2LcG8 Feb 2 07:55:25 np0005604725 certmonger[39011]: soyp+31afGH1+mFojQHCd+greuDiUEq3Vt/s6G7socplbfCdnftXMd9H80li/sic Feb 2 07:55:25 np0005604725 certmonger[39011]: 9Ezfr5kSlHRxf5D5xRFgCtmQt11sBxq6wiaaD/c8VilDzO3jYX40nwct9ysb2eSF Feb 2 07:55:25 np0005604725 certmonger[39011]: wg6jHJVtuJZfhLVJoKeTpO1gZ/tnVJxOlO4UfZ/Hy2GOPdoPLKMa9Ysik8mVU4+w Feb 2 07:55:25 np0005604725 certmonger[39011]: kPBaIvx5rT8LYnarcX+1p9xmMlYsMbOTHqJI3SvFjEBagpP8hc+nFsaMd0d5AFKC Feb 2 07:55:25 np0005604725 certmonger[39011]: ae5FAgMBAAGjggIAMIIB/DAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5HrAPq Feb 2 07:55:25 np0005604725 certmonger[39011]: aTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v Feb 2 07:55:25 np0005604725 certmonger[39011]: LnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH Feb 2 07:55:25 np0005604725 certmonger[39011]: AwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v Feb 2 07:55:25 np0005604725 certmonger[39011]: LnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj Feb 2 07:55:25 np0005604725 certmonger[39011]: YTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBR+6rti Feb 2 07:55:25 np0005604725 certmonger[39011]: 0/hE+zBq5WWh1ajkx0Hb3TCB2QYDVR0RBIHRMIHOgh5ucDAwMDU2MDQ3MjUuY3Rs Feb 2 07:55:25 np0005604725 certmonger[39011]: cGxhbmUub29vLnRlc3SCG292ZXJjbG91ZC5jdGxwbGFuZS5vb28udGVzdKA/Bgor Feb 2 07:55:25 np0005604725 certmonger[39011]: BgEEAYI3FAIDoDEML2hhcHJveHkvbnAwMDA1NjA0NzI1LmN0bHBsYW5lLm9vby50 Feb 2 07:55:25 np0005604725 certmonger[39011]: ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGh Feb 2 07:55:25 np0005604725 certmonger[39011]: KzApGwdoYXByb3h5Gx5ucDAwMDU2MDQ3MjUuY3RscGxhbmUub29vLnRlc3QwDQYJ Feb 2 07:55:25 np0005604725 certmonger[39011]: KoZIhvcNAQELBQADggGBAFqIGqyRRkjU3Uk24nkjUPFBkNDOTMjtS4DK5QiTbR9c Feb 2 07:55:25 np0005604725 certmonger[39011]: Bhs76t4n1yYTuTUPrr3acOSXOF5KZ6FmhJpbuBV2pwkj4u8iihrPwi9ZRbMupBMQ Feb 2 07:55:25 np0005604725 certmonger[39011]: Zk1Yl2N+1g7XZB0GbNKVjTv5UVgRkYp3valHSQdxiuWRG/XTXYD5eoGOGLNxKXAH Feb 2 07:55:25 np0005604725 certmonger[39011]: A0J0UnAVlHswVsP5W/PRsJc6ZeCsY5wxrdhgnvl1G20kITC8a7VeiRufKqvoWHix Feb 2 07:55:25 np0005604725 certmonger[39011]: cW+NxC/ITMv5t6dWvWbmo8/aZP7m/v/7p3+Uhon3VqhVad18GbPz+frdwF9H4+S6 Feb 2 07:55:25 np0005604725 certmonger[39011]: K0rtLtvdqlThRkW+cdZtSFSTfdQJbGycFgIDkYeOZtt6+lRiGmJYMNSk+k8ClLMh Feb 2 07:55:25 np0005604725 certmonger[39011]: IlcCW0tx/YRyNLgELXUn/fdCXwniAyrOttUdb38dR+iGe0E7aLPOD0VFAI3T+zwa Feb 2 07:55:25 np0005604725 certmonger[39011]: 2l/dj4UqEwnr+KXzZ8ewuQ24CmLN/xTn1wzMOejW5aXbNZ2T9UpCxOaJ/UYytE65 Feb 2 07:55:25 np0005604725 certmonger[39011]: hX+ipp5UdGpAKvcIUrGKDQ== Feb 2 07:55:25 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:55:25 np0005604725 certmonger[39011]: ". Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] No hooks set for pre-save command. Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:25 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:25 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:25 np0005604725 certmonger[40943]: Certificate in file "/etc/pki/tls/certs/haproxy-ctlplane-cert.crt" issued by CA and saved. Feb 2 07:55:25 np0005604725 certmonger[39011]: 2026-02-02 07:55:25 [39011] Wrote to /var/lib/certmonger/requests/20260202075523 Feb 2 07:55:26 np0005604725 python3[40959]: ansible-certificate_request Invoked with name=haproxy-storage-cert dns=['np0005604725.storage.ooo.test', 'overcloud.storage.ooo.test'] principal=['haproxy/np0005604725.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-storage-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.crt"#012cp "/etc/pki/tls/private/haproxy-storage-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-storage.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-storage.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 07:55:26 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[40969]: 2026-02-02 07:55:26 [40969] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.storage.ooo.test" for child. Feb 2 07:55:26 np0005604725 certmonger[40969]: 2026-02-02 07:55:26 [40969] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.storage.ooo.test Feb 2 07:55:26 np0005604725 certmonger[40969]: overcloud.storage.ooo.test Feb 2 07:55:26 np0005604725 certmonger[40969]: " for child. Feb 2 07:55:26 np0005604725 certmonger[40969]: 2026-02-02 07:55:26 [40969] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005604725.storage.ooo.test@OOO.TEST Feb 2 07:55:26 np0005604725 certmonger[40969]: " for child. Feb 2 07:55:26 np0005604725 certmonger[40969]: 2026-02-02 07:55:26 [40969] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 07:55:26 np0005604725 certmonger[40969]: 2026-02-02 07:55:26 [40969] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 07:55:26 np0005604725 certmonger[40969]: MIID5DCCAswCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NjA0NzI1LnN0b3JhZ2Uub29v Feb 2 07:55:26 np0005604725 certmonger[40969]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC4CNC9iBR3F4wI Feb 2 07:55:26 np0005604725 certmonger[40969]: AjVkwuO9oAueEINGoyfw2Pzp5lDNmd5OWjgja6R9Ied25PldHNcJE3UzjUKLIQPv Feb 2 07:55:26 np0005604725 certmonger[40969]: fHNbFIHPS7Sn03E1SDoVjrDLKhnjStImF8cXQ+3yEOxPn8BHdGDMVmR1AZ4xgZuv Feb 2 07:55:26 np0005604725 certmonger[40969]: QBSoQuSoUX15PCvqfJNvp9aXAicurwGrGrKngVVUjYycZrsmNg8OAEhdsklroh4S Feb 2 07:55:26 np0005604725 certmonger[40969]: bobOQ8Z6DgN8UsqGOvdnB6AyLdVW22l1GrtBfgt6XiklCbnpJoYZ9MVYJkrQfAMR Feb 2 07:55:26 np0005604725 certmonger[40969]: kSD7sGRJ93H8ShTmA4z/HbsKfOSA1GtsYQUm3kPxtAqPU/k2j7NgZpmEnHwEs2Am Feb 2 07:55:26 np0005604725 certmonger[40969]: lQBRSihHAgMBAAGgggF1MCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANgAwADIAMAAy Feb 2 07:55:26 np0005604725 certmonger[40969]: ADAANwA1ADUAMgA2MIIBRAYJKoZIhvcNAQkOMYIBNTCCATEwCwYDVR0PBAQDAgWg Feb 2 07:55:26 np0005604725 certmonger[40969]: MIHVBgNVHREEgc0wgcqCHW5wMDAwNTYwNDcyNS5zdG9yYWdlLm9vby50ZXN0ghpv Feb 2 07:55:26 np0005604725 certmonger[40969]: dmVyY2xvdWQuc3RvcmFnZS5vb28udGVzdKA+BgorBgEEAYI3FAIDoDAMLmhhcHJv Feb 2 07:55:26 np0005604725 certmonger[40969]: eHkvbnAwMDA1NjA0NzI1LnN0b3JhZ2Uub29vLnRlc3RAT09PLlRFU1SgTQYGKwYB Feb 2 07:55:26 np0005604725 certmonger[40969]: BQICoEMwQaAKGwhPT08uVEVTVKEzMDGgAwIBAaEqMCgbB2hhcHJveHkbHW5wMDAw Feb 2 07:55:26 np0005604725 certmonger[40969]: NTYwNDcyNS5zdG9yYWdlLm9vby50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggr Feb 2 07:55:26 np0005604725 certmonger[40969]: BgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBTUpjTWEFtfvTaUOyymA5Rc Feb 2 07:55:26 np0005604725 certmonger[40969]: rP3r8DANBgkqhkiG9w0BAQsFAAOCAQEABbfRv+f61UnaHN5KUnoa6z7K/VuVgHD4 Feb 2 07:55:26 np0005604725 certmonger[40969]: k5lQ8VrNGAGzd+v4NY4zXwy96ml9m0Gpft3L+I/msaHf03LURaULcRnhMujhED7e Feb 2 07:55:26 np0005604725 certmonger[40969]: JKIaMECtA6oB40KVcVSKEkuQadHuzQv5Lf1tp6U56qgRESnYEylKSj7L0IVYDkd5 Feb 2 07:55:26 np0005604725 certmonger[40969]: V2lhWL7afm7+13awJR4MthzsWX2mIGgxE3w4apC6rsQfPldYiNIGm5bX8djS6KKw Feb 2 07:55:26 np0005604725 certmonger[40969]: PNOojW8aSxzuL4BJBEg2kXLBJh7E8fRHMK/BFQyxcmhv31lfkv/nhC+beVA3OwOa Feb 2 07:55:26 np0005604725 certmonger[40969]: NtukYo4Tr1KfgQrIcDqrrSRjvFUb374IYAS22sUwi0+rHMRZ98jW/w== Feb 2 07:55:26 np0005604725 certmonger[40969]: -----END CERTIFICATE REQUEST----- Feb 2 07:55:26 np0005604725 certmonger[40969]: " for child. Feb 2 07:55:26 np0005604725 certmonger[40969]: 2026-02-02 07:55:26 [40969] Setting "CERTMONGER_SPKAC" to "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" for child. Feb 2 07:55:26 np0005604725 certmonger[40969]: 2026-02-02 07:55:26 [40969] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuAjQvYgUdxeMCAI1ZMLjvaALnhCDRqMn8Nj86eZQzZneTlo4I2ukfSHnduT5XRzXCRN1M41CiyED73xzWxSBz0u0p9NxNUg6FY6wyyoZ40rSJhfHF0Pt8hDsT5/AR3RgzFZkdQGeMYGbr0AUqELkqFF9eTwr6nyTb6fWlwInLq8Bqxqyp4FVVI2MnGa7JjYPDgBIXbJJa6IeEm6GzkPGeg4DfFLKhjr3ZwegMi3VVttpdRq7QX4Lel4pJQm56SaGGfTFWCZK0HwDEZEg+7BkSfdx/EoU5gOM/x27CnzkgNRrbGEFJt5D8bQKj1P5No+zYGaZhJx8BLNgJpUAUUooRwIDAQAB" for child. Feb 2 07:55:26 np0005604725 certmonger[40969]: 2026-02-02 07:55:26 [40969] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 07:55:26 np0005604725 certmonger[40969]: 2026-02-02 07:55:26 [40969] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 07:55:26 np0005604725 certmonger[40969]: 2026-02-02 07:55:26 [40969] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 07:55:26 np0005604725 certmonger[40969]: 2026-02-02 07:55:26 [40969] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 07:55:26 np0005604725 certmonger[40969]: 2026-02-02 07:55:26 [40969] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[40969]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 07:55:26 np0005604725 certmonger[40969]: Certificate: "MIIFdjCCA96gAwIBAgIQVo9S3UWBmGYYXIBk1RqwmjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI2MDIwMjA3NTUyNloXDTI4MDIwMzA3NTUyNlowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNVBAMMHW5wMDAwNTYwNDcyNS5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuAjQvYgUdxeMCAI1ZMLjvaALnhCDRqMn8Nj86eZQzZneTlo4I2ukfSHnduT5XRzXCRN1M41CiyED73xzWxSBz0u0p9NxNUg6FY6wyyoZ40rSJhfHF0Pt8hDsT5/AR3RgzFZkdQGeMYGbr0AUqELkqFF9eTwr6nyTb6fWlwInLq8Bqxqyp4FVVI2MnGa7JjYPDgBIXbJJa6IeEm6GzkPGeg4DfFLKhjr3ZwegMi3VVttpdRq7QX4Lel4pJQm56SaGGfTFWCZK0HwDEZEg+7BkSfdx/EoU5gOM/x27CnzkgNRrbGEFJt5D8bQKj1P5No+zYGaZhJx8BLNgJpUAUUooRwIDAQABo4IB/DCCAfgwHwYDVR0jBBgwFoAUMkr4iZOH6OOh3kGr+/UOR6wD6mkwOgYIKwYBBQUHAQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYDVR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNVHR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFzdGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUnje1oF9GvE+1MjhYFODIyrgd3vowgdUGA1UdEQSBzTCByoIdbnAwMDA1NjA0NzI1LnN0b3JhZ2Uub29vLnRlc3SCGm92ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQBgjcUAgOgMAwuaGFwcm94eS9ucDAwMDU2MDQ3MjUuc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBNBgYrBgEFAgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsHaGFwcm94eRsdbnAwMDA1NjA0NzI1LnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAE13ccrSu7jbwkMZF6ZugwIfjBuStjxcVlIMzo93VP0Ofw5kAYtQ5DinzhMtMsTbdmber2O2KNwN8K73IqnVI2Ep4dGessuaQznqdhDxv0LNziKnmF/jUFxo6WPZ4QqiCkhmu1iunU+pVjmW2XNQdcuhDYLhqCAtE0QwRYB0A0Z5KatdeqWvKLG8coaNHRWFf1XTRuiku2d0GGj9Cks3f6WlqDSNtpK/ziCk8ZWVibYGjfpiglMYZFIj0Vogmsi3xanhJI1wpn8rEE4jyP505UIva5CIS24LWqypO2wV3BvLyNC2w69QfPu5ogQgPEmqHYLafn8IQwXr+ehFFvrbxw6Uhn816bUj+W3Y9PqwczkR/QkW8DO44E/O1wHnDQOUoVoPMKw1xVvd7K0cX/TjXDDzqvTImCU2LIg9F7dBCnSNsvwIYErqKMe0xCcDWP5LNbpFjKSAYl3G0C+Qe/BxpNN8ylbRGrVo7bZzwOV2CKPKrk1EzE7NZ/v0RKRpERsIJA==" Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Certificate submission still ongoing. Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Certificate submission attempt complete. Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Child status = 0. Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Child output: Feb 2 07:55:26 np0005604725 certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 07:55:26 np0005604725 certmonger[39011]: MIIFdjCCA96gAwIBAgIQVo9S3UWBmGYYXIBk1RqwmjANBgkqhkiG9w0BAQsFADAz Feb 2 07:55:26 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:55:26 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTUyNloXDTI4MDIwMzA3NTUyNlowOzERMA8GA1UECgwI Feb 2 07:55:26 np0005604725 certmonger[39011]: T09PLlRFU1QxJjAkBgNVBAMMHW5wMDAwNTYwNDcyNS5zdG9yYWdlLm9vby50ZXN0 Feb 2 07:55:26 np0005604725 certmonger[39011]: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuAjQvYgUdxeMCAI1ZMLj Feb 2 07:55:26 np0005604725 certmonger[39011]: vaALnhCDRqMn8Nj86eZQzZneTlo4I2ukfSHnduT5XRzXCRN1M41CiyED73xzWxSB Feb 2 07:55:26 np0005604725 certmonger[39011]: z0u0p9NxNUg6FY6wyyoZ40rSJhfHF0Pt8hDsT5/AR3RgzFZkdQGeMYGbr0AUqELk Feb 2 07:55:26 np0005604725 certmonger[39011]: qFF9eTwr6nyTb6fWlwInLq8Bqxqyp4FVVI2MnGa7JjYPDgBIXbJJa6IeEm6GzkPG Feb 2 07:55:26 np0005604725 certmonger[39011]: eg4DfFLKhjr3ZwegMi3VVttpdRq7QX4Lel4pJQm56SaGGfTFWCZK0HwDEZEg+7Bk Feb 2 07:55:26 np0005604725 certmonger[39011]: Sfdx/EoU5gOM/x27CnzkgNRrbGEFJt5D8bQKj1P5No+zYGaZhJx8BLNgJpUAUUoo Feb 2 07:55:26 np0005604725 certmonger[39011]: RwIDAQABo4IB/DCCAfgwHwYDVR0jBBgwFoAUMkr4iZOH6OOh3kGr+/UOR6wD6mkw Feb 2 07:55:26 np0005604725 certmonger[39011]: OgYIKwYBBQUHAQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50 Feb 2 07:55:26 np0005604725 certmonger[39011]: ZXN0L2NhL29jc3AwDgYDVR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMB Feb 2 07:55:26 np0005604725 certmonger[39011]: BggrBgEFBQcDAjBzBgNVHR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50 Feb 2 07:55:26 np0005604725 certmonger[39011]: ZXN0L2lwYS9jcmwvTWFzdGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2Ex Feb 2 07:55:26 np0005604725 certmonger[39011]: HjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUnje1oF9G Feb 2 07:55:26 np0005604725 certmonger[39011]: vE+1MjhYFODIyrgd3vowgdUGA1UdEQSBzTCByoIdbnAwMDA1NjA0NzI1LnN0b3Jh Feb 2 07:55:26 np0005604725 certmonger[39011]: Z2Uub29vLnRlc3SCGm92ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQB Feb 2 07:55:26 np0005604725 certmonger[39011]: gjcUAgOgMAwuaGFwcm94eS9ucDAwMDU2MDQ3MjUuc3RvcmFnZS5vb28udGVzdEBP Feb 2 07:55:26 np0005604725 certmonger[39011]: T08uVEVTVKBNBgYrBgEFAgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsH Feb 2 07:55:26 np0005604725 certmonger[39011]: aGFwcm94eRsdbnAwMDA1NjA0NzI1LnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcN Feb 2 07:55:26 np0005604725 certmonger[39011]: AQELBQADggGBAE13ccrSu7jbwkMZF6ZugwIfjBuStjxcVlIMzo93VP0Ofw5kAYtQ Feb 2 07:55:26 np0005604725 certmonger[39011]: 5DinzhMtMsTbdmber2O2KNwN8K73IqnVI2Ep4dGessuaQznqdhDxv0LNziKnmF/j Feb 2 07:55:26 np0005604725 certmonger[39011]: UFxo6WPZ4QqiCkhmu1iunU+pVjmW2XNQdcuhDYLhqCAtE0QwRYB0A0Z5KatdeqWv Feb 2 07:55:26 np0005604725 certmonger[39011]: KLG8coaNHRWFf1XTRuiku2d0GGj9Cks3f6WlqDSNtpK/ziCk8ZWVibYGjfpiglMY Feb 2 07:55:26 np0005604725 certmonger[39011]: ZFIj0Vogmsi3xanhJI1wpn8rEE4jyP505UIva5CIS24LWqypO2wV3BvLyNC2w69Q Feb 2 07:55:26 np0005604725 certmonger[39011]: fPu5ogQgPEmqHYLafn8IQwXr+ehFFvrbxw6Uhn816bUj+W3Y9PqwczkR/QkW8DO4 Feb 2 07:55:26 np0005604725 certmonger[39011]: 4E/O1wHnDQOUoVoPMKw1xVvd7K0cX/TjXDDzqvTImCU2LIg9F7dBCnSNsvwIYErq Feb 2 07:55:26 np0005604725 certmonger[39011]: KMe0xCcDWP5LNbpFjKSAYl3G0C+Qe/BxpNN8ylbRGrVo7bZzwOV2CKPKrk1EzE7N Feb 2 07:55:26 np0005604725 certmonger[39011]: Z/v0RKRpERsIJA== Feb 2 07:55:26 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:55:26 np0005604725 certmonger[39011]: " Feb 2 07:55:26 np0005604725 certmonger[40971]: 2026-02-02 07:55:26 [40971] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 07:55:26 np0005604725 certmonger[40971]: MIIFdjCCA96gAwIBAgIQVo9S3UWBmGYYXIBk1RqwmjANBgkqhkiG9w0BAQsFADAz Feb 2 07:55:26 np0005604725 certmonger[40971]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:55:26 np0005604725 certmonger[40971]: aXR5MB4XDTI2MDIwMjA3NTUyNloXDTI4MDIwMzA3NTUyNlowOzERMA8GA1UECgwI Feb 2 07:55:26 np0005604725 certmonger[40971]: T09PLlRFU1QxJjAkBgNVBAMMHW5wMDAwNTYwNDcyNS5zdG9yYWdlLm9vby50ZXN0 Feb 2 07:55:26 np0005604725 certmonger[40971]: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuAjQvYgUdxeMCAI1ZMLj Feb 2 07:55:26 np0005604725 certmonger[40971]: vaALnhCDRqMn8Nj86eZQzZneTlo4I2ukfSHnduT5XRzXCRN1M41CiyED73xzWxSB Feb 2 07:55:26 np0005604725 certmonger[40971]: z0u0p9NxNUg6FY6wyyoZ40rSJhfHF0Pt8hDsT5/AR3RgzFZkdQGeMYGbr0AUqELk Feb 2 07:55:26 np0005604725 certmonger[40971]: qFF9eTwr6nyTb6fWlwInLq8Bqxqyp4FVVI2MnGa7JjYPDgBIXbJJa6IeEm6GzkPG Feb 2 07:55:26 np0005604725 certmonger[40971]: eg4DfFLKhjr3ZwegMi3VVttpdRq7QX4Lel4pJQm56SaGGfTFWCZK0HwDEZEg+7Bk Feb 2 07:55:26 np0005604725 certmonger[40971]: Sfdx/EoU5gOM/x27CnzkgNRrbGEFJt5D8bQKj1P5No+zYGaZhJx8BLNgJpUAUUoo Feb 2 07:55:26 np0005604725 certmonger[40971]: RwIDAQABo4IB/DCCAfgwHwYDVR0jBBgwFoAUMkr4iZOH6OOh3kGr+/UOR6wD6mkw Feb 2 07:55:26 np0005604725 certmonger[40971]: OgYIKwYBBQUHAQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50 Feb 2 07:55:26 np0005604725 certmonger[40971]: ZXN0L2NhL29jc3AwDgYDVR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMB Feb 2 07:55:26 np0005604725 certmonger[40971]: BggrBgEFBQcDAjBzBgNVHR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50 Feb 2 07:55:26 np0005604725 certmonger[40971]: ZXN0L2lwYS9jcmwvTWFzdGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2Ex Feb 2 07:55:26 np0005604725 certmonger[40971]: HjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUnje1oF9G Feb 2 07:55:26 np0005604725 certmonger[40971]: vE+1MjhYFODIyrgd3vowgdUGA1UdEQSBzTCByoIdbnAwMDA1NjA0NzI1LnN0b3Jh Feb 2 07:55:26 np0005604725 certmonger[40971]: Z2Uub29vLnRlc3SCGm92ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQB Feb 2 07:55:26 np0005604725 certmonger[40971]: gjcUAgOgMAwuaGFwcm94eS9ucDAwMDU2MDQ3MjUuc3RvcmFnZS5vb28udGVzdEBP Feb 2 07:55:26 np0005604725 certmonger[40971]: T08uVEVTVKBNBgYrBgEFAgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsH Feb 2 07:55:26 np0005604725 certmonger[40971]: aGFwcm94eRsdbnAwMDA1NjA0NzI1LnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcN Feb 2 07:55:26 np0005604725 certmonger[40971]: AQELBQADggGBAE13ccrSu7jbwkMZF6ZugwIfjBuStjxcVlIMzo93VP0Ofw5kAYtQ Feb 2 07:55:26 np0005604725 certmonger[40971]: 5DinzhMtMsTbdmber2O2KNwN8K73IqnVI2Ep4dGessuaQznqdhDxv0LNziKnmF/j Feb 2 07:55:26 np0005604725 certmonger[40971]: UFxo6WPZ4QqiCkhmu1iunU+pVjmW2XNQdcuhDYLhqCAtE0QwRYB0A0Z5KatdeqWv Feb 2 07:55:26 np0005604725 certmonger[40971]: KLG8coaNHRWFf1XTRuiku2d0GGj9Cks3f6WlqDSNtpK/ziCk8ZWVibYGjfpiglMY Feb 2 07:55:26 np0005604725 certmonger[40971]: ZFIj0Vogmsi3xanhJI1wpn8rEE4jyP505UIva5CIS24LWqypO2wV3BvLyNC2w69Q Feb 2 07:55:26 np0005604725 certmonger[40971]: fPu5ogQgPEmqHYLafn8IQwXr+ehFFvrbxw6Uhn816bUj+W3Y9PqwczkR/QkW8DO4 Feb 2 07:55:26 np0005604725 certmonger[40971]: 4E/O1wHnDQOUoVoPMKw1xVvd7K0cX/TjXDDzqvTImCU2LIg9F7dBCnSNsvwIYErq Feb 2 07:55:26 np0005604725 certmonger[40971]: KMe0xCcDWP5LNbpFjKSAYl3G0C+Qe/BxpNN8ylbRGrVo7bZzwOV2CKPKrk1EzE7N Feb 2 07:55:26 np0005604725 certmonger[40971]: Z/v0RKRpERsIJA== Feb 2 07:55:26 np0005604725 certmonger[40971]: -----END CERTIFICATE----- Feb 2 07:55:26 np0005604725 certmonger[40971]: ". Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Certificate submission still ongoing. Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Certificate submission postprocessing complete. Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Child status = 0. Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Child output: Feb 2 07:55:26 np0005604725 certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFdjCCA96gAwIBAgIQVo9S3UWBmGYYXIBk1RqwmjANBgkqhkiG9w0BAQsFADAz\nMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y\naXR5MB4XDTI2MDIwMjA3NTUyNloXDTI4MDIwMzA3NTUyNlowOzERMA8GA1UECgwI\nT09PLlRFU1QxJjAkBgNVBAMMHW5wMDAwNTYwNDcyNS5zdG9yYWdlLm9vby50ZXN0\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuAjQvYgUdxeMCAI1ZMLj\nvaALnhCDRqMn8Nj86eZQzZneTlo4I2ukfSHnduT5XRzXCRN1M41CiyED73xzWxSB\nz0u0p9NxNUg6FY6wyyoZ40rSJhfHF0Pt8hDsT5/AR3RgzFZkdQGeMYGbr0AUqELk\nqFF9eTwr6nyTb6fWlwInLq8Bqxqyp4FVVI2MnGa7JjYPDgBIXbJJa6IeEm6GzkPG\neg4DfFLKhjr3ZwegMi3VVttpdRq7QX4Lel4pJQm56SaGGfTFWCZK0HwDEZEg+7Bk\nSfdx/EoU5gOM/x27CnzkgNRrbGEFJt5D8bQKj1P5No+zYGaZhJx8BLNgJpUAUUoo\nRwIDAQABo4IB/DCCAfgwHwYDVR0jBBgwFoAUMkr4iZOH6OOh3kGr+/UOR6wD6mkw\nOgYIKwYBBQUHAQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50\nZXN0L2NhL29jc3AwDgYDVR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMB\nBggrBgEFBQcDAjBzBgNVHR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50\nZXN0L2lwYS9jcmwvTWFzdGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2Ex\nHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUnje1oF9G\nvE+1MjhYFODIyrgd3vowgdUGA1UdEQSBzTCByoIdbnAwMDA1NjA0NzI1LnN0b3Jh\nZ2Uub29vLnRlc3SCGm92ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQB\ngjcUAgOgMAwuaGFwcm94eS9ucDAwMDU2MDQ3MjUuc3RvcmFnZS5vb28udGVzdEBP\nT08uVEVTVKBNBgYrBgEFAgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsH\naGFwcm94eRsdbnAwMDA1NjA0NzI1LnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcN\nAQELBQADggGBAE13ccrSu7jbwkMZF6ZugwIfjBuStjxcVlIMzo93VP0Ofw5kAYtQ\n5DinzhMtMsTbdmber2O2KNwN8K73IqnVI2Ep4dGessuaQznqdhDxv0LNziKnmF/j\nUFxo6WPZ4QqiCkhmu1iunU+pVjmW2XNQdcuhDYLhqCAtE0QwRYB0A0Z5KatdeqWv\nKLG8coaNHRWFf1XTRuiku2d0GGj9Cks3f6WlqDSNtpK/ziCk8ZWVibYGjfpiglMY\nZFIj0Vogmsi3xanhJI1wpn8rEE4jyP505UIva5CIS24LWqypO2wV3BvLyNC2w69Q\nfPu5ogQgPEmqHYLafn8IQwXr+ehFFvrbxw6Uhn816bUj+W3Y9PqwczkR/QkW8DO4\n4E/O1wHnDQOUoVoPMKw1xVvd7K0cX/TjXDDzqvTImCU2LIg9F7dBCnSNsvwIYErq\nKMe0xCcDWP5LNbpFjKSAYl3G0C+Qe/BxpNN8ylbRGrVo7bZzwOV2CKPKrk1EzE7N\nZ/v0RKRpERsIJA==\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 07:55:26 np0005604725 certmonger[39011]: " Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 07:55:26 np0005604725 certmonger[39011]: MIIFdjCCA96gAwIBAgIQVo9S3UWBmGYYXIBk1RqwmjANBgkqhkiG9w0BAQsFADAz Feb 2 07:55:26 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:55:26 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTUyNloXDTI4MDIwMzA3NTUyNlowOzERMA8GA1UECgwI Feb 2 07:55:26 np0005604725 certmonger[39011]: T09PLlRFU1QxJjAkBgNVBAMMHW5wMDAwNTYwNDcyNS5zdG9yYWdlLm9vby50ZXN0 Feb 2 07:55:26 np0005604725 certmonger[39011]: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuAjQvYgUdxeMCAI1ZMLj Feb 2 07:55:26 np0005604725 certmonger[39011]: vaALnhCDRqMn8Nj86eZQzZneTlo4I2ukfSHnduT5XRzXCRN1M41CiyED73xzWxSB Feb 2 07:55:26 np0005604725 certmonger[39011]: z0u0p9NxNUg6FY6wyyoZ40rSJhfHF0Pt8hDsT5/AR3RgzFZkdQGeMYGbr0AUqELk Feb 2 07:55:26 np0005604725 certmonger[39011]: qFF9eTwr6nyTb6fWlwInLq8Bqxqyp4FVVI2MnGa7JjYPDgBIXbJJa6IeEm6GzkPG Feb 2 07:55:26 np0005604725 certmonger[39011]: eg4DfFLKhjr3ZwegMi3VVttpdRq7QX4Lel4pJQm56SaGGfTFWCZK0HwDEZEg+7Bk Feb 2 07:55:26 np0005604725 certmonger[39011]: Sfdx/EoU5gOM/x27CnzkgNRrbGEFJt5D8bQKj1P5No+zYGaZhJx8BLNgJpUAUUoo Feb 2 07:55:26 np0005604725 certmonger[39011]: RwIDAQABo4IB/DCCAfgwHwYDVR0jBBgwFoAUMkr4iZOH6OOh3kGr+/UOR6wD6mkw Feb 2 07:55:26 np0005604725 certmonger[39011]: OgYIKwYBBQUHAQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50 Feb 2 07:55:26 np0005604725 certmonger[39011]: ZXN0L2NhL29jc3AwDgYDVR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMB Feb 2 07:55:26 np0005604725 certmonger[39011]: BggrBgEFBQcDAjBzBgNVHR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50 Feb 2 07:55:26 np0005604725 certmonger[39011]: ZXN0L2lwYS9jcmwvTWFzdGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2Ex Feb 2 07:55:26 np0005604725 certmonger[39011]: HjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUnje1oF9G Feb 2 07:55:26 np0005604725 certmonger[39011]: vE+1MjhYFODIyrgd3vowgdUGA1UdEQSBzTCByoIdbnAwMDA1NjA0NzI1LnN0b3Jh Feb 2 07:55:26 np0005604725 certmonger[39011]: Z2Uub29vLnRlc3SCGm92ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQB Feb 2 07:55:26 np0005604725 certmonger[39011]: gjcUAgOgMAwuaGFwcm94eS9ucDAwMDU2MDQ3MjUuc3RvcmFnZS5vb28udGVzdEBP Feb 2 07:55:26 np0005604725 certmonger[39011]: T08uVEVTVKBNBgYrBgEFAgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsH Feb 2 07:55:26 np0005604725 certmonger[39011]: aGFwcm94eRsdbnAwMDA1NjA0NzI1LnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcN Feb 2 07:55:26 np0005604725 certmonger[39011]: AQELBQADggGBAE13ccrSu7jbwkMZF6ZugwIfjBuStjxcVlIMzo93VP0Ofw5kAYtQ Feb 2 07:55:26 np0005604725 certmonger[39011]: 5DinzhMtMsTbdmber2O2KNwN8K73IqnVI2Ep4dGessuaQznqdhDxv0LNziKnmF/j Feb 2 07:55:26 np0005604725 certmonger[39011]: UFxo6WPZ4QqiCkhmu1iunU+pVjmW2XNQdcuhDYLhqCAtE0QwRYB0A0Z5KatdeqWv Feb 2 07:55:26 np0005604725 certmonger[39011]: KLG8coaNHRWFf1XTRuiku2d0GGj9Cks3f6WlqDSNtpK/ziCk8ZWVibYGjfpiglMY Feb 2 07:55:26 np0005604725 certmonger[39011]: ZFIj0Vogmsi3xanhJI1wpn8rEE4jyP505UIva5CIS24LWqypO2wV3BvLyNC2w69Q Feb 2 07:55:26 np0005604725 certmonger[39011]: fPu5ogQgPEmqHYLafn8IQwXr+ehFFvrbxw6Uhn816bUj+W3Y9PqwczkR/QkW8DO4 Feb 2 07:55:26 np0005604725 certmonger[39011]: 4E/O1wHnDQOUoVoPMKw1xVvd7K0cX/TjXDDzqvTImCU2LIg9F7dBCnSNsvwIYErq Feb 2 07:55:26 np0005604725 certmonger[39011]: KMe0xCcDWP5LNbpFjKSAYl3G0C+Qe/BxpNN8ylbRGrVo7bZzwOV2CKPKrk1EzE7N Feb 2 07:55:26 np0005604725 certmonger[39011]: Z/v0RKRpERsIJA== Feb 2 07:55:26 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:55:26 np0005604725 certmonger[39011]: ". Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] No hooks set for pre-save command. Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 certmonger[39011]: 2026-02-02 07:55:26 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:26 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:27 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:27 np0005604725 certmonger[39011]: 2026-02-02 07:55:27 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:27 np0005604725 certmonger[39011]: 2026-02-02 07:55:27 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:27 np0005604725 certmonger[41040]: Certificate in file "/etc/pki/tls/certs/haproxy-storage-cert.crt" issued by CA and saved. Feb 2 07:55:27 np0005604725 certmonger[39011]: 2026-02-02 07:55:27 [39011] Wrote to /var/lib/certmonger/requests/20260202075526 Feb 2 07:55:27 np0005604725 python3[41056]: ansible-certificate_request Invoked with name=haproxy-storage_mgmt-cert dns=['np0005604725.storagemgmt.ooo.test', 'overcloud.storagemgmt.ooo.test'] principal=['haproxy/np0005604725.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-storage_mgmt-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.crt"#012cp "/etc/pki/tls/private/haproxy-storage_mgmt-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-storage_mgmt.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-storage_mgmt.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 07:55:27 np0005604725 certmonger[39011]: 2026-02-02 07:55:27 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:27 np0005604725 certmonger[39011]: 2026-02-02 07:55:27 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:27 np0005604725 certmonger[39011]: 2026-02-02 07:55:27 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:27 np0005604725 certmonger[39011]: 2026-02-02 07:55:27 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:27 np0005604725 certmonger[39011]: 2026-02-02 07:55:27 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:27 np0005604725 certmonger[39011]: 2026-02-02 07:55:27 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:27 np0005604725 certmonger[39011]: 2026-02-02 07:55:27 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:27 np0005604725 certmonger[39011]: 2026-02-02 07:55:27 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:27 np0005604725 certmonger[39011]: 2026-02-02 07:55:27 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[41066]: 2026-02-02 07:55:28 [41066] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.storagemgmt.ooo.test" for child. Feb 2 07:55:28 np0005604725 certmonger[41066]: 2026-02-02 07:55:28 [41066] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.storagemgmt.ooo.test Feb 2 07:55:28 np0005604725 certmonger[41066]: overcloud.storagemgmt.ooo.test Feb 2 07:55:28 np0005604725 certmonger[41066]: " for child. Feb 2 07:55:28 np0005604725 certmonger[41066]: 2026-02-02 07:55:28 [41066] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005604725.storagemgmt.ooo.test@OOO.TEST Feb 2 07:55:28 np0005604725 certmonger[41066]: " for child. Feb 2 07:55:28 np0005604725 certmonger[41066]: 2026-02-02 07:55:28 [41066] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 07:55:28 np0005604725 certmonger[41066]: 2026-02-02 07:55:28 [41066] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 07:55:28 np0005604725 certmonger[41066]: MIID+DCCAuACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NjA0NzI1LnN0b3JhZ2VtZ210 Feb 2 07:55:28 np0005604725 certmonger[41066]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqEFUDmBs Feb 2 07:55:28 np0005604725 certmonger[41066]: jPFE2h9Cvc37YsO4OBKHWYCXDX1Sd2IdYyiMMivKqWyUw3oY66BEHnixqs7srqrW Feb 2 07:55:28 np0005604725 certmonger[41066]: 60Hi7akXmjlqBgry9MbvgpWPKWVhtVJYx6DmoQngy8pFdAr/jRHStlx8XZiiX71R Feb 2 07:55:28 np0005604725 certmonger[41066]: +FlnuQtIyyIm4fOt5sTXOQ0ngb1hE5jmIRFqlEdp0JS5vDZYHOfaTdBAXwDe+AMT Feb 2 07:55:28 np0005604725 certmonger[41066]: cK88ti+UQgJIBkCXfeH37W3hL6QIUrej4vkwuaeKdC6iTlpdTiiB37+9TyoOnQZa Feb 2 07:55:28 np0005604725 certmonger[41066]: h9HH55gh3ntutjJ8bomLw7Zp75+vkL5xTCYk34H3TNqeN5DaPnLtpTxgbqjfJuFQ Feb 2 07:55:28 np0005604725 certmonger[41066]: rah8tv992jdArwIDAQABoIIBhTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAy Feb 2 07:55:28 np0005604725 certmonger[41066]: ADAAMgAwADcANQA1ADIANzCCAVQGCSqGSIb3DQEJDjGCAUUwggFBMAsGA1UdDwQE Feb 2 07:55:28 np0005604725 certmonger[41066]: AwIFoDCB5QYDVR0RBIHdMIHagiFucDAwMDU2MDQ3MjUuc3RvcmFnZW1nbXQub29v Feb 2 07:55:28 np0005604725 certmonger[41066]: LnRlc3SCHm92ZXJjbG91ZC5zdG9yYWdlbWdtdC5vb28udGVzdKBCBgorBgEEAYI3 Feb 2 07:55:28 np0005604725 certmonger[41066]: FAIDoDQMMmhhcHJveHkvbnAwMDA1NjA0NzI1LnN0b3JhZ2VtZ210Lm9vby50ZXN0 Feb 2 07:55:28 np0005604725 certmonger[41066]: QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAs Feb 2 07:55:28 np0005604725 certmonger[41066]: GwdoYXByb3h5GyFucDAwMDU2MDQ3MjUuc3RvcmFnZW1nbXQub29vLnRlc3QwHQYD Feb 2 07:55:28 np0005604725 certmonger[41066]: VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O Feb 2 07:55:28 np0005604725 certmonger[41066]: BBYEFFe+eOHDqB0xZ0zIjWviWWVVqVTIMA0GCSqGSIb3DQEBCwUAA4IBAQAxp5b9 Feb 2 07:55:28 np0005604725 certmonger[41066]: lSTiN8motMGB8q1PNNmqznuzJtCIcjxnsaQoEeUzwoOSdrmbHF/WJj4YIX6s79lV Feb 2 07:55:28 np0005604725 certmonger[41066]: hGXMkWoetpsAl319HZJbCY3YA+Hn1EtUGY5Y32HuMpXG2w+4+Z5rY3OkxWzdpX3V Feb 2 07:55:28 np0005604725 certmonger[41066]: IAlDMyGpuPXUfMW0f+FeMoNrt1LZBnqHp0+2hl/Ay0yXr2GRLjE8/sSDmuXTYN5h Feb 2 07:55:28 np0005604725 certmonger[41066]: TCXTS6VX9kFMu7ILwaDHWdvciWnYc4fJJXNnS4T6GFf/IxE/13gpCcuO5eexmuYt Feb 2 07:55:28 np0005604725 certmonger[41066]: IjiMKdq2Waz2Grh82ZNQ6Mot7vmXs3J+cYwpCjoH5g/GUusuA5KSI1+VyFpUZGRn Feb 2 07:55:28 np0005604725 certmonger[41066]: PAxFBTTHp19mENPj Feb 2 07:55:28 np0005604725 certmonger[41066]: -----END CERTIFICATE REQUEST----- Feb 2 07:55:28 np0005604725 certmonger[41066]: " for child. Feb 2 07:55:28 np0005604725 certmonger[41066]: 2026-02-02 07:55:28 [41066] Setting "CERTMONGER_SPKAC" to "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" for child. Feb 2 07:55:28 np0005604725 certmonger[41066]: 2026-02-02 07:55:28 [41066] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqEFUDmBsjPFE2h9Cvc37YsO4OBKHWYCXDX1Sd2IdYyiMMivKqWyUw3oY66BEHnixqs7srqrW60Hi7akXmjlqBgry9MbvgpWPKWVhtVJYx6DmoQngy8pFdAr/jRHStlx8XZiiX71R+FlnuQtIyyIm4fOt5sTXOQ0ngb1hE5jmIRFqlEdp0JS5vDZYHOfaTdBAXwDe+AMTcK88ti+UQgJIBkCXfeH37W3hL6QIUrej4vkwuaeKdC6iTlpdTiiB37+9TyoOnQZah9HH55gh3ntutjJ8bomLw7Zp75+vkL5xTCYk34H3TNqeN5DaPnLtpTxgbqjfJuFQrah8tv992jdArwIDAQAB" for child. Feb 2 07:55:28 np0005604725 certmonger[41066]: 2026-02-02 07:55:28 [41066] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 07:55:28 np0005604725 certmonger[41066]: 2026-02-02 07:55:28 [41066] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 07:55:28 np0005604725 certmonger[41066]: 2026-02-02 07:55:28 [41066] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 07:55:28 np0005604725 certmonger[41066]: 2026-02-02 07:55:28 [41066] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 07:55:28 np0005604725 certmonger[41066]: 2026-02-02 07:55:28 [41066] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[41066]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 07:55:28 np0005604725 certmonger[41066]: Certificate: "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" Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Certificate submission still ongoing. Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Certificate submission attempt complete. Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Child status = 0. Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Child output: Feb 2 07:55:28 np0005604725 certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 07:55:28 np0005604725 certmonger[39011]: MIIFizCCA/OgAwIBAgIRAJPMCy2Buujjmed1AjZRfMUwDQYJKoZIhvcNAQELBQAw Feb 2 07:55:28 np0005604725 certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:55:28 np0005604725 certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU1MjhaFw0yODAyMDMwNzU1MjhaMD8xETAPBgNVBAoM Feb 2 07:55:28 np0005604725 certmonger[39011]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuc3RvcmFnZW1nbXQub29v Feb 2 07:55:28 np0005604725 certmonger[39011]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCoQVQOYGyM8UTa Feb 2 07:55:28 np0005604725 certmonger[39011]: H0K9zftiw7g4EodZgJcNfVJ3Yh1jKIwyK8qpbJTDehjroEQeeLGqzuyuqtbrQeLt Feb 2 07:55:28 np0005604725 certmonger[39011]: qReaOWoGCvL0xu+ClY8pZWG1UljHoOahCeDLykV0Cv+NEdK2XHxdmKJfvVH4WWe5 Feb 2 07:55:28 np0005604725 certmonger[39011]: C0jLIibh863mxNc5DSeBvWETmOYhEWqUR2nQlLm8Nlgc59pN0EBfAN74AxNwrzy2 Feb 2 07:55:28 np0005604725 certmonger[39011]: L5RCAkgGQJd94fftbeEvpAhSt6Pi+TC5p4p0LqJOWl1OKIHfv71PKg6dBlqH0cfn Feb 2 07:55:28 np0005604725 certmonger[39011]: mCHee262MnxuiYvDtmnvn6+QvnFMJiTfgfdM2p43kNo+cu2lPGBuqN8m4VCtqHy2 Feb 2 07:55:28 np0005604725 certmonger[39011]: /33aN0CvAgMBAAGjggIMMIICCDAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 07:55:28 np0005604725 certmonger[39011]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 07:55:28 np0005604725 certmonger[39011]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 07:55:28 np0005604725 certmonger[39011]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 07:55:28 np0005604725 certmonger[39011]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 07:55:28 np0005604725 certmonger[39011]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBRk Feb 2 07:55:28 np0005604725 certmonger[39011]: qwnUVrPpS10ji31RGCJ4PYc3FTCB5QYDVR0RBIHdMIHagiFucDAwMDU2MDQ3MjUu Feb 2 07:55:28 np0005604725 certmonger[39011]: c3RvcmFnZW1nbXQub29vLnRlc3SCHm92ZXJjbG91ZC5zdG9yYWdlbWdtdC5vb28u Feb 2 07:55:28 np0005604725 certmonger[39011]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMmhhcHJveHkvbnAwMDA1NjA0NzI1LnN0b3Jh Feb 2 07:55:28 np0005604725 certmonger[39011]: Z2VtZ210Lm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Feb 2 07:55:28 np0005604725 certmonger[39011]: U1ShNzA1oAMCAQGhLjAsGwdoYXByb3h5GyFucDAwMDU2MDQ3MjUuc3RvcmFnZW1n Feb 2 07:55:28 np0005604725 certmonger[39011]: bXQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHC6q2Bcc2ophfX9i5NqznU2 Feb 2 07:55:28 np0005604725 certmonger[39011]: FI/cflTUT8x75Sv9eDynPUBqIsdrmRWOs/EyDkWNG/71r9yvT50Q5Mh05oosW/U4 Feb 2 07:55:28 np0005604725 certmonger[39011]: SUdIgfbL/D7W8pSIv5JBOV1JMG4jvG06wmLMJd9OMIdJpJMlsAh74EEGMCo2zz2b Feb 2 07:55:28 np0005604725 certmonger[39011]: yIYB/DojOUce1geqd5apW6Azv50Rkk0pPZG633upZHu0IWvcoecTAdVKkJivDk7S Feb 2 07:55:28 np0005604725 certmonger[39011]: pvvorH7/sXJRiiligWi/kgV3dAMULa+AFSKoVhxFUGui5Wr4FihZa8oOBuBxmKbP Feb 2 07:55:28 np0005604725 certmonger[39011]: xKn/DSg+UgL3xeO4xFWubfUoy4nRRorplRHCnHr8l2qKYF438PClIAQD8F7LyxpK Feb 2 07:55:28 np0005604725 certmonger[39011]: I0JuTjfmqgrdep9DdZryaV+c9jlaD53OfMk5Xp3k2sLPfE9/RB7s7LQcPMhRk82J Feb 2 07:55:28 np0005604725 certmonger[39011]: pdUISjDynJHNt0kNZD6ayE+q0v9fliIokr0zGXUvpzMKn0lbE56atFN7c8ZTgPXV Feb 2 07:55:28 np0005604725 certmonger[39011]: UxtDPgSVOIi9awvf1k0Ae8cGDOBfRz+meRM7tR7b/w== Feb 2 07:55:28 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:55:28 np0005604725 certmonger[39011]: " Feb 2 07:55:28 np0005604725 certmonger[41068]: 2026-02-02 07:55:28 [41068] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 07:55:28 np0005604725 certmonger[41068]: MIIFizCCA/OgAwIBAgIRAJPMCy2Buujjmed1AjZRfMUwDQYJKoZIhvcNAQELBQAw Feb 2 07:55:28 np0005604725 certmonger[41068]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:55:28 np0005604725 certmonger[41068]: cml0eTAeFw0yNjAyMDIwNzU1MjhaFw0yODAyMDMwNzU1MjhaMD8xETAPBgNVBAoM Feb 2 07:55:28 np0005604725 certmonger[41068]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuc3RvcmFnZW1nbXQub29v Feb 2 07:55:28 np0005604725 certmonger[41068]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCoQVQOYGyM8UTa Feb 2 07:55:28 np0005604725 certmonger[41068]: H0K9zftiw7g4EodZgJcNfVJ3Yh1jKIwyK8qpbJTDehjroEQeeLGqzuyuqtbrQeLt Feb 2 07:55:28 np0005604725 certmonger[41068]: qReaOWoGCvL0xu+ClY8pZWG1UljHoOahCeDLykV0Cv+NEdK2XHxdmKJfvVH4WWe5 Feb 2 07:55:28 np0005604725 certmonger[41068]: C0jLIibh863mxNc5DSeBvWETmOYhEWqUR2nQlLm8Nlgc59pN0EBfAN74AxNwrzy2 Feb 2 07:55:28 np0005604725 certmonger[41068]: L5RCAkgGQJd94fftbeEvpAhSt6Pi+TC5p4p0LqJOWl1OKIHfv71PKg6dBlqH0cfn Feb 2 07:55:28 np0005604725 certmonger[41068]: mCHee262MnxuiYvDtmnvn6+QvnFMJiTfgfdM2p43kNo+cu2lPGBuqN8m4VCtqHy2 Feb 2 07:55:28 np0005604725 certmonger[41068]: /33aN0CvAgMBAAGjggIMMIICCDAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 07:55:28 np0005604725 certmonger[41068]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 07:55:28 np0005604725 certmonger[41068]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 07:55:28 np0005604725 certmonger[41068]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 07:55:28 np0005604725 certmonger[41068]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 07:55:28 np0005604725 certmonger[41068]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBRk Feb 2 07:55:28 np0005604725 certmonger[41068]: qwnUVrPpS10ji31RGCJ4PYc3FTCB5QYDVR0RBIHdMIHagiFucDAwMDU2MDQ3MjUu Feb 2 07:55:28 np0005604725 certmonger[41068]: c3RvcmFnZW1nbXQub29vLnRlc3SCHm92ZXJjbG91ZC5zdG9yYWdlbWdtdC5vb28u Feb 2 07:55:28 np0005604725 certmonger[41068]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMmhhcHJveHkvbnAwMDA1NjA0NzI1LnN0b3Jh Feb 2 07:55:28 np0005604725 certmonger[41068]: Z2VtZ210Lm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Feb 2 07:55:28 np0005604725 certmonger[41068]: U1ShNzA1oAMCAQGhLjAsGwdoYXByb3h5GyFucDAwMDU2MDQ3MjUuc3RvcmFnZW1n Feb 2 07:55:28 np0005604725 certmonger[41068]: bXQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHC6q2Bcc2ophfX9i5NqznU2 Feb 2 07:55:28 np0005604725 certmonger[41068]: FI/cflTUT8x75Sv9eDynPUBqIsdrmRWOs/EyDkWNG/71r9yvT50Q5Mh05oosW/U4 Feb 2 07:55:28 np0005604725 certmonger[41068]: SUdIgfbL/D7W8pSIv5JBOV1JMG4jvG06wmLMJd9OMIdJpJMlsAh74EEGMCo2zz2b Feb 2 07:55:28 np0005604725 certmonger[41068]: yIYB/DojOUce1geqd5apW6Azv50Rkk0pPZG633upZHu0IWvcoecTAdVKkJivDk7S Feb 2 07:55:28 np0005604725 certmonger[41068]: pvvorH7/sXJRiiligWi/kgV3dAMULa+AFSKoVhxFUGui5Wr4FihZa8oOBuBxmKbP Feb 2 07:55:28 np0005604725 certmonger[41068]: xKn/DSg+UgL3xeO4xFWubfUoy4nRRorplRHCnHr8l2qKYF438PClIAQD8F7LyxpK Feb 2 07:55:28 np0005604725 certmonger[41068]: I0JuTjfmqgrdep9DdZryaV+c9jlaD53OfMk5Xp3k2sLPfE9/RB7s7LQcPMhRk82J Feb 2 07:55:28 np0005604725 certmonger[41068]: pdUISjDynJHNt0kNZD6ayE+q0v9fliIokr0zGXUvpzMKn0lbE56atFN7c8ZTgPXV Feb 2 07:55:28 np0005604725 certmonger[41068]: UxtDPgSVOIi9awvf1k0Ae8cGDOBfRz+meRM7tR7b/w== Feb 2 07:55:28 np0005604725 certmonger[41068]: -----END CERTIFICATE----- Feb 2 07:55:28 np0005604725 certmonger[41068]: ". Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Certificate submission still ongoing. Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Certificate submission postprocessing complete. Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Child status = 0. Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Child output: Feb 2 07:55:28 np0005604725 certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nUxtDPgSVOIi9awvf1k0Ae8cGDOBfRz+meRM7tR7b/w==\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 07:55:28 np0005604725 certmonger[39011]: " Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 07:55:28 np0005604725 certmonger[39011]: MIIFizCCA/OgAwIBAgIRAJPMCy2Buujjmed1AjZRfMUwDQYJKoZIhvcNAQELBQAw Feb 2 07:55:28 np0005604725 certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:55:28 np0005604725 certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU1MjhaFw0yODAyMDMwNzU1MjhaMD8xETAPBgNVBAoM Feb 2 07:55:28 np0005604725 certmonger[39011]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuc3RvcmFnZW1nbXQub29v Feb 2 07:55:28 np0005604725 certmonger[39011]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCoQVQOYGyM8UTa Feb 2 07:55:28 np0005604725 certmonger[39011]: H0K9zftiw7g4EodZgJcNfVJ3Yh1jKIwyK8qpbJTDehjroEQeeLGqzuyuqtbrQeLt Feb 2 07:55:28 np0005604725 certmonger[39011]: qReaOWoGCvL0xu+ClY8pZWG1UljHoOahCeDLykV0Cv+NEdK2XHxdmKJfvVH4WWe5 Feb 2 07:55:28 np0005604725 certmonger[39011]: C0jLIibh863mxNc5DSeBvWETmOYhEWqUR2nQlLm8Nlgc59pN0EBfAN74AxNwrzy2 Feb 2 07:55:28 np0005604725 certmonger[39011]: L5RCAkgGQJd94fftbeEvpAhSt6Pi+TC5p4p0LqJOWl1OKIHfv71PKg6dBlqH0cfn Feb 2 07:55:28 np0005604725 certmonger[39011]: mCHee262MnxuiYvDtmnvn6+QvnFMJiTfgfdM2p43kNo+cu2lPGBuqN8m4VCtqHy2 Feb 2 07:55:28 np0005604725 certmonger[39011]: /33aN0CvAgMBAAGjggIMMIICCDAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 07:55:28 np0005604725 certmonger[39011]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 07:55:28 np0005604725 certmonger[39011]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 07:55:28 np0005604725 certmonger[39011]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 07:55:28 np0005604725 certmonger[39011]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 07:55:28 np0005604725 certmonger[39011]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBRk Feb 2 07:55:28 np0005604725 certmonger[39011]: qwnUVrPpS10ji31RGCJ4PYc3FTCB5QYDVR0RBIHdMIHagiFucDAwMDU2MDQ3MjUu Feb 2 07:55:28 np0005604725 certmonger[39011]: c3RvcmFnZW1nbXQub29vLnRlc3SCHm92ZXJjbG91ZC5zdG9yYWdlbWdtdC5vb28u Feb 2 07:55:28 np0005604725 certmonger[39011]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMmhhcHJveHkvbnAwMDA1NjA0NzI1LnN0b3Jh Feb 2 07:55:28 np0005604725 certmonger[39011]: Z2VtZ210Lm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Feb 2 07:55:28 np0005604725 certmonger[39011]: U1ShNzA1oAMCAQGhLjAsGwdoYXByb3h5GyFucDAwMDU2MDQ3MjUuc3RvcmFnZW1n Feb 2 07:55:28 np0005604725 certmonger[39011]: bXQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHC6q2Bcc2ophfX9i5NqznU2 Feb 2 07:55:28 np0005604725 certmonger[39011]: FI/cflTUT8x75Sv9eDynPUBqIsdrmRWOs/EyDkWNG/71r9yvT50Q5Mh05oosW/U4 Feb 2 07:55:28 np0005604725 certmonger[39011]: SUdIgfbL/D7W8pSIv5JBOV1JMG4jvG06wmLMJd9OMIdJpJMlsAh74EEGMCo2zz2b Feb 2 07:55:28 np0005604725 certmonger[39011]: yIYB/DojOUce1geqd5apW6Azv50Rkk0pPZG633upZHu0IWvcoecTAdVKkJivDk7S Feb 2 07:55:28 np0005604725 certmonger[39011]: pvvorH7/sXJRiiligWi/kgV3dAMULa+AFSKoVhxFUGui5Wr4FihZa8oOBuBxmKbP Feb 2 07:55:28 np0005604725 certmonger[39011]: xKn/DSg+UgL3xeO4xFWubfUoy4nRRorplRHCnHr8l2qKYF438PClIAQD8F7LyxpK Feb 2 07:55:28 np0005604725 certmonger[39011]: I0JuTjfmqgrdep9DdZryaV+c9jlaD53OfMk5Xp3k2sLPfE9/RB7s7LQcPMhRk82J Feb 2 07:55:28 np0005604725 certmonger[39011]: pdUISjDynJHNt0kNZD6ayE+q0v9fliIokr0zGXUvpzMKn0lbE56atFN7c8ZTgPXV Feb 2 07:55:28 np0005604725 certmonger[39011]: UxtDPgSVOIi9awvf1k0Ae8cGDOBfRz+meRM7tR7b/w== Feb 2 07:55:28 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:55:28 np0005604725 certmonger[39011]: ". Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] No hooks set for pre-save command. Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 certmonger[39011]: 2026-02-02 07:55:28 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:28 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:28 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:29 np0005604725 certmonger[39011]: 2026-02-02 07:55:29 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:29 np0005604725 certmonger[39011]: 2026-02-02 07:55:29 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:29 np0005604725 certmonger[41140]: Certificate in file "/etc/pki/tls/certs/haproxy-storage_mgmt-cert.crt" issued by CA and saved. Feb 2 07:55:29 np0005604725 certmonger[39011]: 2026-02-02 07:55:29 [39011] Wrote to /var/lib/certmonger/requests/20260202075527 Feb 2 07:55:29 np0005604725 python3[41156]: ansible-certificate_request Invoked with name=haproxy-internal_api-cert dns=['np0005604725.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['haproxy/np0005604725.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-internal_api-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.crt"#012cp "/etc/pki/tls/private/haproxy-internal_api-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-internal_api.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-internal_api.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 07:55:29 np0005604725 certmonger[39011]: 2026-02-02 07:55:29 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:29 np0005604725 certmonger[39011]: 2026-02-02 07:55:29 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:29 np0005604725 certmonger[39011]: 2026-02-02 07:55:29 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:29 np0005604725 certmonger[39011]: 2026-02-02 07:55:29 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:29 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:29 np0005604725 certmonger[39011]: 2026-02-02 07:55:29 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:29 np0005604725 certmonger[39011]: 2026-02-02 07:55:29 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:29 np0005604725 certmonger[39011]: 2026-02-02 07:55:29 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:29 np0005604725 certmonger[39011]: 2026-02-02 07:55:29 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:29 np0005604725 certmonger[39011]: 2026-02-02 07:55:29 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[41166]: 2026-02-02 07:55:30 [41166] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.internalapi.ooo.test" for child. Feb 2 07:55:30 np0005604725 certmonger[41166]: 2026-02-02 07:55:30 [41166] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.internalapi.ooo.test Feb 2 07:55:30 np0005604725 certmonger[41166]: overcloud.internalapi.ooo.test Feb 2 07:55:30 np0005604725 certmonger[41166]: " for child. Feb 2 07:55:30 np0005604725 certmonger[41166]: 2026-02-02 07:55:30 [41166] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005604725.internalapi.ooo.test@OOO.TEST Feb 2 07:55:30 np0005604725 certmonger[41166]: " for child. Feb 2 07:55:30 np0005604725 certmonger[41166]: 2026-02-02 07:55:30 [41166] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 07:55:30 np0005604725 certmonger[41166]: 2026-02-02 07:55:30 [41166] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 07:55:30 np0005604725 certmonger[41166]: MIID+DCCAuACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NjA0NzI1LmludGVybmFsYXBp Feb 2 07:55:30 np0005604725 certmonger[41166]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtNpascF4 Feb 2 07:55:30 np0005604725 certmonger[41166]: 9Fa9agYyaWGFjtKB/ADoj8voklFDp+vkbnOwAQgIlNHAnM/ggjdikBc02fZWJ9V0 Feb 2 07:55:30 np0005604725 certmonger[41166]: U025zqALiQG6axXC6dXUnXUZd2heJvJiAhfOI1yWapvY7PdI2hvQmPT60xVCBCO7 Feb 2 07:55:30 np0005604725 certmonger[41166]: SoJkby92Tn92GaBTuYsKz1n2WE7dSGZMd3wk/NVHkmNZR8fQrCHnDBqoD+2y0Y8b Feb 2 07:55:30 np0005604725 certmonger[41166]: x0xjaIl/Jk3o4+HoEFOBa+Td1hZ+d3XMgL0NVtnVvtyST8pqBf0S+GPj+zVfl7Rm Feb 2 07:55:30 np0005604725 certmonger[41166]: xM1oHIz03OIiLjjblrjrNumNcW5VrigqQ7CcK/ahsVpMDU1iNhsBCqjPfA5EXLll Feb 2 07:55:30 np0005604725 certmonger[41166]: WXQ18lSK/f6r6wIDAQABoIIBhTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAy Feb 2 07:55:30 np0005604725 certmonger[41166]: ADAAMgAwADcANQA1ADIAOTCCAVQGCSqGSIb3DQEJDjGCAUUwggFBMAsGA1UdDwQE Feb 2 07:55:30 np0005604725 certmonger[41166]: AwIFoDCB5QYDVR0RBIHdMIHagiFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:55:30 np0005604725 certmonger[41166]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBCBgorBgEEAYI3 Feb 2 07:55:30 np0005604725 certmonger[41166]: FAIDoDQMMmhhcHJveHkvbnAwMDA1NjA0NzI1LmludGVybmFsYXBpLm9vby50ZXN0 Feb 2 07:55:30 np0005604725 certmonger[41166]: QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAs Feb 2 07:55:30 np0005604725 certmonger[41166]: GwdoYXByb3h5GyFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3QwHQYD Feb 2 07:55:30 np0005604725 certmonger[41166]: VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O Feb 2 07:55:30 np0005604725 certmonger[41166]: BBYEFElGc4RAJ3xW6gOCy3WG44U/6glXMA0GCSqGSIb3DQEBCwUAA4IBAQCtmkKB Feb 2 07:55:30 np0005604725 certmonger[41166]: s4E9KaHsUb5yplJzGJindyaE2UQUQGccyEHN9MBDoxXHc06WErAAxcse0yUjieQA Feb 2 07:55:30 np0005604725 certmonger[41166]: P/QhhiyL0vlCbFw3eoD6Qg6ZHlDs3t2BpEYATH3dVJbO2hqKWI/fEc+KdO+DJi9t Feb 2 07:55:30 np0005604725 certmonger[41166]: gCPTF+HE8k9KuPYhTCvc+3DPbl7NQ+VHlZoMsRSWGrpfCy08NFvKvRi30y2dlRz6 Feb 2 07:55:30 np0005604725 certmonger[41166]: dJzK/SL5ZbdsVfN5j7OmM7grjOQ2fW6SBmF0rRJwukhJIh6Gv6LfggeY4IbUIkYD Feb 2 07:55:30 np0005604725 certmonger[41166]: SuyHQVVIbuV9O/P2hcn+Pn4+fK3Qe3rNEJ2G9aiAFKWHfseNfgn28wmsvikJn3jS Feb 2 07:55:30 np0005604725 certmonger[41166]: VFru5oX62fHUVfkc Feb 2 07:55:30 np0005604725 certmonger[41166]: -----END CERTIFICATE REQUEST----- Feb 2 07:55:30 np0005604725 certmonger[41166]: " for child. Feb 2 07:55:30 np0005604725 certmonger[41166]: 2026-02-02 07:55:30 [41166] Setting "CERTMONGER_SPKAC" to "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" for child. Feb 2 07:55:30 np0005604725 certmonger[41166]: 2026-02-02 07:55:30 [41166] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtNpascF49Fa9agYyaWGFjtKB/ADoj8voklFDp+vkbnOwAQgIlNHAnM/ggjdikBc02fZWJ9V0U025zqALiQG6axXC6dXUnXUZd2heJvJiAhfOI1yWapvY7PdI2hvQmPT60xVCBCO7SoJkby92Tn92GaBTuYsKz1n2WE7dSGZMd3wk/NVHkmNZR8fQrCHnDBqoD+2y0Y8bx0xjaIl/Jk3o4+HoEFOBa+Td1hZ+d3XMgL0NVtnVvtyST8pqBf0S+GPj+zVfl7RmxM1oHIz03OIiLjjblrjrNumNcW5VrigqQ7CcK/ahsVpMDU1iNhsBCqjPfA5EXLllWXQ18lSK/f6r6wIDAQAB" for child. Feb 2 07:55:30 np0005604725 certmonger[41166]: 2026-02-02 07:55:30 [41166] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 07:55:30 np0005604725 certmonger[41166]: 2026-02-02 07:55:30 [41166] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 07:55:30 np0005604725 certmonger[41166]: 2026-02-02 07:55:30 [41166] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 07:55:30 np0005604725 certmonger[41166]: 2026-02-02 07:55:30 [41166] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 07:55:30 np0005604725 certmonger[41166]: 2026-02-02 07:55:30 [41166] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[41166]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 07:55:30 np0005604725 certmonger[41166]: Certificate: "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" Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Certificate submission still ongoing. Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Certificate submission attempt complete. Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Child status = 0. Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Child output: Feb 2 07:55:30 np0005604725 certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 07:55:30 np0005604725 certmonger[39011]: MIIFijCCA/KgAwIBAgIQKvgq4MmOkaMXm+4qzkSaVDANBgkqhkiG9w0BAQsFADAz Feb 2 07:55:30 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:55:30 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTUzMFoXDTI4MDIwMzA3NTUzMFowPzERMA8GA1UECgwI Feb 2 07:55:30 np0005604725 certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:55:30 np0005604725 certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALTaWrHBePRWvWoG Feb 2 07:55:30 np0005604725 certmonger[39011]: MmlhhY7SgfwA6I/L6JJRQ6fr5G5zsAEICJTRwJzP4II3YpAXNNn2VifVdFNNuc6g Feb 2 07:55:30 np0005604725 certmonger[39011]: C4kBumsVwunV1J11GXdoXibyYgIXziNclmqb2Oz3SNob0Jj0+tMVQgQju0qCZG8v Feb 2 07:55:30 np0005604725 certmonger[39011]: dk5/dhmgU7mLCs9Z9lhO3UhmTHd8JPzVR5JjWUfH0Kwh5wwaqA/tstGPG8dMY2iJ Feb 2 07:55:30 np0005604725 certmonger[39011]: fyZN6OPh6BBTgWvk3dYWfnd1zIC9DVbZ1b7ckk/KagX9Evhj4/s1X5e0ZsTNaByM Feb 2 07:55:30 np0005604725 certmonger[39011]: 9NziIi4425a46zbpjXFuVa4oKkOwnCv2obFaTA1NYjYbAQqoz3wORFy5ZVl0NfJU Feb 2 07:55:30 np0005604725 certmonger[39011]: iv3+q+sCAwEAAaOCAgwwggIIMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:55:30 np0005604725 certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:55:30 np0005604725 certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:55:30 np0005604725 certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:55:30 np0005604725 certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:55:30 np0005604725 certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFDri Feb 2 07:55:30 np0005604725 certmonger[39011]: 2vbWrjzJkCBAKQeSbpbruEzJMIHlBgNVHREEgd0wgdqCIW5wMDAwNTYwNDcyNS5p Feb 2 07:55:30 np0005604725 certmonger[39011]: bnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50 Feb 2 07:55:30 np0005604725 certmonger[39011]: ZXN0oEIGCisGAQQBgjcUAgOgNAwyaGFwcm94eS9ucDAwMDU2MDQ3MjUuaW50ZXJu Feb 2 07:55:30 np0005604725 certmonger[39011]: YWxhcGkub29vLnRlc3RAT09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVT Feb 2 07:55:30 np0005604725 certmonger[39011]: VKE3MDWgAwIBAaEuMCwbB2hhcHJveHkbIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFw Feb 2 07:55:30 np0005604725 certmonger[39011]: aS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAhfv8Gnb/WAxe/FU8lINxGpWN Feb 2 07:55:30 np0005604725 certmonger[39011]: aWnnraI1+OnNMYj9vpq/QAiR0eeuaeHJOlT6j6VSIafVERz/mU2wWKe1qW+7FcOb Feb 2 07:55:30 np0005604725 certmonger[39011]: JI7UqVodVMXmR+OCl7AtBik7dloivqcXqVrdwt9uyNxauQOGQpzb+xaeeLgQOAK3 Feb 2 07:55:30 np0005604725 certmonger[39011]: iP+GHFLYJg4fM+9iT+6IJSG6AaxKIfUeVNP98SCA5OwjP8dg1MjWacODfIlFoRMO Feb 2 07:55:30 np0005604725 certmonger[39011]: m9IV32ZxdQkTPJsvtkx07KPqVGBhOCl+2M4GWJtHAUlm7mwyfoHZCTGyXjq8Ejbu Feb 2 07:55:30 np0005604725 certmonger[39011]: ZEQCp+pUgZD9JcRat8f2WnV7ibnuRg2sQeyra0fhopaHt8BUkLQhL0rUPwnanner Feb 2 07:55:30 np0005604725 certmonger[39011]: SVMKQmKtAfmMxfzpOfsY+rU8dVlHpY/vb9VUnTwAvp/r99EWQj5gKRQr1a3w+P6W Feb 2 07:55:30 np0005604725 certmonger[39011]: TPg7S4pD7TUO6JnsvUtpHbhZzDjrz3JTSBWPgslLvsj0XcbhEug7D0AitU7T0XU+ Feb 2 07:55:30 np0005604725 certmonger[39011]: y4eotpBLCt/fNckA43Mc3KAoNTkYpRaNiBuIc/G4 Feb 2 07:55:30 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:55:30 np0005604725 certmonger[39011]: " Feb 2 07:55:30 np0005604725 certmonger[41168]: 2026-02-02 07:55:30 [41168] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 07:55:30 np0005604725 certmonger[41168]: MIIFijCCA/KgAwIBAgIQKvgq4MmOkaMXm+4qzkSaVDANBgkqhkiG9w0BAQsFADAz Feb 2 07:55:30 np0005604725 certmonger[41168]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:55:30 np0005604725 certmonger[41168]: aXR5MB4XDTI2MDIwMjA3NTUzMFoXDTI4MDIwMzA3NTUzMFowPzERMA8GA1UECgwI Feb 2 07:55:30 np0005604725 certmonger[41168]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:55:30 np0005604725 certmonger[41168]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALTaWrHBePRWvWoG Feb 2 07:55:30 np0005604725 certmonger[41168]: MmlhhY7SgfwA6I/L6JJRQ6fr5G5zsAEICJTRwJzP4II3YpAXNNn2VifVdFNNuc6g Feb 2 07:55:30 np0005604725 certmonger[41168]: C4kBumsVwunV1J11GXdoXibyYgIXziNclmqb2Oz3SNob0Jj0+tMVQgQju0qCZG8v Feb 2 07:55:30 np0005604725 certmonger[41168]: dk5/dhmgU7mLCs9Z9lhO3UhmTHd8JPzVR5JjWUfH0Kwh5wwaqA/tstGPG8dMY2iJ Feb 2 07:55:30 np0005604725 certmonger[41168]: fyZN6OPh6BBTgWvk3dYWfnd1zIC9DVbZ1b7ckk/KagX9Evhj4/s1X5e0ZsTNaByM Feb 2 07:55:30 np0005604725 certmonger[41168]: 9NziIi4425a46zbpjXFuVa4oKkOwnCv2obFaTA1NYjYbAQqoz3wORFy5ZVl0NfJU Feb 2 07:55:30 np0005604725 certmonger[41168]: iv3+q+sCAwEAAaOCAgwwggIIMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:55:30 np0005604725 certmonger[41168]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:55:30 np0005604725 certmonger[41168]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:55:30 np0005604725 certmonger[41168]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:55:30 np0005604725 certmonger[41168]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:55:30 np0005604725 certmonger[41168]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFDri Feb 2 07:55:30 np0005604725 certmonger[41168]: 2vbWrjzJkCBAKQeSbpbruEzJMIHlBgNVHREEgd0wgdqCIW5wMDAwNTYwNDcyNS5p Feb 2 07:55:30 np0005604725 certmonger[41168]: bnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50 Feb 2 07:55:30 np0005604725 certmonger[41168]: ZXN0oEIGCisGAQQBgjcUAgOgNAwyaGFwcm94eS9ucDAwMDU2MDQ3MjUuaW50ZXJu Feb 2 07:55:30 np0005604725 certmonger[41168]: YWxhcGkub29vLnRlc3RAT09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVT Feb 2 07:55:30 np0005604725 certmonger[41168]: VKE3MDWgAwIBAaEuMCwbB2hhcHJveHkbIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFw Feb 2 07:55:30 np0005604725 certmonger[41168]: aS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAhfv8Gnb/WAxe/FU8lINxGpWN Feb 2 07:55:30 np0005604725 certmonger[41168]: aWnnraI1+OnNMYj9vpq/QAiR0eeuaeHJOlT6j6VSIafVERz/mU2wWKe1qW+7FcOb Feb 2 07:55:30 np0005604725 certmonger[41168]: JI7UqVodVMXmR+OCl7AtBik7dloivqcXqVrdwt9uyNxauQOGQpzb+xaeeLgQOAK3 Feb 2 07:55:30 np0005604725 certmonger[41168]: iP+GHFLYJg4fM+9iT+6IJSG6AaxKIfUeVNP98SCA5OwjP8dg1MjWacODfIlFoRMO Feb 2 07:55:30 np0005604725 certmonger[41168]: m9IV32ZxdQkTPJsvtkx07KPqVGBhOCl+2M4GWJtHAUlm7mwyfoHZCTGyXjq8Ejbu Feb 2 07:55:30 np0005604725 certmonger[41168]: ZEQCp+pUgZD9JcRat8f2WnV7ibnuRg2sQeyra0fhopaHt8BUkLQhL0rUPwnanner Feb 2 07:55:30 np0005604725 certmonger[41168]: SVMKQmKtAfmMxfzpOfsY+rU8dVlHpY/vb9VUnTwAvp/r99EWQj5gKRQr1a3w+P6W Feb 2 07:55:30 np0005604725 certmonger[41168]: TPg7S4pD7TUO6JnsvUtpHbhZzDjrz3JTSBWPgslLvsj0XcbhEug7D0AitU7T0XU+ Feb 2 07:55:30 np0005604725 certmonger[41168]: y4eotpBLCt/fNckA43Mc3KAoNTkYpRaNiBuIc/G4 Feb 2 07:55:30 np0005604725 certmonger[41168]: -----END CERTIFICATE----- Feb 2 07:55:30 np0005604725 certmonger[41168]: ". Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Certificate submission still ongoing. Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Certificate submission postprocessing complete. Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Child status = 0. Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Child output: Feb 2 07:55:30 np0005604725 certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----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\ny4eotpBLCt/fNckA43Mc3KAoNTkYpRaNiBuIc/G4\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 07:55:30 np0005604725 certmonger[39011]: " Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 07:55:30 np0005604725 certmonger[39011]: MIIFijCCA/KgAwIBAgIQKvgq4MmOkaMXm+4qzkSaVDANBgkqhkiG9w0BAQsFADAz Feb 2 07:55:30 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:55:30 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTUzMFoXDTI4MDIwMzA3NTUzMFowPzERMA8GA1UECgwI Feb 2 07:55:30 np0005604725 certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:55:30 np0005604725 certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALTaWrHBePRWvWoG Feb 2 07:55:30 np0005604725 certmonger[39011]: MmlhhY7SgfwA6I/L6JJRQ6fr5G5zsAEICJTRwJzP4II3YpAXNNn2VifVdFNNuc6g Feb 2 07:55:30 np0005604725 certmonger[39011]: C4kBumsVwunV1J11GXdoXibyYgIXziNclmqb2Oz3SNob0Jj0+tMVQgQju0qCZG8v Feb 2 07:55:30 np0005604725 certmonger[39011]: dk5/dhmgU7mLCs9Z9lhO3UhmTHd8JPzVR5JjWUfH0Kwh5wwaqA/tstGPG8dMY2iJ Feb 2 07:55:30 np0005604725 certmonger[39011]: fyZN6OPh6BBTgWvk3dYWfnd1zIC9DVbZ1b7ckk/KagX9Evhj4/s1X5e0ZsTNaByM Feb 2 07:55:30 np0005604725 certmonger[39011]: 9NziIi4425a46zbpjXFuVa4oKkOwnCv2obFaTA1NYjYbAQqoz3wORFy5ZVl0NfJU Feb 2 07:55:30 np0005604725 certmonger[39011]: iv3+q+sCAwEAAaOCAgwwggIIMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:55:30 np0005604725 certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:55:30 np0005604725 certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:55:30 np0005604725 certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:55:30 np0005604725 certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:55:30 np0005604725 certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFDri Feb 2 07:55:30 np0005604725 certmonger[39011]: 2vbWrjzJkCBAKQeSbpbruEzJMIHlBgNVHREEgd0wgdqCIW5wMDAwNTYwNDcyNS5p Feb 2 07:55:30 np0005604725 certmonger[39011]: bnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50 Feb 2 07:55:30 np0005604725 certmonger[39011]: ZXN0oEIGCisGAQQBgjcUAgOgNAwyaGFwcm94eS9ucDAwMDU2MDQ3MjUuaW50ZXJu Feb 2 07:55:30 np0005604725 certmonger[39011]: YWxhcGkub29vLnRlc3RAT09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVT Feb 2 07:55:30 np0005604725 certmonger[39011]: VKE3MDWgAwIBAaEuMCwbB2hhcHJveHkbIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFw Feb 2 07:55:30 np0005604725 certmonger[39011]: aS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAhfv8Gnb/WAxe/FU8lINxGpWN Feb 2 07:55:30 np0005604725 certmonger[39011]: aWnnraI1+OnNMYj9vpq/QAiR0eeuaeHJOlT6j6VSIafVERz/mU2wWKe1qW+7FcOb Feb 2 07:55:30 np0005604725 certmonger[39011]: JI7UqVodVMXmR+OCl7AtBik7dloivqcXqVrdwt9uyNxauQOGQpzb+xaeeLgQOAK3 Feb 2 07:55:30 np0005604725 certmonger[39011]: iP+GHFLYJg4fM+9iT+6IJSG6AaxKIfUeVNP98SCA5OwjP8dg1MjWacODfIlFoRMO Feb 2 07:55:30 np0005604725 certmonger[39011]: m9IV32ZxdQkTPJsvtkx07KPqVGBhOCl+2M4GWJtHAUlm7mwyfoHZCTGyXjq8Ejbu Feb 2 07:55:30 np0005604725 certmonger[39011]: ZEQCp+pUgZD9JcRat8f2WnV7ibnuRg2sQeyra0fhopaHt8BUkLQhL0rUPwnanner Feb 2 07:55:30 np0005604725 certmonger[39011]: SVMKQmKtAfmMxfzpOfsY+rU8dVlHpY/vb9VUnTwAvp/r99EWQj5gKRQr1a3w+P6W Feb 2 07:55:30 np0005604725 certmonger[39011]: TPg7S4pD7TUO6JnsvUtpHbhZzDjrz3JTSBWPgslLvsj0XcbhEug7D0AitU7T0XU+ Feb 2 07:55:30 np0005604725 certmonger[39011]: y4eotpBLCt/fNckA43Mc3KAoNTkYpRaNiBuIc/G4 Feb 2 07:55:30 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:55:30 np0005604725 certmonger[39011]: ". Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] No hooks set for pre-save command. Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:30 np0005604725 certmonger[39011]: 2026-02-02 07:55:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:31 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:31 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:31 np0005604725 certmonger[39011]: 2026-02-02 07:55:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:31 np0005604725 certmonger[39011]: 2026-02-02 07:55:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:31 np0005604725 certmonger[41238]: Certificate in file "/etc/pki/tls/certs/haproxy-internal_api-cert.crt" issued by CA and saved. Feb 2 07:55:31 np0005604725 certmonger[39011]: 2026-02-02 07:55:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075529 Feb 2 07:55:31 np0005604725 python3[41254]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q lvm2 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 07:55:32 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:32 np0005604725 python3[41271]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 07:55:39 np0005604725 podman[41272]: 2026-02-02 07:55:32.850650763 +0000 UTC m=+0.032720169 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 Feb 2 07:55:39 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:40 np0005604725 python3[41350]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 cluster.common.tag/manila-share:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 07:55:40 np0005604725 podman[41351]: 2026-02-02 07:55:40.102997921 +0000 UTC m=+0.056738422 image tag e358b6c9dcc9c9bba9c1005980a7d889cbb475c5a717ad5609f95241604c0212 cluster.common.tag/manila-share:pcmklatest Feb 2 07:55:40 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:40 np0005604725 python3[41378]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 07:55:41 np0005604725 python3[41398]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:55:44 np0005604725 python3[41415]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:55:48 np0005604725 python3[41432]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:55:48 np0005604725 python3[41448]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:55:48 np0005604725 python3[41464]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 07:55:49 np0005604725 python3[41482]: ansible-certificate_request Invoked with name=memcached dns=['np0005604725.internalapi.ooo.test'] principal=['memcached/np0005604725.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep memcached)#012service_crt="/etc/pki/tls/certs/memcached.crt"#012service_key="/etc/pki/tls/private/memcached.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec -u root "$container_name" chown memcached:memcached "$service_crt"#012podman exec -u root "$container_name" chown memcached:memcached "$service_key"#012# Send refresh_certs command to memcached to read the new certificate#012memcached_ip="$(hiera -c /etc/puppet/hiera.yaml memcached::listen_ip.0 127.0.0.1)"#012memcached_port="$(hiera -c /etc/puppet/hiera.yaml memcached::tcp_port 11211)"#012echo refresh_certs | openssl s_client -connect $memcached_ip:$memcached_port#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:49 np0005604725 certmonger[41492]: 2026-02-02 07:55:49 [41492] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.internalapi.ooo.test" for child. Feb 2 07:55:49 np0005604725 certmonger[41492]: 2026-02-02 07:55:49 [41492] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.internalapi.ooo.test Feb 2 07:55:49 np0005604725 certmonger[41492]: " for child. Feb 2 07:55:49 np0005604725 certmonger[41492]: 2026-02-02 07:55:49 [41492] Setting "CERTMONGER_REQ_PRINCIPAL" to "memcached/np0005604725.internalapi.ooo.test@OOO.TEST Feb 2 07:55:49 np0005604725 certmonger[41492]: " for child. Feb 2 07:55:49 np0005604725 certmonger[41492]: 2026-02-02 07:55:49 [41492] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 07:55:49 np0005604725 certmonger[41492]: 2026-02-02 07:55:49 [41492] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 07:55:49 np0005604725 certmonger[41492]: MIID3DCCAsQCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NjA0NzI1LmludGVybmFsYXBp Feb 2 07:55:49 np0005604725 certmonger[41492]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAs7B8fFUZ Feb 2 07:55:49 np0005604725 certmonger[41492]: Eu/fEb1c/BZ+vKKXzxMJVmzVExW3aa1nLg3pco5pIzQ2HUwgHerwG4aXNQCZTEjo Feb 2 07:55:49 np0005604725 certmonger[41492]: 2ty8bwmjwMRvmeVgK4EAI5XM7cdpqdmKEVVzDeTnEkVrMRHq7/17aVVTxX5IW1tI Feb 2 07:55:49 np0005604725 certmonger[41492]: Ol3dJEHErBZcfAGv4U3v5f9NiZNKjxucCxk3qhxvBIqn9aO9A/tCieZwZgvsBQ5B Feb 2 07:55:49 np0005604725 certmonger[41492]: XVYKgG+BbcBPM+mnN0Y2Id1Qq9IzqkYKzbK0E1yVLm6GL0VuC/JbcDwN2oU8Rh2L Feb 2 07:55:49 np0005604725 certmonger[41492]: 0TC9fViX82MZIO+QHiYehhYEZs/DMP1gXjI6KJfKjfDCHqykH+R32OdP/U3Mh+9O Feb 2 07:55:49 np0005604725 certmonger[41492]: hbVtRkT5lqSJRwIDAQABoIIBaTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAy Feb 2 07:55:49 np0005604725 certmonger[41492]: ADAAMgAwADcANQA1ADQAOTCCATgGCSqGSIb3DQEJDjGCASkwggElMAsGA1UdDwQE Feb 2 07:55:49 np0005604725 certmonger[41492]: AwIFoDCByQYDVR0RBIHBMIG+giFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:55:49 np0005604725 certmonger[41492]: LnRlc3SgRAYKKwYBBAGCNxQCA6A2DDRtZW1jYWNoZWQvbnAwMDA1NjA0NzI1Lmlu Feb 2 07:55:49 np0005604725 certmonger[41492]: dGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFMGBisGAQUCAqBJMEegChsIT09P Feb 2 07:55:49 np0005604725 certmonger[41492]: LlRFU1ShOTA3oAMCAQGhMDAuGwltZW1jYWNoZWQbIW5wMDAwNTYwNDcyNS5pbnRl Feb 2 07:55:49 np0005604725 certmonger[41492]: cm5hbGFwaS5vb28udGVzdDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Feb 2 07:55:49 np0005604725 certmonger[41492]: DAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU4eVAiBAOzTVPHOHNbvFgsFq46UYwDQYJ Feb 2 07:55:49 np0005604725 certmonger[41492]: KoZIhvcNAQELBQADggEBAHBrEY1F+7g4W0NjpjLKw/t2Ogh18nnbRbN9Mc8nqN02 Feb 2 07:55:49 np0005604725 certmonger[41492]: Oi3PoTPEiQbEp5Daqfw3R8rddqzTEN2YsjgCTVUEMDHRjsGlAZTZzH8PZTWgwGng Feb 2 07:55:49 np0005604725 certmonger[41492]: VZd7+d/kTjgPwSYkNbX9hzvdUJ+HohG+ZwLmAHxVe10IbdycAcA9vq+2YXY7DD2J Feb 2 07:55:49 np0005604725 certmonger[41492]: GH3nYMVCKdxoBq9KxVQ3QOY1QPmz0GjiXyszVxrYCKWopqKq7c2JNjbjAkPiaslQ Feb 2 07:55:49 np0005604725 certmonger[41492]: P2A7vKevSFWTqEXp2OsJRGbRGTxzs5QqzX6uu1J3AMiQRcCanHClr4QNbqON1RVD Feb 2 07:55:49 np0005604725 certmonger[41492]: WFuojyMtLY+Pr8skXEnwRSwP6A3iaWikOdrUMeIbzBg= Feb 2 07:55:49 np0005604725 certmonger[41492]: -----END CERTIFICATE REQUEST----- Feb 2 07:55:49 np0005604725 certmonger[41492]: " for child. Feb 2 07:55:49 np0005604725 certmonger[41492]: 2026-02-02 07:55:49 [41492] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCzsHx8VRkS798RvVz8Fn68opfPEwlWbNUTFbdprWcuDelyjmkjNDYdTCAd6vAbhpc1AJlMSOja3LxvCaPAxG+Z5WArgQAjlcztx2mp2YoRVXMN5OcSRWsxEerv/XtpVVPFfkhbW0g6Xd0kQcSsFlx8Aa/hTe/l/02Jk0qPG5wLGTeqHG8Eiqf1o70D+0KJ5nBmC+wFDkFdVgqAb4FtwE8z6ac3RjYh3VCr0jOqRgrNsrQTXJUuboYvRW4L8ltwPA3ahTxGHYvRML19WJfzYxkg75AeJh6GFgRmz8Mw/WBeMjool8qN8MIerKQf5HfY50/9TcyH706FtW1GRPmWpIlHAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAk9wqcQfrHRwSMpsUHLUEzJnzinzUCfKQGVCyZ9kny3SMoAQfmorxIVZ6zVsDvSpvb9DdFI9U5j2kLXOW/3UaXicoIyxqaq9kRQST1NuC1sKWmzfolUPzXKuuIP3RKw+nwRXTtOmxM7C41JUEaU918FtetQumNDbRHP0UQBcXsa/9NFGmMltP0GUSPH2RhhN/3fLiDWIVHQ2fhZ7/w3t82VBmSbq9yfqBg43xP5sizenZHm6Q1nP5RObJdT+B194V95KJi3dZu6Yzhas1h68Cr3yXwhH0twHp5E5a2MkiwO5nnNcOaNpwgUbNlkmPdZqU1eTYiHPYPIJVNvX2i92M9w==" for child. Feb 2 07:55:49 np0005604725 certmonger[41492]: 2026-02-02 07:55:49 [41492] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAs7B8fFUZEu/fEb1c/BZ+vKKXzxMJVmzVExW3aa1nLg3pco5pIzQ2HUwgHerwG4aXNQCZTEjo2ty8bwmjwMRvmeVgK4EAI5XM7cdpqdmKEVVzDeTnEkVrMRHq7/17aVVTxX5IW1tIOl3dJEHErBZcfAGv4U3v5f9NiZNKjxucCxk3qhxvBIqn9aO9A/tCieZwZgvsBQ5BXVYKgG+BbcBPM+mnN0Y2Id1Qq9IzqkYKzbK0E1yVLm6GL0VuC/JbcDwN2oU8Rh2L0TC9fViX82MZIO+QHiYehhYEZs/DMP1gXjI6KJfKjfDCHqykH+R32OdP/U3Mh+9OhbVtRkT5lqSJRwIDAQAB" for child. Feb 2 07:55:49 np0005604725 certmonger[41492]: 2026-02-02 07:55:49 [41492] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 07:55:49 np0005604725 certmonger[41492]: 2026-02-02 07:55:49 [41492] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 07:55:49 np0005604725 certmonger[41492]: 2026-02-02 07:55:49 [41492] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 07:55:49 np0005604725 certmonger[41492]: 2026-02-02 07:55:49 [41492] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 07:55:49 np0005604725 certmonger[41492]: 2026-02-02 07:55:49 [41492] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 07:55:49 np0005604725 certmonger[39011]: 2026-02-02 07:55:49 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:50 np0005604725 certmonger[41492]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 07:55:50 np0005604725 certmonger[41492]: Certificate: "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" Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Certificate submission still ongoing. Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Certificate submission attempt complete. Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Child status = 0. Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Child output: Feb 2 07:55:50 np0005604725 certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 07:55:50 np0005604725 certmonger[39011]: MIIFbzCCA9egAwIBAgIRAPsaqHFEyaRnqGaP8yiPVbkwDQYJKoZIhvcNAQELBQAw Feb 2 07:55:50 np0005604725 certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:55:50 np0005604725 certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU1NTBaFw0yODAyMDMwNzU1NTBaMD8xETAPBgNVBAoM Feb 2 07:55:50 np0005604725 certmonger[39011]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:55:50 np0005604725 certmonger[39011]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCzsHx8VRkS798R Feb 2 07:55:50 np0005604725 certmonger[39011]: vVz8Fn68opfPEwlWbNUTFbdprWcuDelyjmkjNDYdTCAd6vAbhpc1AJlMSOja3Lxv Feb 2 07:55:50 np0005604725 certmonger[39011]: CaPAxG+Z5WArgQAjlcztx2mp2YoRVXMN5OcSRWsxEerv/XtpVVPFfkhbW0g6Xd0k Feb 2 07:55:50 np0005604725 certmonger[39011]: QcSsFlx8Aa/hTe/l/02Jk0qPG5wLGTeqHG8Eiqf1o70D+0KJ5nBmC+wFDkFdVgqA Feb 2 07:55:50 np0005604725 certmonger[39011]: b4FtwE8z6ac3RjYh3VCr0jOqRgrNsrQTXJUuboYvRW4L8ltwPA3ahTxGHYvRML19 Feb 2 07:55:50 np0005604725 certmonger[39011]: WJfzYxkg75AeJh6GFgRmz8Mw/WBeMjool8qN8MIerKQf5HfY50/9TcyH706FtW1G Feb 2 07:55:50 np0005604725 certmonger[39011]: RPmWpIlHAgMBAAGjggHwMIIB7DAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 07:55:50 np0005604725 certmonger[39011]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 07:55:50 np0005604725 certmonger[39011]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 07:55:50 np0005604725 certmonger[39011]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 07:55:50 np0005604725 certmonger[39011]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 07:55:50 np0005604725 certmonger[39011]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBQS Feb 2 07:55:50 np0005604725 certmonger[39011]: Gtm1YNj+EZx3D2r0da5qmoZm5jCByQYDVR0RBIHBMIG+giFucDAwMDU2MDQ3MjUu Feb 2 07:55:50 np0005604725 certmonger[39011]: aW50ZXJuYWxhcGkub29vLnRlc3SgRAYKKwYBBAGCNxQCA6A2DDRtZW1jYWNoZWQv Feb 2 07:55:50 np0005604725 certmonger[39011]: bnAwMDA1NjA0NzI1LmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFMGBisG Feb 2 07:55:50 np0005604725 certmonger[39011]: AQUCAqBJMEegChsIT09PLlRFU1ShOTA3oAMCAQGhMDAuGwltZW1jYWNoZWQbIW5w Feb 2 07:55:50 np0005604725 certmonger[39011]: MDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOC Feb 2 07:55:50 np0005604725 certmonger[39011]: AYEAM8ZguuMQqbDoa0u3Pg3cA43wCH9MnZ5wXb+6PskVtwh4efod9YFTWWFKM0YZ Feb 2 07:55:50 np0005604725 certmonger[39011]: JlM4uMFu2+iuj5ure++c0kWooboWTl03SuajHon5xKhQwcxea3trbVpGatYGBAPU Feb 2 07:55:50 np0005604725 certmonger[39011]: ELDyelzCTB90ZM1Lb1tnpxpWaNwcMeNw2b5IODjuXzgRGwz/a+0pUECbaW28B7MQ Feb 2 07:55:50 np0005604725 certmonger[39011]: X0LfpnyIj5IDjxkSDONk9amDtbDiDy3vf4y1jcGyonhSG7NR3tYpzZh5Z1seuDIp Feb 2 07:55:50 np0005604725 certmonger[39011]: IFVtEdIJNP2ZzZD2v0DNUX3tQKZrsxQQZDkXUPVaKzZGV0mT9QV1kQN0qmJrVRns Feb 2 07:55:50 np0005604725 certmonger[39011]: RGJq242bLPtSpZA06zc31M+MYJ6hNuBfZow/fT6xxSdAzi83is1+WOq7IqWsvjwo Feb 2 07:55:50 np0005604725 certmonger[39011]: 0UitbUXjHvwGs23CGHlqrNr34qYMkdDLz33zfBQx1dsh2fRvosA6eZMDi8kKdchR Feb 2 07:55:50 np0005604725 certmonger[39011]: AnNlpo0dI5eJT5H9rmaU1+HaONfaKhnNpmPd9WWsn3nCmaXlLOPtWYkWkVgDyIs7 Feb 2 07:55:50 np0005604725 certmonger[39011]: iqOD Feb 2 07:55:50 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:55:50 np0005604725 certmonger[39011]: " Feb 2 07:55:50 np0005604725 certmonger[41494]: 2026-02-02 07:55:50 [41494] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 07:55:50 np0005604725 certmonger[41494]: MIIFbzCCA9egAwIBAgIRAPsaqHFEyaRnqGaP8yiPVbkwDQYJKoZIhvcNAQELBQAw Feb 2 07:55:50 np0005604725 certmonger[41494]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:55:50 np0005604725 certmonger[41494]: cml0eTAeFw0yNjAyMDIwNzU1NTBaFw0yODAyMDMwNzU1NTBaMD8xETAPBgNVBAoM Feb 2 07:55:50 np0005604725 certmonger[41494]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:55:50 np0005604725 certmonger[41494]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCzsHx8VRkS798R Feb 2 07:55:50 np0005604725 certmonger[41494]: vVz8Fn68opfPEwlWbNUTFbdprWcuDelyjmkjNDYdTCAd6vAbhpc1AJlMSOja3Lxv Feb 2 07:55:50 np0005604725 certmonger[41494]: CaPAxG+Z5WArgQAjlcztx2mp2YoRVXMN5OcSRWsxEerv/XtpVVPFfkhbW0g6Xd0k Feb 2 07:55:50 np0005604725 certmonger[41494]: QcSsFlx8Aa/hTe/l/02Jk0qPG5wLGTeqHG8Eiqf1o70D+0KJ5nBmC+wFDkFdVgqA Feb 2 07:55:50 np0005604725 certmonger[41494]: b4FtwE8z6ac3RjYh3VCr0jOqRgrNsrQTXJUuboYvRW4L8ltwPA3ahTxGHYvRML19 Feb 2 07:55:50 np0005604725 certmonger[41494]: WJfzYxkg75AeJh6GFgRmz8Mw/WBeMjool8qN8MIerKQf5HfY50/9TcyH706FtW1G Feb 2 07:55:50 np0005604725 certmonger[41494]: RPmWpIlHAgMBAAGjggHwMIIB7DAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 07:55:50 np0005604725 certmonger[41494]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 07:55:50 np0005604725 certmonger[41494]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 07:55:50 np0005604725 certmonger[41494]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 07:55:50 np0005604725 certmonger[41494]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 07:55:50 np0005604725 certmonger[41494]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBQS Feb 2 07:55:50 np0005604725 certmonger[41494]: Gtm1YNj+EZx3D2r0da5qmoZm5jCByQYDVR0RBIHBMIG+giFucDAwMDU2MDQ3MjUu Feb 2 07:55:50 np0005604725 certmonger[41494]: aW50ZXJuYWxhcGkub29vLnRlc3SgRAYKKwYBBAGCNxQCA6A2DDRtZW1jYWNoZWQv Feb 2 07:55:50 np0005604725 certmonger[41494]: bnAwMDA1NjA0NzI1LmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFMGBisG Feb 2 07:55:50 np0005604725 certmonger[41494]: AQUCAqBJMEegChsIT09PLlRFU1ShOTA3oAMCAQGhMDAuGwltZW1jYWNoZWQbIW5w Feb 2 07:55:50 np0005604725 certmonger[41494]: MDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOC Feb 2 07:55:50 np0005604725 certmonger[41494]: AYEAM8ZguuMQqbDoa0u3Pg3cA43wCH9MnZ5wXb+6PskVtwh4efod9YFTWWFKM0YZ Feb 2 07:55:50 np0005604725 certmonger[41494]: JlM4uMFu2+iuj5ure++c0kWooboWTl03SuajHon5xKhQwcxea3trbVpGatYGBAPU Feb 2 07:55:50 np0005604725 certmonger[41494]: ELDyelzCTB90ZM1Lb1tnpxpWaNwcMeNw2b5IODjuXzgRGwz/a+0pUECbaW28B7MQ Feb 2 07:55:50 np0005604725 certmonger[41494]: X0LfpnyIj5IDjxkSDONk9amDtbDiDy3vf4y1jcGyonhSG7NR3tYpzZh5Z1seuDIp Feb 2 07:55:50 np0005604725 certmonger[41494]: IFVtEdIJNP2ZzZD2v0DNUX3tQKZrsxQQZDkXUPVaKzZGV0mT9QV1kQN0qmJrVRns Feb 2 07:55:50 np0005604725 certmonger[41494]: RGJq242bLPtSpZA06zc31M+MYJ6hNuBfZow/fT6xxSdAzi83is1+WOq7IqWsvjwo Feb 2 07:55:50 np0005604725 certmonger[41494]: 0UitbUXjHvwGs23CGHlqrNr34qYMkdDLz33zfBQx1dsh2fRvosA6eZMDi8kKdchR Feb 2 07:55:50 np0005604725 certmonger[41494]: AnNlpo0dI5eJT5H9rmaU1+HaONfaKhnNpmPd9WWsn3nCmaXlLOPtWYkWkVgDyIs7 Feb 2 07:55:50 np0005604725 certmonger[41494]: iqOD Feb 2 07:55:50 np0005604725 certmonger[41494]: -----END CERTIFICATE----- Feb 2 07:55:50 np0005604725 certmonger[41494]: ". Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Certificate submission still ongoing. Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Certificate submission postprocessing complete. Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Child status = 0. Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Child output: Feb 2 07:55:50 np0005604725 certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----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\niqOD\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 07:55:50 np0005604725 certmonger[39011]: " Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 07:55:50 np0005604725 certmonger[39011]: MIIFbzCCA9egAwIBAgIRAPsaqHFEyaRnqGaP8yiPVbkwDQYJKoZIhvcNAQELBQAw Feb 2 07:55:50 np0005604725 certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:55:50 np0005604725 certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU1NTBaFw0yODAyMDMwNzU1NTBaMD8xETAPBgNVBAoM Feb 2 07:55:50 np0005604725 certmonger[39011]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:55:50 np0005604725 certmonger[39011]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCzsHx8VRkS798R Feb 2 07:55:50 np0005604725 certmonger[39011]: vVz8Fn68opfPEwlWbNUTFbdprWcuDelyjmkjNDYdTCAd6vAbhpc1AJlMSOja3Lxv Feb 2 07:55:50 np0005604725 certmonger[39011]: CaPAxG+Z5WArgQAjlcztx2mp2YoRVXMN5OcSRWsxEerv/XtpVVPFfkhbW0g6Xd0k Feb 2 07:55:50 np0005604725 certmonger[39011]: QcSsFlx8Aa/hTe/l/02Jk0qPG5wLGTeqHG8Eiqf1o70D+0KJ5nBmC+wFDkFdVgqA Feb 2 07:55:50 np0005604725 certmonger[39011]: b4FtwE8z6ac3RjYh3VCr0jOqRgrNsrQTXJUuboYvRW4L8ltwPA3ahTxGHYvRML19 Feb 2 07:55:50 np0005604725 certmonger[39011]: WJfzYxkg75AeJh6GFgRmz8Mw/WBeMjool8qN8MIerKQf5HfY50/9TcyH706FtW1G Feb 2 07:55:50 np0005604725 certmonger[39011]: RPmWpIlHAgMBAAGjggHwMIIB7DAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 07:55:50 np0005604725 certmonger[39011]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 07:55:50 np0005604725 certmonger[39011]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 07:55:50 np0005604725 certmonger[39011]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 07:55:50 np0005604725 certmonger[39011]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 07:55:50 np0005604725 certmonger[39011]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBQS Feb 2 07:55:50 np0005604725 certmonger[39011]: Gtm1YNj+EZx3D2r0da5qmoZm5jCByQYDVR0RBIHBMIG+giFucDAwMDU2MDQ3MjUu Feb 2 07:55:50 np0005604725 certmonger[39011]: aW50ZXJuYWxhcGkub29vLnRlc3SgRAYKKwYBBAGCNxQCA6A2DDRtZW1jYWNoZWQv Feb 2 07:55:50 np0005604725 certmonger[39011]: bnAwMDA1NjA0NzI1LmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFMGBisG Feb 2 07:55:50 np0005604725 certmonger[39011]: AQUCAqBJMEegChsIT09PLlRFU1ShOTA3oAMCAQGhMDAuGwltZW1jYWNoZWQbIW5w Feb 2 07:55:50 np0005604725 certmonger[39011]: MDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOC Feb 2 07:55:50 np0005604725 certmonger[39011]: AYEAM8ZguuMQqbDoa0u3Pg3cA43wCH9MnZ5wXb+6PskVtwh4efod9YFTWWFKM0YZ Feb 2 07:55:50 np0005604725 certmonger[39011]: JlM4uMFu2+iuj5ure++c0kWooboWTl03SuajHon5xKhQwcxea3trbVpGatYGBAPU Feb 2 07:55:50 np0005604725 certmonger[39011]: ELDyelzCTB90ZM1Lb1tnpxpWaNwcMeNw2b5IODjuXzgRGwz/a+0pUECbaW28B7MQ Feb 2 07:55:50 np0005604725 certmonger[39011]: X0LfpnyIj5IDjxkSDONk9amDtbDiDy3vf4y1jcGyonhSG7NR3tYpzZh5Z1seuDIp Feb 2 07:55:50 np0005604725 certmonger[39011]: IFVtEdIJNP2ZzZD2v0DNUX3tQKZrsxQQZDkXUPVaKzZGV0mT9QV1kQN0qmJrVRns Feb 2 07:55:50 np0005604725 certmonger[39011]: RGJq242bLPtSpZA06zc31M+MYJ6hNuBfZow/fT6xxSdAzi83is1+WOq7IqWsvjwo Feb 2 07:55:50 np0005604725 certmonger[39011]: 0UitbUXjHvwGs23CGHlqrNr34qYMkdDLz33zfBQx1dsh2fRvosA6eZMDi8kKdchR Feb 2 07:55:50 np0005604725 certmonger[39011]: AnNlpo0dI5eJT5H9rmaU1+HaONfaKhnNpmPd9WWsn3nCmaXlLOPtWYkWkVgDyIs7 Feb 2 07:55:50 np0005604725 certmonger[39011]: iqOD Feb 2 07:55:50 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:55:50 np0005604725 certmonger[39011]: ". Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] No hooks set for pre-save command. Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:50 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:50 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:50 np0005604725 certmonger[41562]: Certificate in file "/etc/pki/tls/certs/memcached.crt" issued by CA and saved. Feb 2 07:55:50 np0005604725 certmonger[39011]: 2026-02-02 07:55:50 [39011] Wrote to /var/lib/certmonger/requests/20260202075549 Feb 2 07:55:51 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:55:51 np0005604725 python3[41578]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 07:55:52 np0005604725 python3[41598]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:55:55 np0005604725 python3[41615]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:55:58 np0005604725 python3[41632]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:55:59 np0005604725 python3[41648]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:56:00 np0005604725 python3[41664]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 07:56:00 np0005604725 python3[41682]: ansible-certificate_request Invoked with name=metrics_qdr dns=['np0005604725.internalapi.ooo.test'] principal=['metrics_qdr/np0005604725.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep metrics_qdr)#012service_crt="/etc/pki/tls/certs/metrics_qdr.crt"#012service_key="/etc/pki/tls/private/metrics_qdr.key#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec "$container_name" chown qdrouterd:qdrouterd "$service_crt"#012podman exec "$container_name" chown qdrouterd:qdrouterd "$service_key"#012# Trigger a container restart to read the new certificate#012podman restart "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 07:56:00 np0005604725 certmonger[39011]: 2026-02-02 07:56:00 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:00 np0005604725 certmonger[39011]: 2026-02-02 07:56:00 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:00 np0005604725 certmonger[39011]: 2026-02-02 07:56:00 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:00 np0005604725 certmonger[39011]: 2026-02-02 07:56:00 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:00 np0005604725 certmonger[39011]: 2026-02-02 07:56:00 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:00 np0005604725 certmonger[39011]: 2026-02-02 07:56:00 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:00 np0005604725 certmonger[39011]: 2026-02-02 07:56:00 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:00 np0005604725 certmonger[39011]: 2026-02-02 07:56:00 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:00 np0005604725 certmonger[39011]: 2026-02-02 07:56:00 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[41692]: 2026-02-02 07:56:01 [41692] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.internalapi.ooo.test" for child. Feb 2 07:56:01 np0005604725 certmonger[41692]: 2026-02-02 07:56:01 [41692] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.internalapi.ooo.test Feb 2 07:56:01 np0005604725 certmonger[41692]: " for child. Feb 2 07:56:01 np0005604725 certmonger[41692]: 2026-02-02 07:56:01 [41692] Setting "CERTMONGER_REQ_PRINCIPAL" to "metrics_qdr/np0005604725.internalapi.ooo.test@OOO.TEST Feb 2 07:56:01 np0005604725 certmonger[41692]: " for child. Feb 2 07:56:01 np0005604725 certmonger[41692]: 2026-02-02 07:56:01 [41692] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 07:56:01 np0005604725 certmonger[41692]: 2026-02-02 07:56:01 [41692] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 07:56:01 np0005604725 certmonger[41692]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NjA0NzI1LmludGVybmFsYXBp Feb 2 07:56:01 np0005604725 certmonger[41692]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5DiWzvAa Feb 2 07:56:01 np0005604725 certmonger[41692]: 11zJzd4kjWIeTbcUhX2Q+8j8IfmV/x/Kpi2eSIkiLmDoOyP4f6j1XUapLKr1df8N Feb 2 07:56:01 np0005604725 certmonger[41692]: NKkvomiC8UDlBm2J1v+yan+U/bE8rwmaSh5TBW1gIq9eJTTxwFJfMzPFN0ytQUFb Feb 2 07:56:01 np0005604725 certmonger[41692]: SMo+72ul1rmPnVk8rAYDU4QLqJFftW3Jf6MTxEbDnFLx0QvdQA49GRw9g+MSaK7X Feb 2 07:56:01 np0005604725 certmonger[41692]: isGcqumJQ1tqnZw+LIHQ13CDZ6+7rHGLJ6ao3oirkv6nQvv2zTv5AnJRyd2Vhphe Feb 2 07:56:01 np0005604725 certmonger[41692]: pZQyVGnBPDg8XBWwizut0bmemS06Y59wltOa0s/tJ1c1GZi1r1HOypM3cspuoxGP Feb 2 07:56:01 np0005604725 certmonger[41692]: G8ErvW5e/63jYwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAy Feb 2 07:56:01 np0005604725 certmonger[41692]: ADAAMgAwADcANQA2ADAAMDCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Feb 2 07:56:01 np0005604725 certmonger[41692]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:56:01 np0005604725 certmonger[41692]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fkci9ucDAwMDU2MDQ3MjUu Feb 2 07:56:01 np0005604725 certmonger[41692]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Feb 2 07:56:01 np0005604725 certmonger[41692]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRyGyFucDAwMDU2MDQ3MjUu Feb 2 07:56:01 np0005604725 certmonger[41692]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Feb 2 07:56:01 np0005604725 certmonger[41692]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFHBbHQShD1WDvhXUpTHMLDDLmx+B Feb 2 07:56:01 np0005604725 certmonger[41692]: MA0GCSqGSIb3DQEBCwUAA4IBAQDZUKiQfzMNKBeaf/6TMyaK8K/lH0cBhFiFvP7J Feb 2 07:56:01 np0005604725 certmonger[41692]: KIv/RWV3tQwOcy7Xvy+aX81bTafIVoD4lvX8WTCsdRsZyjvW+xD36LgTI8tr4BPP Feb 2 07:56:01 np0005604725 certmonger[41692]: WVnyEJBzXihWmVEENjgirJGZKZJpWd68tYT/hKFxsL3kbtUKWmf10BsC/QcNGC7+ Feb 2 07:56:01 np0005604725 certmonger[41692]: onkbKlh/gcZnMwvQHOeERTAYOhRMuc1B6Kme8u//lpzwZv1RJOeapHjPq9FDvH6V Feb 2 07:56:01 np0005604725 certmonger[41692]: H7xKrhwfeWQuatZo9ISjFl1ebQL7spp9Nx3+sERPfm7IZ3FCrkSD3CHTb2yjSgIh Feb 2 07:56:01 np0005604725 certmonger[41692]: ZSfnJTkQhx7KeVgkOJh6CuePXcWisU5N8wZRijTaMDeSVlS3 Feb 2 07:56:01 np0005604725 certmonger[41692]: -----END CERTIFICATE REQUEST----- Feb 2 07:56:01 np0005604725 certmonger[41692]: " for child. Feb 2 07:56:01 np0005604725 certmonger[41692]: 2026-02-02 07:56:01 [41692] Setting "CERTMONGER_SPKAC" to "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" for child. Feb 2 07:56:01 np0005604725 certmonger[41692]: 2026-02-02 07:56:01 [41692] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5DiWzvAa11zJzd4kjWIeTbcUhX2Q+8j8IfmV/x/Kpi2eSIkiLmDoOyP4f6j1XUapLKr1df8NNKkvomiC8UDlBm2J1v+yan+U/bE8rwmaSh5TBW1gIq9eJTTxwFJfMzPFN0ytQUFbSMo+72ul1rmPnVk8rAYDU4QLqJFftW3Jf6MTxEbDnFLx0QvdQA49GRw9g+MSaK7XisGcqumJQ1tqnZw+LIHQ13CDZ6+7rHGLJ6ao3oirkv6nQvv2zTv5AnJRyd2VhphepZQyVGnBPDg8XBWwizut0bmemS06Y59wltOa0s/tJ1c1GZi1r1HOypM3cspuoxGPG8ErvW5e/63jYwIDAQAB" for child. Feb 2 07:56:01 np0005604725 certmonger[41692]: 2026-02-02 07:56:01 [41692] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 07:56:01 np0005604725 certmonger[41692]: 2026-02-02 07:56:01 [41692] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 07:56:01 np0005604725 certmonger[41692]: 2026-02-02 07:56:01 [41692] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 07:56:01 np0005604725 certmonger[41692]: 2026-02-02 07:56:01 [41692] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 07:56:01 np0005604725 certmonger[41692]: 2026-02-02 07:56:01 [41692] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[41692]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 07:56:01 np0005604725 certmonger[41692]: Certificate: "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" Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Certificate submission still ongoing. Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Certificate submission attempt complete. Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Child status = 0. Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Child output: Feb 2 07:56:01 np0005604725 certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 07:56:01 np0005604725 certmonger[39011]: MIIFczCCA9ugAwIBAgIRAKg4a4OfYGH2eD4JmwdI2LkwDQYJKoZIhvcNAQELBQAw Feb 2 07:56:01 np0005604725 certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:56:01 np0005604725 certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU2MDFaFw0yODAyMDMwNzU2MDFaMD8xETAPBgNVBAoM Feb 2 07:56:01 np0005604725 certmonger[39011]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:56:01 np0005604725 certmonger[39011]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDkOJbO8BrXXMnN Feb 2 07:56:01 np0005604725 certmonger[39011]: 3iSNYh5NtxSFfZD7yPwh+ZX/H8qmLZ5IiSIuYOg7I/h/qPVdRqksqvV1/w00qS+i Feb 2 07:56:01 np0005604725 certmonger[39011]: aILxQOUGbYnW/7Jqf5T9sTyvCZpKHlMFbWAir14lNPHAUl8zM8U3TK1BQVtIyj7v Feb 2 07:56:01 np0005604725 certmonger[39011]: a6XWuY+dWTysBgNThAuokV+1bcl/oxPERsOcUvHRC91ADj0ZHD2D4xJorteKwZyq Feb 2 07:56:01 np0005604725 certmonger[39011]: 6YlDW2qdnD4sgdDXcINnr7uscYsnpqjeiKuS/qdC+/bNO/kCclHJ3ZWGmF6llDJU Feb 2 07:56:01 np0005604725 certmonger[39011]: acE8ODxcFbCLO63RuZ6ZLTpjn3CW05rSz+0nVzUZmLWvUc7Kkzdyym6jEY8bwSu9 Feb 2 07:56:01 np0005604725 certmonger[39011]: bl7/reNjAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 07:56:01 np0005604725 certmonger[39011]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:01 np0005604725 certmonger[39011]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 07:56:01 np0005604725 certmonger[39011]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:01 np0005604725 certmonger[39011]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 07:56:01 np0005604725 certmonger[39011]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBR2 Feb 2 07:56:01 np0005604725 certmonger[39011]: 4LjrdcaEZoKx4xCB6OAPXgtyvTCBzQYDVR0RBIHFMIHCgiFucDAwMDU2MDQ3MjUu Feb 2 07:56:01 np0005604725 certmonger[39011]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fk Feb 2 07:56:01 np0005604725 certmonger[39011]: ci9ucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Feb 2 07:56:01 np0005604725 certmonger[39011]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRy Feb 2 07:56:01 np0005604725 certmonger[39011]: GyFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Feb 2 07:56:01 np0005604725 certmonger[39011]: BQADggGBAAphSkyuYyCNO6KeMD4h41e9fMmvixaiTGnBlb+MrmdXTUw9iwgpqcj6 Feb 2 07:56:01 np0005604725 certmonger[39011]: 6DzEubKN00tTA738Z1mlZDR+/mNH0UFm2orqYeihy8w4QFPL5YH3z9qxpBBrHMMH Feb 2 07:56:01 np0005604725 certmonger[39011]: m3KsYLqrrM2qKBs4VSIKkY9DzBhuVG+ecIg4womDeSRMIJOt/Ax/al5WivMDB2R3 Feb 2 07:56:01 np0005604725 certmonger[39011]: LA9WxCPnlzIOu7Hd1/8DTMUBGJ8XzcwsP3csqfeLKHW10N9/7P0dks1yAa9/zeuG Feb 2 07:56:01 np0005604725 certmonger[39011]: KCVz/Nz7RR2tEUP20FZRFWcv2xKe70XjN3gvsQDMBTL+U3uf9qgMlDeBhAeHSJQn Feb 2 07:56:01 np0005604725 certmonger[39011]: BTS0ncvu088n0Q45+cUXCtYbTXfjv1GxhRZvwmrz6q3EIAp7JL0BTQgABewQG1x8 Feb 2 07:56:01 np0005604725 certmonger[39011]: 1wmcGQ+XRMLtd+afuiDmELdyBH721UpLkMJ7HCBaBjpG1dQmd10qBXGmMPrJuuKU Feb 2 07:56:01 np0005604725 certmonger[39011]: setY9EVPBc7a/5kQB6MkuaNfBec5/N83SWHiQEgBtGAHVjkFosNnWtey8oT+pecN Feb 2 07:56:01 np0005604725 certmonger[39011]: Hp2rpF1opg== Feb 2 07:56:01 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:56:01 np0005604725 certmonger[39011]: " Feb 2 07:56:01 np0005604725 certmonger[41694]: 2026-02-02 07:56:01 [41694] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 07:56:01 np0005604725 certmonger[41694]: MIIFczCCA9ugAwIBAgIRAKg4a4OfYGH2eD4JmwdI2LkwDQYJKoZIhvcNAQELBQAw Feb 2 07:56:01 np0005604725 certmonger[41694]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:56:01 np0005604725 certmonger[41694]: cml0eTAeFw0yNjAyMDIwNzU2MDFaFw0yODAyMDMwNzU2MDFaMD8xETAPBgNVBAoM Feb 2 07:56:01 np0005604725 certmonger[41694]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:56:01 np0005604725 certmonger[41694]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDkOJbO8BrXXMnN Feb 2 07:56:01 np0005604725 certmonger[41694]: 3iSNYh5NtxSFfZD7yPwh+ZX/H8qmLZ5IiSIuYOg7I/h/qPVdRqksqvV1/w00qS+i Feb 2 07:56:01 np0005604725 certmonger[41694]: aILxQOUGbYnW/7Jqf5T9sTyvCZpKHlMFbWAir14lNPHAUl8zM8U3TK1BQVtIyj7v Feb 2 07:56:01 np0005604725 certmonger[41694]: a6XWuY+dWTysBgNThAuokV+1bcl/oxPERsOcUvHRC91ADj0ZHD2D4xJorteKwZyq Feb 2 07:56:01 np0005604725 certmonger[41694]: 6YlDW2qdnD4sgdDXcINnr7uscYsnpqjeiKuS/qdC+/bNO/kCclHJ3ZWGmF6llDJU Feb 2 07:56:01 np0005604725 certmonger[41694]: acE8ODxcFbCLO63RuZ6ZLTpjn3CW05rSz+0nVzUZmLWvUc7Kkzdyym6jEY8bwSu9 Feb 2 07:56:01 np0005604725 certmonger[41694]: bl7/reNjAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 07:56:01 np0005604725 certmonger[41694]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:01 np0005604725 certmonger[41694]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 07:56:01 np0005604725 certmonger[41694]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:01 np0005604725 certmonger[41694]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 07:56:01 np0005604725 certmonger[41694]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBR2 Feb 2 07:56:01 np0005604725 certmonger[41694]: 4LjrdcaEZoKx4xCB6OAPXgtyvTCBzQYDVR0RBIHFMIHCgiFucDAwMDU2MDQ3MjUu Feb 2 07:56:01 np0005604725 certmonger[41694]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fk Feb 2 07:56:01 np0005604725 certmonger[41694]: ci9ucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Feb 2 07:56:01 np0005604725 certmonger[41694]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRy Feb 2 07:56:01 np0005604725 certmonger[41694]: GyFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Feb 2 07:56:01 np0005604725 certmonger[41694]: BQADggGBAAphSkyuYyCNO6KeMD4h41e9fMmvixaiTGnBlb+MrmdXTUw9iwgpqcj6 Feb 2 07:56:01 np0005604725 certmonger[41694]: 6DzEubKN00tTA738Z1mlZDR+/mNH0UFm2orqYeihy8w4QFPL5YH3z9qxpBBrHMMH Feb 2 07:56:01 np0005604725 certmonger[41694]: m3KsYLqrrM2qKBs4VSIKkY9DzBhuVG+ecIg4womDeSRMIJOt/Ax/al5WivMDB2R3 Feb 2 07:56:01 np0005604725 certmonger[41694]: LA9WxCPnlzIOu7Hd1/8DTMUBGJ8XzcwsP3csqfeLKHW10N9/7P0dks1yAa9/zeuG Feb 2 07:56:01 np0005604725 certmonger[41694]: KCVz/Nz7RR2tEUP20FZRFWcv2xKe70XjN3gvsQDMBTL+U3uf9qgMlDeBhAeHSJQn Feb 2 07:56:01 np0005604725 certmonger[41694]: BTS0ncvu088n0Q45+cUXCtYbTXfjv1GxhRZvwmrz6q3EIAp7JL0BTQgABewQG1x8 Feb 2 07:56:01 np0005604725 certmonger[41694]: 1wmcGQ+XRMLtd+afuiDmELdyBH721UpLkMJ7HCBaBjpG1dQmd10qBXGmMPrJuuKU Feb 2 07:56:01 np0005604725 certmonger[41694]: setY9EVPBc7a/5kQB6MkuaNfBec5/N83SWHiQEgBtGAHVjkFosNnWtey8oT+pecN Feb 2 07:56:01 np0005604725 certmonger[41694]: Hp2rpF1opg== Feb 2 07:56:01 np0005604725 certmonger[41694]: -----END CERTIFICATE----- Feb 2 07:56:01 np0005604725 certmonger[41694]: ". Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Certificate submission still ongoing. Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Certificate submission postprocessing complete. Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Child status = 0. Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Child output: Feb 2 07:56:01 np0005604725 certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nHp2rpF1opg==\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 07:56:01 np0005604725 certmonger[39011]: " Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 07:56:01 np0005604725 certmonger[39011]: MIIFczCCA9ugAwIBAgIRAKg4a4OfYGH2eD4JmwdI2LkwDQYJKoZIhvcNAQELBQAw Feb 2 07:56:01 np0005604725 certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:56:01 np0005604725 certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU2MDFaFw0yODAyMDMwNzU2MDFaMD8xETAPBgNVBAoM Feb 2 07:56:01 np0005604725 certmonger[39011]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:56:01 np0005604725 certmonger[39011]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDkOJbO8BrXXMnN Feb 2 07:56:01 np0005604725 certmonger[39011]: 3iSNYh5NtxSFfZD7yPwh+ZX/H8qmLZ5IiSIuYOg7I/h/qPVdRqksqvV1/w00qS+i Feb 2 07:56:01 np0005604725 certmonger[39011]: aILxQOUGbYnW/7Jqf5T9sTyvCZpKHlMFbWAir14lNPHAUl8zM8U3TK1BQVtIyj7v Feb 2 07:56:01 np0005604725 certmonger[39011]: a6XWuY+dWTysBgNThAuokV+1bcl/oxPERsOcUvHRC91ADj0ZHD2D4xJorteKwZyq Feb 2 07:56:01 np0005604725 certmonger[39011]: 6YlDW2qdnD4sgdDXcINnr7uscYsnpqjeiKuS/qdC+/bNO/kCclHJ3ZWGmF6llDJU Feb 2 07:56:01 np0005604725 certmonger[39011]: acE8ODxcFbCLO63RuZ6ZLTpjn3CW05rSz+0nVzUZmLWvUc7Kkzdyym6jEY8bwSu9 Feb 2 07:56:01 np0005604725 certmonger[39011]: bl7/reNjAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 07:56:01 np0005604725 certmonger[39011]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:01 np0005604725 certmonger[39011]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 07:56:01 np0005604725 certmonger[39011]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:01 np0005604725 certmonger[39011]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 07:56:01 np0005604725 certmonger[39011]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBR2 Feb 2 07:56:01 np0005604725 certmonger[39011]: 4LjrdcaEZoKx4xCB6OAPXgtyvTCBzQYDVR0RBIHFMIHCgiFucDAwMDU2MDQ3MjUu Feb 2 07:56:01 np0005604725 certmonger[39011]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fk Feb 2 07:56:01 np0005604725 certmonger[39011]: ci9ucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Feb 2 07:56:01 np0005604725 certmonger[39011]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRy Feb 2 07:56:01 np0005604725 certmonger[39011]: GyFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Feb 2 07:56:01 np0005604725 certmonger[39011]: BQADggGBAAphSkyuYyCNO6KeMD4h41e9fMmvixaiTGnBlb+MrmdXTUw9iwgpqcj6 Feb 2 07:56:01 np0005604725 certmonger[39011]: 6DzEubKN00tTA738Z1mlZDR+/mNH0UFm2orqYeihy8w4QFPL5YH3z9qxpBBrHMMH Feb 2 07:56:01 np0005604725 certmonger[39011]: m3KsYLqrrM2qKBs4VSIKkY9DzBhuVG+ecIg4womDeSRMIJOt/Ax/al5WivMDB2R3 Feb 2 07:56:01 np0005604725 certmonger[39011]: LA9WxCPnlzIOu7Hd1/8DTMUBGJ8XzcwsP3csqfeLKHW10N9/7P0dks1yAa9/zeuG Feb 2 07:56:01 np0005604725 certmonger[39011]: KCVz/Nz7RR2tEUP20FZRFWcv2xKe70XjN3gvsQDMBTL+U3uf9qgMlDeBhAeHSJQn Feb 2 07:56:01 np0005604725 certmonger[39011]: BTS0ncvu088n0Q45+cUXCtYbTXfjv1GxhRZvwmrz6q3EIAp7JL0BTQgABewQG1x8 Feb 2 07:56:01 np0005604725 certmonger[39011]: 1wmcGQ+XRMLtd+afuiDmELdyBH721UpLkMJ7HCBaBjpG1dQmd10qBXGmMPrJuuKU Feb 2 07:56:01 np0005604725 certmonger[39011]: setY9EVPBc7a/5kQB6MkuaNfBec5/N83SWHiQEgBtGAHVjkFosNnWtey8oT+pecN Feb 2 07:56:01 np0005604725 certmonger[39011]: Hp2rpF1opg== Feb 2 07:56:01 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:56:01 np0005604725 certmonger[39011]: ". Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] No hooks set for pre-save command. Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:01 np0005604725 certmonger[41712]: Certificate in file "/etc/pki/tls/certs/metrics_qdr.crt" issued by CA and saved. Feb 2 07:56:01 np0005604725 certmonger[39011]: 2026-02-02 07:56:01 [39011] Wrote to /var/lib/certmonger/requests/20260202075600 Feb 2 07:56:02 np0005604725 python3[41728]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 07:56:03 np0005604725 python3[41748]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:56:07 np0005604725 python3[42020]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:56:11 np0005604725 python3[42037]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:56:11 np0005604725 python3[42053]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:56:12 np0005604725 python3[42069]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 07:56:12 np0005604725 python3[42087]: ansible-certificate_request Invoked with name=mysql dns=['np0005604725.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['mysql/np0005604725.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Feb 2 07:56:12 np0005604725 certmonger[39011]: 2026-02-02 07:56:12 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:12 np0005604725 certmonger[39011]: 2026-02-02 07:56:12 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:12 np0005604725 certmonger[39011]: 2026-02-02 07:56:12 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:12 np0005604725 certmonger[39011]: 2026-02-02 07:56:12 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:12 np0005604725 certmonger[39011]: 2026-02-02 07:56:12 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:12 np0005604725 certmonger[39011]: 2026-02-02 07:56:12 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:12 np0005604725 certmonger[39011]: 2026-02-02 07:56:12 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:12 np0005604725 certmonger[39011]: 2026-02-02 07:56:12 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:12 np0005604725 certmonger[39011]: 2026-02-02 07:56:12 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[42097]: 2026-02-02 07:56:13 [42097] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.internalapi.ooo.test" for child. Feb 2 07:56:13 np0005604725 certmonger[42097]: 2026-02-02 07:56:13 [42097] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.internalapi.ooo.test Feb 2 07:56:13 np0005604725 certmonger[42097]: overcloud.internalapi.ooo.test Feb 2 07:56:13 np0005604725 certmonger[42097]: " for child. Feb 2 07:56:13 np0005604725 certmonger[42097]: 2026-02-02 07:56:13 [42097] Setting "CERTMONGER_REQ_PRINCIPAL" to "mysql/np0005604725.internalapi.ooo.test@OOO.TEST Feb 2 07:56:13 np0005604725 certmonger[42097]: " for child. Feb 2 07:56:13 np0005604725 certmonger[42097]: 2026-02-02 07:56:13 [42097] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 07:56:13 np0005604725 certmonger[42097]: 2026-02-02 07:56:13 [42097] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 07:56:13 np0005604725 certmonger[42097]: MIID9DCCAtwCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NjA0NzI1LmludGVybmFsYXBp Feb 2 07:56:13 np0005604725 certmonger[42097]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsEMhWuFs Feb 2 07:56:13 np0005604725 certmonger[42097]: 4Epx70MYAy32+uRoso5hgss9oYaUurKvvdSEHMii1foyNPchm03EEs3vS2XwuFPk Feb 2 07:56:13 np0005604725 certmonger[42097]: vsO5ihMEgQmTNkJHlTj9DSj5Ks4EE6tmrAG33zXOgl6gD8zrfyqCKqBvONjDe+Pc Feb 2 07:56:13 np0005604725 certmonger[42097]: F4BrhGdepdjQrDiHghrJD80vMu2VsrqbEtr2BCATNzLtLCJnPxJZgBKG3uki5bYP Feb 2 07:56:13 np0005604725 certmonger[42097]: Mv/qen8qzTyirWIfhnviOhZbNnIn/H6SNq9KTvLWz3fpOfpozAn8h10PTRGKer9m Feb 2 07:56:13 np0005604725 certmonger[42097]: OqIMXdIcAMvNkmlsP6eu46kKBr8sUQBdbtI5H50FLbrcsskmBUC6V1y3PEWGtgay Feb 2 07:56:13 np0005604725 certmonger[42097]: QQEupKgnOOLynwIDAQABoIIBgTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAy Feb 2 07:56:13 np0005604725 certmonger[42097]: ADAAMgAwADcANQA2ADEAMjCCAVAGCSqGSIb3DQEJDjGCAUEwggE9MAsGA1UdDwQE Feb 2 07:56:13 np0005604725 certmonger[42097]: AwIFoDCB4QYDVR0RBIHZMIHWgiFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:56:13 np0005604725 certmonger[42097]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBABgorBgEEAYI3 Feb 2 07:56:13 np0005604725 certmonger[42097]: FAIDoDIMMG15c3FsL25wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBP Feb 2 07:56:13 np0005604725 certmonger[42097]: T08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNUoTUwM6ADAgEBoSwwKhsF Feb 2 07:56:13 np0005604725 certmonger[42097]: bXlzcWwbIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDAdBgNVHSUE Feb 2 07:56:13 np0005604725 certmonger[42097]: FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU Feb 2 07:56:13 np0005604725 certmonger[42097]: Ii6Tv0poR9w/HQvlMG5RoOtpNJAwDQYJKoZIhvcNAQELBQADggEBABPKsjpuNeel Feb 2 07:56:13 np0005604725 certmonger[42097]: XJ4zrJz2wa4a24GUfEQ9OG2LiTrq8/yLnCGoBNH7BQClpFpedXBmdiGWgoDjJbZm Feb 2 07:56:13 np0005604725 certmonger[42097]: /xOXZti58bobkr/wfPBwkrLPHO0vh70RQx1e73ZgykKESNnqoELlpmN/z5RjuOpe Feb 2 07:56:13 np0005604725 certmonger[42097]: yyC8pDoZ4zl0K07Lh9vKz3BnZmdwg9tW/9520pA24dhJq686QOwsMHVMDeG5VS2Y Feb 2 07:56:13 np0005604725 certmonger[42097]: l+ijQVUG+at5VseSkpXAfKcD6C7s/dkyVkQIc1ibG4VBT+YGseWkNp738vD/WQgZ Feb 2 07:56:13 np0005604725 certmonger[42097]: 7iE56ntfC0mFIxFqiRfanbyWhGOV51+oYK49aJb6bUxy4jpN8FCdeDl/kHhxhdwT Feb 2 07:56:13 np0005604725 certmonger[42097]: wxaQXlYkfsI= Feb 2 07:56:13 np0005604725 certmonger[42097]: -----END CERTIFICATE REQUEST----- Feb 2 07:56:13 np0005604725 certmonger[42097]: " for child. Feb 2 07:56:13 np0005604725 certmonger[42097]: 2026-02-02 07:56:13 [42097] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCwQyFa4WzgSnHvQxgDLfb65GiyjmGCyz2hhpS6sq+91IQcyKLV+jI09yGbTcQSze9LZfC4U+S+w7mKEwSBCZM2QkeVOP0NKPkqzgQTq2asAbffNc6CXqAPzOt/KoIqoG842MN749wXgGuEZ16l2NCsOIeCGskPzS8y7ZWyupsS2vYEIBM3Mu0sImc/ElmAEobe6SLltg8y/+p6fyrNPKKtYh+Ge+I6Fls2cif8fpI2r0pO8tbPd+k5+mjMCfyHXQ9NEYp6v2Y6ogxd0hwAy82SaWw/p67jqQoGvyxRAF1u0jkfnQUtutyyySYFQLpXXLc8RYa2BrJBAS6kqCc44vKfAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEABDvEp1HMTqAts0gahWH0hUPS1PYsnDJVFYh9a/OQ6/BK4KtTniWToEYZzQzSj99GJmszuiKcAeL5Ghr2/07KT4vcBinIhPc8GlDCHlVAuiiQfVUZisBThZSMdBJhTLgKtVti2++faONOvp65rK7fYLzuSxaPNvQ3rIsMLzPC1VWZG2zFlqnmoI1S1swdE6TkWm8uvoLuZ4kjXvgP8UxhAHlzykK3Xlkh0KycJDEbgrfNhZ1bQxazN99PnxIfyiVoOUAhhxwELEMRHAsyhCkIkgJ2xgKZuMCenH1wQvQJfEUwjvJtgh07rO5jhD7JftSuikquhQaHTK7XSCAZ2gUcxw==" for child. Feb 2 07:56:13 np0005604725 certmonger[42097]: 2026-02-02 07:56:13 [42097] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsEMhWuFs4Epx70MYAy32+uRoso5hgss9oYaUurKvvdSEHMii1foyNPchm03EEs3vS2XwuFPkvsO5ihMEgQmTNkJHlTj9DSj5Ks4EE6tmrAG33zXOgl6gD8zrfyqCKqBvONjDe+PcF4BrhGdepdjQrDiHghrJD80vMu2VsrqbEtr2BCATNzLtLCJnPxJZgBKG3uki5bYPMv/qen8qzTyirWIfhnviOhZbNnIn/H6SNq9KTvLWz3fpOfpozAn8h10PTRGKer9mOqIMXdIcAMvNkmlsP6eu46kKBr8sUQBdbtI5H50FLbrcsskmBUC6V1y3PEWGtgayQQEupKgnOOLynwIDAQAB" for child. Feb 2 07:56:13 np0005604725 certmonger[42097]: 2026-02-02 07:56:13 [42097] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 07:56:13 np0005604725 certmonger[42097]: 2026-02-02 07:56:13 [42097] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 07:56:13 np0005604725 certmonger[42097]: 2026-02-02 07:56:13 [42097] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 07:56:13 np0005604725 certmonger[42097]: 2026-02-02 07:56:13 [42097] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 07:56:13 np0005604725 certmonger[42097]: 2026-02-02 07:56:13 [42097] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[42097]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 07:56:13 np0005604725 certmonger[42097]: Certificate: "MIIFhzCCA++gAwIBAgIRAP8STBg2R97PKGjOuUJg/4EwDQYJKoZIhvcNAQELBQAwMzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0yNjAyMDIwNzU2MTNaFw0yODAyMDMwNzU2MTNaMD8xETAPBgNVBAoMCE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCwQyFa4WzgSnHvQxgDLfb65GiyjmGCyz2hhpS6sq+91IQcyKLV+jI09yGbTcQSze9LZfC4U+S+w7mKEwSBCZM2QkeVOP0NKPkqzgQTq2asAbffNc6CXqAPzOt/KoIqoG842MN749wXgGuEZ16l2NCsOIeCGskPzS8y7ZWyupsS2vYEIBM3Mu0sImc/ElmAEobe6SLltg8y/+p6fyrNPKKtYh+Ge+I6Fls2cif8fpI2r0pO8tbPd+k5+mjMCfyHXQ9NEYp6v2Y6ogxd0hwAy82SaWw/p67jqQoGvyxRAF1u0jkfnQUtutyyySYFQLpXXLc8RYa2BrJBAS6kqCc44vKfAgMBAAGjggIIMIICBDAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5HrAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTZmbXtnGBOow52d4UhINpIVxlEYjCB4QYDVR0RBIHZMIHWgiFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBABgorBgEEAYI3FAIDoDIMMG15c3FsL25wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNUoTUwM6ADAgEBoSwwKhsFbXlzcWwbIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAIbTv2iZCsWa0HubeeN9VeKaPLV0ty9bAV7ChJ6q0DRHrJVFIwoDTxK6sVeyF/dSe4tyfrhjIHaKvCcp782/ZOJllk15BHJidvH9+oBVnWqvIS1xibjcWXyIpruMR+jHpv2fmIILPXoahfZbInbpwCXQKF8cXAsnOTP8XUX2tIh5nv5IUmVpXibKymJWctxlRb/mQqsQkrPLYXNQPxXhNOz+/nZIJMf52Ut+QFP2UzXYDB3InqxM1UGh0gxlFVFyHHB0Z04THlxdja+tHpaMixIuJe1icrcscjlMAPXIuP6DCtmbUlE9mzNhAFWIRynQNExXv5Tn7piyglBvQ/59V+8/mglEc/qMtY1H239JzqEFM+By5rfyfEtFCp9NhbHTK+TFIe3ee3ph71kOFhs0J2sktIpYoIDl1Gd0+kEvlvoSseFlkhfNuYdg3sPsFfjtX7YjkvK/0wx1rGn8BbtFVE1ZfaOzcYNrMUcZm4s89sfYEZn1Xs4Nys9bhcIu7j0zZ" Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Certificate submission still ongoing. Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Certificate submission attempt complete. Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Child status = 0. Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Child output: Feb 2 07:56:13 np0005604725 certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 07:56:13 np0005604725 certmonger[39011]: MIIFhzCCA++gAwIBAgIRAP8STBg2R97PKGjOuUJg/4EwDQYJKoZIhvcNAQELBQAw Feb 2 07:56:13 np0005604725 certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:56:13 np0005604725 certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU2MTNaFw0yODAyMDMwNzU2MTNaMD8xETAPBgNVBAoM Feb 2 07:56:13 np0005604725 certmonger[39011]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:56:13 np0005604725 certmonger[39011]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCwQyFa4WzgSnHv Feb 2 07:56:13 np0005604725 certmonger[39011]: QxgDLfb65GiyjmGCyz2hhpS6sq+91IQcyKLV+jI09yGbTcQSze9LZfC4U+S+w7mK Feb 2 07:56:13 np0005604725 certmonger[39011]: EwSBCZM2QkeVOP0NKPkqzgQTq2asAbffNc6CXqAPzOt/KoIqoG842MN749wXgGuE Feb 2 07:56:13 np0005604725 certmonger[39011]: Z16l2NCsOIeCGskPzS8y7ZWyupsS2vYEIBM3Mu0sImc/ElmAEobe6SLltg8y/+p6 Feb 2 07:56:13 np0005604725 certmonger[39011]: fyrNPKKtYh+Ge+I6Fls2cif8fpI2r0pO8tbPd+k5+mjMCfyHXQ9NEYp6v2Y6ogxd Feb 2 07:56:13 np0005604725 certmonger[39011]: 0hwAy82SaWw/p67jqQoGvyxRAF1u0jkfnQUtutyyySYFQLpXXLc8RYa2BrJBAS6k Feb 2 07:56:13 np0005604725 certmonger[39011]: qCc44vKfAgMBAAGjggIIMIICBDAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 07:56:13 np0005604725 certmonger[39011]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:13 np0005604725 certmonger[39011]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 07:56:13 np0005604725 certmonger[39011]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:13 np0005604725 certmonger[39011]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 07:56:13 np0005604725 certmonger[39011]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTZ Feb 2 07:56:13 np0005604725 certmonger[39011]: mbXtnGBOow52d4UhINpIVxlEYjCB4QYDVR0RBIHZMIHWgiFucDAwMDU2MDQ3MjUu Feb 2 07:56:13 np0005604725 certmonger[39011]: aW50ZXJuYWxhcGkub29vLnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28u Feb 2 07:56:13 np0005604725 certmonger[39011]: dGVzdKBABgorBgEEAYI3FAIDoDIMMG15c3FsL25wMDAwNTYwNDcyNS5pbnRlcm5h Feb 2 07:56:13 np0005604725 certmonger[39011]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNU Feb 2 07:56:13 np0005604725 certmonger[39011]: oTUwM6ADAgEBoSwwKhsFbXlzcWwbIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5v Feb 2 07:56:13 np0005604725 certmonger[39011]: b28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAIbTv2iZCsWa0HubeeN9VeKaPLV0t Feb 2 07:56:13 np0005604725 certmonger[39011]: y9bAV7ChJ6q0DRHrJVFIwoDTxK6sVeyF/dSe4tyfrhjIHaKvCcp782/ZOJllk15B Feb 2 07:56:13 np0005604725 certmonger[39011]: HJidvH9+oBVnWqvIS1xibjcWXyIpruMR+jHpv2fmIILPXoahfZbInbpwCXQKF8cX Feb 2 07:56:13 np0005604725 certmonger[39011]: AsnOTP8XUX2tIh5nv5IUmVpXibKymJWctxlRb/mQqsQkrPLYXNQPxXhNOz+/nZIJ Feb 2 07:56:13 np0005604725 certmonger[39011]: Mf52Ut+QFP2UzXYDB3InqxM1UGh0gxlFVFyHHB0Z04THlxdja+tHpaMixIuJe1ic Feb 2 07:56:13 np0005604725 certmonger[39011]: rcscjlMAPXIuP6DCtmbUlE9mzNhAFWIRynQNExXv5Tn7piyglBvQ/59V+8/mglEc Feb 2 07:56:13 np0005604725 certmonger[39011]: /qMtY1H239JzqEFM+By5rfyfEtFCp9NhbHTK+TFIe3ee3ph71kOFhs0J2sktIpYo Feb 2 07:56:13 np0005604725 certmonger[39011]: IDl1Gd0+kEvlvoSseFlkhfNuYdg3sPsFfjtX7YjkvK/0wx1rGn8BbtFVE1ZfaOzc Feb 2 07:56:13 np0005604725 certmonger[39011]: YNrMUcZm4s89sfYEZn1Xs4Nys9bhcIu7j0zZ Feb 2 07:56:13 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:56:13 np0005604725 certmonger[39011]: " Feb 2 07:56:13 np0005604725 certmonger[42099]: 2026-02-02 07:56:13 [42099] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 07:56:13 np0005604725 certmonger[42099]: MIIFhzCCA++gAwIBAgIRAP8STBg2R97PKGjOuUJg/4EwDQYJKoZIhvcNAQELBQAw Feb 2 07:56:13 np0005604725 certmonger[42099]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:56:13 np0005604725 certmonger[42099]: cml0eTAeFw0yNjAyMDIwNzU2MTNaFw0yODAyMDMwNzU2MTNaMD8xETAPBgNVBAoM Feb 2 07:56:13 np0005604725 certmonger[42099]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:56:13 np0005604725 certmonger[42099]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCwQyFa4WzgSnHv Feb 2 07:56:13 np0005604725 certmonger[42099]: QxgDLfb65GiyjmGCyz2hhpS6sq+91IQcyKLV+jI09yGbTcQSze9LZfC4U+S+w7mK Feb 2 07:56:13 np0005604725 certmonger[42099]: EwSBCZM2QkeVOP0NKPkqzgQTq2asAbffNc6CXqAPzOt/KoIqoG842MN749wXgGuE Feb 2 07:56:13 np0005604725 certmonger[42099]: Z16l2NCsOIeCGskPzS8y7ZWyupsS2vYEIBM3Mu0sImc/ElmAEobe6SLltg8y/+p6 Feb 2 07:56:13 np0005604725 certmonger[42099]: fyrNPKKtYh+Ge+I6Fls2cif8fpI2r0pO8tbPd+k5+mjMCfyHXQ9NEYp6v2Y6ogxd Feb 2 07:56:13 np0005604725 certmonger[42099]: 0hwAy82SaWw/p67jqQoGvyxRAF1u0jkfnQUtutyyySYFQLpXXLc8RYa2BrJBAS6k Feb 2 07:56:13 np0005604725 certmonger[42099]: qCc44vKfAgMBAAGjggIIMIICBDAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 07:56:13 np0005604725 certmonger[42099]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:13 np0005604725 certmonger[42099]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 07:56:13 np0005604725 certmonger[42099]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:13 np0005604725 certmonger[42099]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 07:56:13 np0005604725 certmonger[42099]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTZ Feb 2 07:56:13 np0005604725 certmonger[42099]: mbXtnGBOow52d4UhINpIVxlEYjCB4QYDVR0RBIHZMIHWgiFucDAwMDU2MDQ3MjUu Feb 2 07:56:13 np0005604725 certmonger[42099]: aW50ZXJuYWxhcGkub29vLnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28u Feb 2 07:56:13 np0005604725 certmonger[42099]: dGVzdKBABgorBgEEAYI3FAIDoDIMMG15c3FsL25wMDAwNTYwNDcyNS5pbnRlcm5h Feb 2 07:56:13 np0005604725 certmonger[42099]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNU Feb 2 07:56:13 np0005604725 certmonger[42099]: oTUwM6ADAgEBoSwwKhsFbXlzcWwbIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5v Feb 2 07:56:13 np0005604725 certmonger[42099]: b28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAIbTv2iZCsWa0HubeeN9VeKaPLV0t Feb 2 07:56:13 np0005604725 certmonger[42099]: y9bAV7ChJ6q0DRHrJVFIwoDTxK6sVeyF/dSe4tyfrhjIHaKvCcp782/ZOJllk15B Feb 2 07:56:13 np0005604725 certmonger[42099]: HJidvH9+oBVnWqvIS1xibjcWXyIpruMR+jHpv2fmIILPXoahfZbInbpwCXQKF8cX Feb 2 07:56:13 np0005604725 certmonger[42099]: AsnOTP8XUX2tIh5nv5IUmVpXibKymJWctxlRb/mQqsQkrPLYXNQPxXhNOz+/nZIJ Feb 2 07:56:13 np0005604725 certmonger[42099]: Mf52Ut+QFP2UzXYDB3InqxM1UGh0gxlFVFyHHB0Z04THlxdja+tHpaMixIuJe1ic Feb 2 07:56:13 np0005604725 certmonger[42099]: rcscjlMAPXIuP6DCtmbUlE9mzNhAFWIRynQNExXv5Tn7piyglBvQ/59V+8/mglEc Feb 2 07:56:13 np0005604725 certmonger[42099]: /qMtY1H239JzqEFM+By5rfyfEtFCp9NhbHTK+TFIe3ee3ph71kOFhs0J2sktIpYo Feb 2 07:56:13 np0005604725 certmonger[42099]: IDl1Gd0+kEvlvoSseFlkhfNuYdg3sPsFfjtX7YjkvK/0wx1rGn8BbtFVE1ZfaOzc Feb 2 07:56:13 np0005604725 certmonger[42099]: YNrMUcZm4s89sfYEZn1Xs4Nys9bhcIu7j0zZ Feb 2 07:56:13 np0005604725 certmonger[42099]: -----END CERTIFICATE----- Feb 2 07:56:13 np0005604725 certmonger[42099]: ". Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Certificate submission still ongoing. Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Certificate submission postprocessing complete. Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Child status = 0. Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Child output: Feb 2 07:56:13 np0005604725 certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nYNrMUcZm4s89sfYEZn1Xs4Nys9bhcIu7j0zZ\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 07:56:13 np0005604725 certmonger[39011]: " Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 07:56:13 np0005604725 certmonger[39011]: MIIFhzCCA++gAwIBAgIRAP8STBg2R97PKGjOuUJg/4EwDQYJKoZIhvcNAQELBQAw Feb 2 07:56:13 np0005604725 certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:56:13 np0005604725 certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU2MTNaFw0yODAyMDMwNzU2MTNaMD8xETAPBgNVBAoM Feb 2 07:56:13 np0005604725 certmonger[39011]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:56:13 np0005604725 certmonger[39011]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCwQyFa4WzgSnHv Feb 2 07:56:13 np0005604725 certmonger[39011]: QxgDLfb65GiyjmGCyz2hhpS6sq+91IQcyKLV+jI09yGbTcQSze9LZfC4U+S+w7mK Feb 2 07:56:13 np0005604725 certmonger[39011]: EwSBCZM2QkeVOP0NKPkqzgQTq2asAbffNc6CXqAPzOt/KoIqoG842MN749wXgGuE Feb 2 07:56:13 np0005604725 certmonger[39011]: Z16l2NCsOIeCGskPzS8y7ZWyupsS2vYEIBM3Mu0sImc/ElmAEobe6SLltg8y/+p6 Feb 2 07:56:13 np0005604725 certmonger[39011]: fyrNPKKtYh+Ge+I6Fls2cif8fpI2r0pO8tbPd+k5+mjMCfyHXQ9NEYp6v2Y6ogxd Feb 2 07:56:13 np0005604725 certmonger[39011]: 0hwAy82SaWw/p67jqQoGvyxRAF1u0jkfnQUtutyyySYFQLpXXLc8RYa2BrJBAS6k Feb 2 07:56:13 np0005604725 certmonger[39011]: qCc44vKfAgMBAAGjggIIMIICBDAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 07:56:13 np0005604725 certmonger[39011]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:13 np0005604725 certmonger[39011]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 07:56:13 np0005604725 certmonger[39011]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:13 np0005604725 certmonger[39011]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 07:56:13 np0005604725 certmonger[39011]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTZ Feb 2 07:56:13 np0005604725 certmonger[39011]: mbXtnGBOow52d4UhINpIVxlEYjCB4QYDVR0RBIHZMIHWgiFucDAwMDU2MDQ3MjUu Feb 2 07:56:13 np0005604725 certmonger[39011]: aW50ZXJuYWxhcGkub29vLnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28u Feb 2 07:56:13 np0005604725 certmonger[39011]: dGVzdKBABgorBgEEAYI3FAIDoDIMMG15c3FsL25wMDAwNTYwNDcyNS5pbnRlcm5h Feb 2 07:56:13 np0005604725 certmonger[39011]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNU Feb 2 07:56:13 np0005604725 certmonger[39011]: oTUwM6ADAgEBoSwwKhsFbXlzcWwbIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5v Feb 2 07:56:13 np0005604725 certmonger[39011]: b28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAIbTv2iZCsWa0HubeeN9VeKaPLV0t Feb 2 07:56:13 np0005604725 certmonger[39011]: y9bAV7ChJ6q0DRHrJVFIwoDTxK6sVeyF/dSe4tyfrhjIHaKvCcp782/ZOJllk15B Feb 2 07:56:13 np0005604725 certmonger[39011]: HJidvH9+oBVnWqvIS1xibjcWXyIpruMR+jHpv2fmIILPXoahfZbInbpwCXQKF8cX Feb 2 07:56:13 np0005604725 certmonger[39011]: AsnOTP8XUX2tIh5nv5IUmVpXibKymJWctxlRb/mQqsQkrPLYXNQPxXhNOz+/nZIJ Feb 2 07:56:13 np0005604725 certmonger[39011]: Mf52Ut+QFP2UzXYDB3InqxM1UGh0gxlFVFyHHB0Z04THlxdja+tHpaMixIuJe1ic Feb 2 07:56:13 np0005604725 certmonger[39011]: rcscjlMAPXIuP6DCtmbUlE9mzNhAFWIRynQNExXv5Tn7piyglBvQ/59V+8/mglEc Feb 2 07:56:13 np0005604725 certmonger[39011]: /qMtY1H239JzqEFM+By5rfyfEtFCp9NhbHTK+TFIe3ee3ph71kOFhs0J2sktIpYo Feb 2 07:56:13 np0005604725 certmonger[39011]: IDl1Gd0+kEvlvoSseFlkhfNuYdg3sPsFfjtX7YjkvK/0wx1rGn8BbtFVE1ZfaOzc Feb 2 07:56:13 np0005604725 certmonger[39011]: YNrMUcZm4s89sfYEZn1Xs4Nys9bhcIu7j0zZ Feb 2 07:56:13 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:56:13 np0005604725 certmonger[39011]: ". Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] No hooks set for pre-save command. Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] No hooks set for post-save command. Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:13 np0005604725 certmonger[42103]: Certificate in file "/etc/pki/tls/certs/mysql.crt" issued by CA and saved. Feb 2 07:56:13 np0005604725 certmonger[39011]: 2026-02-02 07:56:13 [39011] Wrote to /var/lib/certmonger/requests/20260202075612 Feb 2 07:56:14 np0005604725 python3[42119]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 07:56:21 np0005604725 podman[42120]: 2026-02-02 07:56:14.685119304 +0000 UTC m=+0.048266774 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Feb 2 07:56:21 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:56:21 np0005604725 python3[42185]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 cluster.common.tag/mariadb:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 07:56:21 np0005604725 podman[42186]: 2026-02-02 07:56:21.768006158 +0000 UTC m=+0.028242492 image tag 974f4645061d30b5d4ea2689b013657a5031ef85082639abe85a34f6c689cfed cluster.common.tag/mariadb:pcmklatest Feb 2 07:56:21 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:56:22 np0005604725 python3[42212]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 07:56:23 np0005604725 python3[42232]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:56:26 np0005604725 python3[42249]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:56:29 np0005604725 python3[42266]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:56:29 np0005604725 python3[42282]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:56:30 np0005604725 python3[42298]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 07:56:31 np0005604725 python3[42316]: ansible-certificate_request Invoked with name=neutron_ovn dns=['np0005604725.internalapi.ooo.test'] principal=['neutron_ovn/np0005604725.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[42326]: 2026-02-02 07:56:31 [42326] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.internalapi.ooo.test" for child. Feb 2 07:56:31 np0005604725 certmonger[42326]: 2026-02-02 07:56:31 [42326] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.internalapi.ooo.test Feb 2 07:56:31 np0005604725 certmonger[42326]: " for child. Feb 2 07:56:31 np0005604725 certmonger[42326]: 2026-02-02 07:56:31 [42326] Setting "CERTMONGER_REQ_PRINCIPAL" to "neutron_ovn/np0005604725.internalapi.ooo.test@OOO.TEST Feb 2 07:56:31 np0005604725 certmonger[42326]: " for child. Feb 2 07:56:31 np0005604725 certmonger[42326]: 2026-02-02 07:56:31 [42326] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 07:56:31 np0005604725 certmonger[42326]: 2026-02-02 07:56:31 [42326] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 07:56:31 np0005604725 certmonger[42326]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NjA0NzI1LmludGVybmFsYXBp Feb 2 07:56:31 np0005604725 certmonger[42326]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtRPJG07e Feb 2 07:56:31 np0005604725 certmonger[42326]: kq593v4LoRn3SAfromp2pwlRt8XpivauqyMVKx8SRbYk/IbGE9Vxds8KkOA71IBy Feb 2 07:56:31 np0005604725 certmonger[42326]: U9e5nEsQVhySI9wQVYQb6OVmuURDMYZc93eP6uBXPY4djqEXoC7Zkzyvy0tEdyPg Feb 2 07:56:31 np0005604725 certmonger[42326]: FFT+whOQ3ljiAtjLd1lSm573nPiNVfpPJpYL5if21brgZYI5F7L8e/5d9EdNkPE4 Feb 2 07:56:31 np0005604725 certmonger[42326]: HXX/p4VY9Ku/qTlV64UfpUYmPLWIfUfSoYwiVnETHrIOOibsnx030x54xPCOaV8f Feb 2 07:56:31 np0005604725 certmonger[42326]: oJT859+eOCM74Mo0SwAwiBj7mQTDKQeEdgC+RO0HmtCk6CtyZKh/YnkVkh3u4ngt Feb 2 07:56:31 np0005604725 certmonger[42326]: YHAHOIOwwGnFawIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAy Feb 2 07:56:31 np0005604725 certmonger[42326]: ADAAMgAwADcANQA2ADMAMTCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Feb 2 07:56:31 np0005604725 certmonger[42326]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:56:31 np0005604725 certmonger[42326]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZuZXV0cm9uX292bi9ucDAwMDU2MDQ3MjUu Feb 2 07:56:31 np0005604725 certmonger[42326]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Feb 2 07:56:31 np0005604725 certmonger[42326]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC25ldXRyb25fb3ZuGyFucDAwMDU2MDQ3MjUu Feb 2 07:56:31 np0005604725 certmonger[42326]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Feb 2 07:56:31 np0005604725 certmonger[42326]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFCIuk79KaEfcPx0L5TBuUaDraTSQ Feb 2 07:56:31 np0005604725 certmonger[42326]: MA0GCSqGSIb3DQEBCwUAA4IBAQAfZ/dUlXzcfg4Ciikip+WU709SWLjKBE77WwhP Feb 2 07:56:31 np0005604725 certmonger[42326]: GFF30fnf4ETkoONN/NvBL89yYO8nVDlUDiMMxu0E6/Yh4Hsckn3vJgYEghXZiBAx Feb 2 07:56:31 np0005604725 certmonger[42326]: jV/38ZtxpihBbTnMWqQ6J4G/qQXiy13fvjMJVJFMDNKiLqz27H7F5NMH2WMtaP7o Feb 2 07:56:31 np0005604725 certmonger[42326]: xtXE3MYWoWpX+RI+zPLqeX6ftCCb4Seu1HxDLYOhgs7I3QNuocYsDaxh/9EefmK6 Feb 2 07:56:31 np0005604725 certmonger[42326]: i/XB/rFgv+fBLlm16v6JY08hWPh8995p0b6PrY8nkYDHhqC3hFZrnwkhsBJH++Pe Feb 2 07:56:31 np0005604725 certmonger[42326]: u9kwPuANCZe8WyGq06Wm58H9wZwjWwKZ/j7sBLtbLOx1HLHL Feb 2 07:56:31 np0005604725 certmonger[42326]: -----END CERTIFICATE REQUEST----- Feb 2 07:56:31 np0005604725 certmonger[42326]: " for child. Feb 2 07:56:31 np0005604725 certmonger[42326]: 2026-02-02 07:56:31 [42326] Setting "CERTMONGER_SPKAC" to "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" for child. Feb 2 07:56:31 np0005604725 certmonger[42326]: 2026-02-02 07:56:31 [42326] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtRPJG07ekq593v4LoRn3SAfromp2pwlRt8XpivauqyMVKx8SRbYk/IbGE9Vxds8KkOA71IByU9e5nEsQVhySI9wQVYQb6OVmuURDMYZc93eP6uBXPY4djqEXoC7Zkzyvy0tEdyPgFFT+whOQ3ljiAtjLd1lSm573nPiNVfpPJpYL5if21brgZYI5F7L8e/5d9EdNkPE4HXX/p4VY9Ku/qTlV64UfpUYmPLWIfUfSoYwiVnETHrIOOibsnx030x54xPCOaV8foJT859+eOCM74Mo0SwAwiBj7mQTDKQeEdgC+RO0HmtCk6CtyZKh/YnkVkh3u4ngtYHAHOIOwwGnFawIDAQAB" for child. Feb 2 07:56:31 np0005604725 certmonger[42326]: 2026-02-02 07:56:31 [42326] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 07:56:31 np0005604725 certmonger[42326]: 2026-02-02 07:56:31 [42326] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 07:56:31 np0005604725 certmonger[42326]: 2026-02-02 07:56:31 [42326] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 07:56:31 np0005604725 certmonger[42326]: 2026-02-02 07:56:31 [42326] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 07:56:31 np0005604725 certmonger[42326]: 2026-02-02 07:56:31 [42326] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 07:56:31 np0005604725 certmonger[39011]: 2026-02-02 07:56:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:31 np0005604725 certmonger[42326]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 07:56:32 np0005604725 certmonger[42326]: Certificate: "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" Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Certificate submission still ongoing. Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Certificate submission attempt complete. Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Child status = 0. Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Child output: Feb 2 07:56:32 np0005604725 certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 07:56:32 np0005604725 certmonger[39011]: MIIFcjCCA9qgAwIBAgIQfk3eTucA+nWmPYgHKfgkkjANBgkqhkiG9w0BAQsFADAz Feb 2 07:56:32 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:56:32 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTYzMVoXDTI4MDIwMzA3NTYzMVowPzERMA8GA1UECgwI Feb 2 07:56:32 np0005604725 certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:56:32 np0005604725 certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALUTyRtO3pKufd7+ Feb 2 07:56:32 np0005604725 certmonger[39011]: C6EZ90gH66JqdqcJUbfF6Yr2rqsjFSsfEkW2JPyGxhPVcXbPCpDgO9SAclPXuZxL Feb 2 07:56:32 np0005604725 certmonger[39011]: EFYckiPcEFWEG+jlZrlEQzGGXPd3j+rgVz2OHY6hF6Au2ZM8r8tLRHcj4BRU/sIT Feb 2 07:56:32 np0005604725 certmonger[39011]: kN5Y4gLYy3dZUpue95z4jVX6TyaWC+Yn9tW64GWCORey/Hv+XfRHTZDxOB11/6eF Feb 2 07:56:32 np0005604725 certmonger[39011]: WPSrv6k5VeuFH6VGJjy1iH1H0qGMIlZxEx6yDjom7J8dN9MeeMTwjmlfH6CU/Off Feb 2 07:56:32 np0005604725 certmonger[39011]: njgjO+DKNEsAMIgY+5kEwykHhHYAvkTtB5rQpOgrcmSof2J5FZId7uJ4LWBwBziD Feb 2 07:56:32 np0005604725 certmonger[39011]: sMBpxWsCAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:56:32 np0005604725 certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:56:32 np0005604725 certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:56:32 np0005604725 certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:56:32 np0005604725 certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:56:32 np0005604725 certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOch Feb 2 07:56:32 np0005604725 certmonger[39011]: 7byAWGYQtBGVUd1h2ZTIhsjMMIHNBgNVHREEgcUwgcKCIW5wMDAwNTYwNDcyNS5p Feb 2 07:56:32 np0005604725 certmonger[39011]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3Zu Feb 2 07:56:32 np0005604725 certmonger[39011]: L25wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Feb 2 07:56:32 np0005604725 certmonger[39011]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4b Feb 2 07:56:32 np0005604725 certmonger[39011]: IW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Feb 2 07:56:32 np0005604725 certmonger[39011]: AAOCAYEAZrKmJBJmnF0A2dcPiA/NnBt3dXuXUpaY3lrChkNwdwV1RKj/LUdpGdUQ Feb 2 07:56:32 np0005604725 certmonger[39011]: 03x53zi5Q6mkewZX3THDx+NVNxJgNEfqrreUoy265LkRoPX8g24df70Q0QZOs/dB Feb 2 07:56:32 np0005604725 certmonger[39011]: H5cuDDdsmv7Y/+KefanqbTD+2LDCLSjjjAJjhzj1xUAGGdKuW842omHEnhD9TdVw Feb 2 07:56:32 np0005604725 certmonger[39011]: HfFQjVAQ2P5BtkGN/7HHrt/MYvVr+ORjoKPu+/Pv+E6QCwtPAyGWQLhVgob4geQw Feb 2 07:56:32 np0005604725 certmonger[39011]: pQg746UnaK4605Z/1IxJdB9UKckAI7RHjvkK6zFix7wT6bwpua9z9Akq4dPsLWWl Feb 2 07:56:32 np0005604725 certmonger[39011]: PoIdNuWJw5nZHK6WdMZyQC4vWbsPvKwh4RsxFXaqtnP4utX8ZJpgjpGCuMgPKmm7 Feb 2 07:56:32 np0005604725 certmonger[39011]: QYs2s+jgrG5j5GA+FAycn3ifRdbUTs6YS1a+P3dVy6SWyE26PXDL162hJRZOO4EF Feb 2 07:56:32 np0005604725 certmonger[39011]: 5TDIUj3oJ+xIrxFDvrWtnEQ79vfUzAUzEJ33LEPbGvcGMLerUOSW0G514gH/DlfI Feb 2 07:56:32 np0005604725 certmonger[39011]: j0wXucor Feb 2 07:56:32 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:56:32 np0005604725 certmonger[39011]: " Feb 2 07:56:32 np0005604725 certmonger[42328]: 2026-02-02 07:56:32 [42328] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 07:56:32 np0005604725 certmonger[42328]: MIIFcjCCA9qgAwIBAgIQfk3eTucA+nWmPYgHKfgkkjANBgkqhkiG9w0BAQsFADAz Feb 2 07:56:32 np0005604725 certmonger[42328]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:56:32 np0005604725 certmonger[42328]: aXR5MB4XDTI2MDIwMjA3NTYzMVoXDTI4MDIwMzA3NTYzMVowPzERMA8GA1UECgwI Feb 2 07:56:32 np0005604725 certmonger[42328]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:56:32 np0005604725 certmonger[42328]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALUTyRtO3pKufd7+ Feb 2 07:56:32 np0005604725 certmonger[42328]: C6EZ90gH66JqdqcJUbfF6Yr2rqsjFSsfEkW2JPyGxhPVcXbPCpDgO9SAclPXuZxL Feb 2 07:56:32 np0005604725 certmonger[42328]: EFYckiPcEFWEG+jlZrlEQzGGXPd3j+rgVz2OHY6hF6Au2ZM8r8tLRHcj4BRU/sIT Feb 2 07:56:32 np0005604725 certmonger[42328]: kN5Y4gLYy3dZUpue95z4jVX6TyaWC+Yn9tW64GWCORey/Hv+XfRHTZDxOB11/6eF Feb 2 07:56:32 np0005604725 certmonger[42328]: WPSrv6k5VeuFH6VGJjy1iH1H0qGMIlZxEx6yDjom7J8dN9MeeMTwjmlfH6CU/Off Feb 2 07:56:32 np0005604725 certmonger[42328]: njgjO+DKNEsAMIgY+5kEwykHhHYAvkTtB5rQpOgrcmSof2J5FZId7uJ4LWBwBziD Feb 2 07:56:32 np0005604725 certmonger[42328]: sMBpxWsCAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:56:32 np0005604725 certmonger[42328]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:56:32 np0005604725 certmonger[42328]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:56:32 np0005604725 certmonger[42328]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:56:32 np0005604725 certmonger[42328]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:56:32 np0005604725 certmonger[42328]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOch Feb 2 07:56:32 np0005604725 certmonger[42328]: 7byAWGYQtBGVUd1h2ZTIhsjMMIHNBgNVHREEgcUwgcKCIW5wMDAwNTYwNDcyNS5p Feb 2 07:56:32 np0005604725 certmonger[42328]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3Zu Feb 2 07:56:32 np0005604725 certmonger[42328]: L25wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Feb 2 07:56:32 np0005604725 certmonger[42328]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4b Feb 2 07:56:32 np0005604725 certmonger[42328]: IW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Feb 2 07:56:32 np0005604725 certmonger[42328]: AAOCAYEAZrKmJBJmnF0A2dcPiA/NnBt3dXuXUpaY3lrChkNwdwV1RKj/LUdpGdUQ Feb 2 07:56:32 np0005604725 certmonger[42328]: 03x53zi5Q6mkewZX3THDx+NVNxJgNEfqrreUoy265LkRoPX8g24df70Q0QZOs/dB Feb 2 07:56:32 np0005604725 certmonger[42328]: H5cuDDdsmv7Y/+KefanqbTD+2LDCLSjjjAJjhzj1xUAGGdKuW842omHEnhD9TdVw Feb 2 07:56:32 np0005604725 certmonger[42328]: HfFQjVAQ2P5BtkGN/7HHrt/MYvVr+ORjoKPu+/Pv+E6QCwtPAyGWQLhVgob4geQw Feb 2 07:56:32 np0005604725 certmonger[42328]: pQg746UnaK4605Z/1IxJdB9UKckAI7RHjvkK6zFix7wT6bwpua9z9Akq4dPsLWWl Feb 2 07:56:32 np0005604725 certmonger[42328]: PoIdNuWJw5nZHK6WdMZyQC4vWbsPvKwh4RsxFXaqtnP4utX8ZJpgjpGCuMgPKmm7 Feb 2 07:56:32 np0005604725 certmonger[42328]: QYs2s+jgrG5j5GA+FAycn3ifRdbUTs6YS1a+P3dVy6SWyE26PXDL162hJRZOO4EF Feb 2 07:56:32 np0005604725 certmonger[42328]: 5TDIUj3oJ+xIrxFDvrWtnEQ79vfUzAUzEJ33LEPbGvcGMLerUOSW0G514gH/DlfI Feb 2 07:56:32 np0005604725 certmonger[42328]: j0wXucor Feb 2 07:56:32 np0005604725 certmonger[42328]: -----END CERTIFICATE----- Feb 2 07:56:32 np0005604725 certmonger[42328]: ". Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Certificate submission still ongoing. Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Certificate submission postprocessing complete. Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Child status = 0. Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Child output: Feb 2 07:56:32 np0005604725 certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFcjCCA9qgAwIBAgIQfk3eTucA+nWmPYgHKfgkkjANBgkqhkiG9w0BAQsFADAz\nMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y\naXR5MB4XDTI2MDIwMjA3NTYzMVoXDTI4MDIwMzA3NTYzMVowPzERMA8GA1UECgwI\nT09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u\ndGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALUTyRtO3pKufd7+\nC6EZ90gH66JqdqcJUbfF6Yr2rqsjFSsfEkW2JPyGxhPVcXbPCpDgO9SAclPXuZxL\nEFYckiPcEFWEG+jlZrlEQzGGXPd3j+rgVz2OHY6hF6Au2ZM8r8tLRHcj4BRU/sIT\nkN5Y4gLYy3dZUpue95z4jVX6TyaWC+Yn9tW64GWCORey/Hv+XfRHTZDxOB11/6eF\nWPSrv6k5VeuFH6VGJjy1iH1H0qGMIlZxEx6yDjom7J8dN9MeeMTwjmlfH6CU/Off\nnjgjO+DKNEsAMIgY+5kEwykHhHYAvkTtB5rQpOgrcmSof2J5FZId7uJ4LWBwBziD\nsMBpxWsCAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes\nA+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v\nb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF\nBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v\nb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw\nYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOch\n7byAWGYQtBGVUd1h2ZTIhsjMMIHNBgNVHREEgcUwgcKCIW5wMDAwNTYwNDcyNS5p\nbnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3Zu\nL25wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr\nBgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4b\nIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF\nAAOCAYEAZrKmJBJmnF0A2dcPiA/NnBt3dXuXUpaY3lrChkNwdwV1RKj/LUdpGdUQ\n03x53zi5Q6mkewZX3THDx+NVNxJgNEfqrreUoy265LkRoPX8g24df70Q0QZOs/dB\nH5cuDDdsmv7Y/+KefanqbTD+2LDCLSjjjAJjhzj1xUAGGdKuW842omHEnhD9TdVw\nHfFQjVAQ2P5BtkGN/7HHrt/MYvVr+ORjoKPu+/Pv+E6QCwtPAyGWQLhVgob4geQw\npQg746UnaK4605Z/1IxJdB9UKckAI7RHjvkK6zFix7wT6bwpua9z9Akq4dPsLWWl\nPoIdNuWJw5nZHK6WdMZyQC4vWbsPvKwh4RsxFXaqtnP4utX8ZJpgjpGCuMgPKmm7\nQYs2s+jgrG5j5GA+FAycn3ifRdbUTs6YS1a+P3dVy6SWyE26PXDL162hJRZOO4EF\n5TDIUj3oJ+xIrxFDvrWtnEQ79vfUzAUzEJ33LEPbGvcGMLerUOSW0G514gH/DlfI\nj0wXucor\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 07:56:32 np0005604725 certmonger[39011]: " Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 07:56:32 np0005604725 certmonger[39011]: MIIFcjCCA9qgAwIBAgIQfk3eTucA+nWmPYgHKfgkkjANBgkqhkiG9w0BAQsFADAz Feb 2 07:56:32 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:56:32 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTYzMVoXDTI4MDIwMzA3NTYzMVowPzERMA8GA1UECgwI Feb 2 07:56:32 np0005604725 certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:56:32 np0005604725 certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALUTyRtO3pKufd7+ Feb 2 07:56:32 np0005604725 certmonger[39011]: C6EZ90gH66JqdqcJUbfF6Yr2rqsjFSsfEkW2JPyGxhPVcXbPCpDgO9SAclPXuZxL Feb 2 07:56:32 np0005604725 certmonger[39011]: EFYckiPcEFWEG+jlZrlEQzGGXPd3j+rgVz2OHY6hF6Au2ZM8r8tLRHcj4BRU/sIT Feb 2 07:56:32 np0005604725 certmonger[39011]: kN5Y4gLYy3dZUpue95z4jVX6TyaWC+Yn9tW64GWCORey/Hv+XfRHTZDxOB11/6eF Feb 2 07:56:32 np0005604725 certmonger[39011]: WPSrv6k5VeuFH6VGJjy1iH1H0qGMIlZxEx6yDjom7J8dN9MeeMTwjmlfH6CU/Off Feb 2 07:56:32 np0005604725 certmonger[39011]: njgjO+DKNEsAMIgY+5kEwykHhHYAvkTtB5rQpOgrcmSof2J5FZId7uJ4LWBwBziD Feb 2 07:56:32 np0005604725 certmonger[39011]: sMBpxWsCAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:56:32 np0005604725 certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:56:32 np0005604725 certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:56:32 np0005604725 certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:56:32 np0005604725 certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:56:32 np0005604725 certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOch Feb 2 07:56:32 np0005604725 certmonger[39011]: 7byAWGYQtBGVUd1h2ZTIhsjMMIHNBgNVHREEgcUwgcKCIW5wMDAwNTYwNDcyNS5p Feb 2 07:56:32 np0005604725 certmonger[39011]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3Zu Feb 2 07:56:32 np0005604725 certmonger[39011]: L25wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Feb 2 07:56:32 np0005604725 certmonger[39011]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4b Feb 2 07:56:32 np0005604725 certmonger[39011]: IW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Feb 2 07:56:32 np0005604725 certmonger[39011]: AAOCAYEAZrKmJBJmnF0A2dcPiA/NnBt3dXuXUpaY3lrChkNwdwV1RKj/LUdpGdUQ Feb 2 07:56:32 np0005604725 certmonger[39011]: 03x53zi5Q6mkewZX3THDx+NVNxJgNEfqrreUoy265LkRoPX8g24df70Q0QZOs/dB Feb 2 07:56:32 np0005604725 certmonger[39011]: H5cuDDdsmv7Y/+KefanqbTD+2LDCLSjjjAJjhzj1xUAGGdKuW842omHEnhD9TdVw Feb 2 07:56:32 np0005604725 certmonger[39011]: HfFQjVAQ2P5BtkGN/7HHrt/MYvVr+ORjoKPu+/Pv+E6QCwtPAyGWQLhVgob4geQw Feb 2 07:56:32 np0005604725 certmonger[39011]: pQg746UnaK4605Z/1IxJdB9UKckAI7RHjvkK6zFix7wT6bwpua9z9Akq4dPsLWWl Feb 2 07:56:32 np0005604725 certmonger[39011]: PoIdNuWJw5nZHK6WdMZyQC4vWbsPvKwh4RsxFXaqtnP4utX8ZJpgjpGCuMgPKmm7 Feb 2 07:56:32 np0005604725 certmonger[39011]: QYs2s+jgrG5j5GA+FAycn3ifRdbUTs6YS1a+P3dVy6SWyE26PXDL162hJRZOO4EF Feb 2 07:56:32 np0005604725 certmonger[39011]: 5TDIUj3oJ+xIrxFDvrWtnEQ79vfUzAUzEJ33LEPbGvcGMLerUOSW0G514gH/DlfI Feb 2 07:56:32 np0005604725 certmonger[39011]: j0wXucor Feb 2 07:56:32 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:56:32 np0005604725 certmonger[39011]: ". Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] No hooks set for pre-save command. Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] No hooks set for post-save command. Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:32 np0005604725 certmonger[42332]: Certificate in file "/etc/pki/tls/certs/neutron_ovn.crt" issued by CA and saved. Feb 2 07:56:32 np0005604725 certmonger[39011]: 2026-02-02 07:56:32 [39011] Wrote to /var/lib/certmonger/requests/20260202075631 Feb 2 07:56:32 np0005604725 python3[42348]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 07:56:33 np0005604725 python3[42368]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:56:36 np0005604725 python3[42385]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:56:39 np0005604725 python3[42402]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:56:40 np0005604725 python3[42418]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:56:40 np0005604725 python3[42434]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 07:56:42 np0005604725 python3[42452]: ansible-certificate_request Invoked with name=libvirt-vnc-client-cert dns=['np0005604725.internalapi.ooo.test'] principal=['libvirt-vnc/np0005604725.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep nova_vnc_proxy)#012service_crt="/etc/pki/tls/certs/libvirt-vnc-client-cert.crt"#012service_key="/etc/pki/tls/private/libvirt-vnc-client-cert.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012#012# Set permissions#012podman exec -u root "$container_name" chmod 0644 $service_crt#012podman exec -u root "$container_name" chmod 0640 $service_key#012podman exec -u root "$container_name" chgrp qemu $service_key#012#012# No need to trigger a reload for novnc proxy since the cert is not cached#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 07:56:42 np0005604725 certmonger[39011]: 2026-02-02 07:56:42 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:42 np0005604725 certmonger[39011]: 2026-02-02 07:56:42 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:42 np0005604725 certmonger[39011]: 2026-02-02 07:56:42 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:42 np0005604725 certmonger[39011]: 2026-02-02 07:56:42 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:42 np0005604725 certmonger[39011]: 2026-02-02 07:56:42 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:42 np0005604725 certmonger[39011]: 2026-02-02 07:56:42 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:42 np0005604725 certmonger[39011]: 2026-02-02 07:56:42 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:42 np0005604725 certmonger[39011]: 2026-02-02 07:56:42 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:42 np0005604725 certmonger[39011]: 2026-02-02 07:56:42 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[42462]: 2026-02-02 07:56:43 [42462] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.internalapi.ooo.test" for child. Feb 2 07:56:43 np0005604725 certmonger[42462]: 2026-02-02 07:56:43 [42462] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.internalapi.ooo.test Feb 2 07:56:43 np0005604725 certmonger[42462]: " for child. Feb 2 07:56:43 np0005604725 certmonger[42462]: 2026-02-02 07:56:43 [42462] Setting "CERTMONGER_REQ_PRINCIPAL" to "libvirt-vnc/np0005604725.internalapi.ooo.test@OOO.TEST Feb 2 07:56:43 np0005604725 certmonger[42462]: " for child. Feb 2 07:56:43 np0005604725 certmonger[42462]: 2026-02-02 07:56:43 [42462] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 07:56:43 np0005604725 certmonger[42462]: 2026-02-02 07:56:43 [42462] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 07:56:43 np0005604725 certmonger[42462]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NjA0NzI1LmludGVybmFsYXBp Feb 2 07:56:43 np0005604725 certmonger[42462]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoLZxsCYZ Feb 2 07:56:43 np0005604725 certmonger[42462]: ES4wcr4RrC14/o0u3jz/OA+4vH3HSG1EgXxUcP+hvz0zbEjZJMuNzz4uFhnqdFhe Feb 2 07:56:43 np0005604725 certmonger[42462]: T4jEE7m9s+61Cx3P46NRHmVh331s2bBrOvdlpqdO+7bEXukjQ0CLPj66Cd8CBsVs Feb 2 07:56:43 np0005604725 certmonger[42462]: WAu78AakdFP89yUR8N+6GIR3Y7n9XqMfeEn4MuyGELhGbQDRXE+Sv389twlljeDy Feb 2 07:56:43 np0005604725 certmonger[42462]: Sv/ZdNVaSve5oigjX5X794Lwxm/P1A3GnRFXHY2wNzqnLiF/ERe71XtyY/HG8x4T Feb 2 07:56:43 np0005604725 certmonger[42462]: Wn8u8E2M2bk2RANFAKHCb3Q9PQ0X/mT/cXKr6AwvH/RD+irDMCxViygw8bE9qFmG Feb 2 07:56:43 np0005604725 certmonger[42462]: iBFiQ4+lUDQ/zwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAy Feb 2 07:56:43 np0005604725 certmonger[42462]: ADAAMgAwADcANQA2ADQAMjCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Feb 2 07:56:43 np0005604725 certmonger[42462]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:56:43 np0005604725 certmonger[42462]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZsaWJ2aXJ0LXZuYy9ucDAwMDU2MDQ3MjUu Feb 2 07:56:43 np0005604725 certmonger[42462]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Feb 2 07:56:43 np0005604725 certmonger[42462]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC2xpYnZpcnQtdm5jGyFucDAwMDU2MDQ3MjUu Feb 2 07:56:43 np0005604725 certmonger[42462]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Feb 2 07:56:43 np0005604725 certmonger[42462]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFCIuk79KaEfcPx0L5TBuUaDraTSQ Feb 2 07:56:43 np0005604725 certmonger[42462]: MA0GCSqGSIb3DQEBCwUAA4IBAQBE/Kz3RetnP6BUo6Z784kcvBQKF4MNr+YL1nvf Feb 2 07:56:43 np0005604725 certmonger[42462]: aC9ApsVcq9qA4/4SHTFFn33ubSlHNhHOccDQljBUqXDYSw5LH14uGvbZKJ20m+Ky Feb 2 07:56:43 np0005604725 certmonger[42462]: 6W8BMv67doPgQYq+UZtWabjWAK9IdUYl2BJEQsy/i+t609mQqzYyxSFv027uQLr6 Feb 2 07:56:43 np0005604725 certmonger[42462]: xBOD+8WVVjpPx3Nk1Zq0x9Hih0aXhAmK8EMqJ8JLdq8WPkWth7JtVLr6Wlyhd+pe Feb 2 07:56:43 np0005604725 certmonger[42462]: Yr/HMfkoHrgVZIQf9pjucbuHe5eLdEP0YgEGABN39q365SNqER9sdqry3moZSx9b Feb 2 07:56:43 np0005604725 certmonger[42462]: rsQKuM86fDlhSVJbtA/xmjqoIAZUHv2VTFc6B5N/tf52qc8H Feb 2 07:56:43 np0005604725 certmonger[42462]: -----END CERTIFICATE REQUEST----- Feb 2 07:56:43 np0005604725 certmonger[42462]: " for child. Feb 2 07:56:43 np0005604725 certmonger[42462]: 2026-02-02 07:56:43 [42462] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCgtnGwJhkRLjByvhGsLXj+jS7ePP84D7i8fcdIbUSBfFRw/6G/PTNsSNkky43PPi4WGep0WF5PiMQTub2z7rULHc/jo1EeZWHffWzZsGs692Wmp077tsRe6SNDQIs+ProJ3wIGxWxYC7vwBqR0U/z3JRHw37oYhHdjuf1eox94Sfgy7IYQuEZtANFcT5K/fz23CWWN4PJK/9l01VpK97miKCNflfv3gvDGb8/UDcadEVcdjbA3OqcuIX8RF7vVe3Jj8cbzHhNafy7wTYzZuTZEA0UAocJvdD09DRf+ZP9xcqvoDC8f9EP6KsMwLFWLKDDxsT2oWYaIEWJDj6VQND/PAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAINzEKsS3xEKumsNo7zy6WsCGPIwOJ60+E9b+mofkCwimIvYU5tfxMMfafQugVi83y6M0V+N4ynbmB85w7C+2syXNSQc4UXeQWtkj5udcpz0J5vx1DybjhT59pbS5OZ7vEFPyzLtN55wOwOV3ikYyF8U1oNVFHS63ZZhqmtvbHcEEIF2sTMqo9qtu7ffKIqA8PgBXJu7VWXYxn7LdUqqdjb9n4MxQ9deDFzKZ4GL/8FinQcAKTMzT5rO9XdyJlX5cxfdTAqIzagCVprdSMrscircZMp5SzlMXECqjow+b16tFbr9IXNVoKfK/8rAyfzAYiKx+oiF8JKiXTmyiBYsPxw==" for child. Feb 2 07:56:43 np0005604725 certmonger[42462]: 2026-02-02 07:56:43 [42462] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoLZxsCYZES4wcr4RrC14/o0u3jz/OA+4vH3HSG1EgXxUcP+hvz0zbEjZJMuNzz4uFhnqdFheT4jEE7m9s+61Cx3P46NRHmVh331s2bBrOvdlpqdO+7bEXukjQ0CLPj66Cd8CBsVsWAu78AakdFP89yUR8N+6GIR3Y7n9XqMfeEn4MuyGELhGbQDRXE+Sv389twlljeDySv/ZdNVaSve5oigjX5X794Lwxm/P1A3GnRFXHY2wNzqnLiF/ERe71XtyY/HG8x4TWn8u8E2M2bk2RANFAKHCb3Q9PQ0X/mT/cXKr6AwvH/RD+irDMCxViygw8bE9qFmGiBFiQ4+lUDQ/zwIDAQAB" for child. Feb 2 07:56:43 np0005604725 certmonger[42462]: 2026-02-02 07:56:43 [42462] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 07:56:43 np0005604725 certmonger[42462]: 2026-02-02 07:56:43 [42462] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 07:56:43 np0005604725 certmonger[42462]: 2026-02-02 07:56:43 [42462] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 07:56:43 np0005604725 certmonger[42462]: 2026-02-02 07:56:43 [42462] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 07:56:43 np0005604725 certmonger[42462]: 2026-02-02 07:56:43 [42462] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[42462]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 07:56:43 np0005604725 certmonger[42462]: Certificate: "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" Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Certificate submission still ongoing. Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Certificate submission attempt complete. Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Child status = 0. Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Child output: Feb 2 07:56:43 np0005604725 certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 07:56:43 np0005604725 certmonger[39011]: MIIFczCCA9ugAwIBAgIRAKoreeq4tywwMkbCCAzb29IwDQYJKoZIhvcNAQELBQAw Feb 2 07:56:43 np0005604725 certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:56:43 np0005604725 certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU2NDNaFw0yODAyMDMwNzU2NDNaMD8xETAPBgNVBAoM Feb 2 07:56:43 np0005604725 certmonger[39011]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:56:43 np0005604725 certmonger[39011]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCgtnGwJhkRLjBy Feb 2 07:56:43 np0005604725 certmonger[39011]: vhGsLXj+jS7ePP84D7i8fcdIbUSBfFRw/6G/PTNsSNkky43PPi4WGep0WF5PiMQT Feb 2 07:56:43 np0005604725 certmonger[39011]: ub2z7rULHc/jo1EeZWHffWzZsGs692Wmp077tsRe6SNDQIs+ProJ3wIGxWxYC7vw Feb 2 07:56:43 np0005604725 certmonger[39011]: BqR0U/z3JRHw37oYhHdjuf1eox94Sfgy7IYQuEZtANFcT5K/fz23CWWN4PJK/9l0 Feb 2 07:56:43 np0005604725 certmonger[39011]: 1VpK97miKCNflfv3gvDGb8/UDcadEVcdjbA3OqcuIX8RF7vVe3Jj8cbzHhNafy7w Feb 2 07:56:43 np0005604725 certmonger[39011]: TYzZuTZEA0UAocJvdD09DRf+ZP9xcqvoDC8f9EP6KsMwLFWLKDDxsT2oWYaIEWJD Feb 2 07:56:43 np0005604725 certmonger[39011]: j6VQND/PAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 07:56:43 np0005604725 certmonger[39011]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:43 np0005604725 certmonger[39011]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 07:56:43 np0005604725 certmonger[39011]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:43 np0005604725 certmonger[39011]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 07:56:43 np0005604725 certmonger[39011]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBS+ Feb 2 07:56:43 np0005604725 certmonger[39011]: +U/3hU9Xri+8Zu7VYVJUxor+lzCBzQYDVR0RBIHFMIHCgiFucDAwMDU2MDQ3MjUu Feb 2 07:56:43 np0005604725 certmonger[39011]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZsaWJ2aXJ0LXZu Feb 2 07:56:43 np0005604725 certmonger[39011]: Yy9ucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Feb 2 07:56:43 np0005604725 certmonger[39011]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC2xpYnZpcnQtdm5j Feb 2 07:56:43 np0005604725 certmonger[39011]: GyFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Feb 2 07:56:43 np0005604725 certmonger[39011]: BQADggGBAH1ib7LJefHeIgZ4x5GPuZoprVvLwKbGOpJRTwlpfvkSCazcXdx9HRB4 Feb 2 07:56:43 np0005604725 certmonger[39011]: gAzIUulJQxO/aTYZQsByRYPjU+YHh4pmgNAYV3ZBBxcvkGRBP3MY1doY1JNF8Xau Feb 2 07:56:43 np0005604725 certmonger[39011]: t0ws7zAMp0Us+pk3fYTupTBVmRF9oshHXjNnK2wOUf1cY9DfBCszhsJXFJqyKk/v Feb 2 07:56:43 np0005604725 certmonger[39011]: ewfHQHi8bonRzaAW7gwC1tjkBlaseqgvOWUJ32qYcr27GqX0ggO5MLIgOL6LCe0y Feb 2 07:56:43 np0005604725 certmonger[39011]: 5nw6n63sW24rce0qf+cqRcMPVF9WJMhncBg5aXiR61nZQWJBeg5d+kaoFv3uO/nX Feb 2 07:56:43 np0005604725 certmonger[39011]: l8xeeTardhrjIpbdpZqLD0g9mNUbez5pi9wmD0iTAtAlQKWmPg4OG9evM9u+AR0B Feb 2 07:56:43 np0005604725 certmonger[39011]: kCrsSSUumDseXf2HNZT4qKtONn9r2P4yWGeLPIzZyZjFQHOaTUKTnZ6gEp1ku6M4 Feb 2 07:56:43 np0005604725 certmonger[39011]: 41//qTIOKyEEMfBIdl4OyCGTkQeEyJmHBZ7c8QhLkANIsmvFXak3FjRf40saWBo1 Feb 2 07:56:43 np0005604725 certmonger[39011]: +jtc0WAYqQ== Feb 2 07:56:43 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:56:43 np0005604725 certmonger[39011]: " Feb 2 07:56:43 np0005604725 certmonger[42464]: 2026-02-02 07:56:43 [42464] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 07:56:43 np0005604725 certmonger[42464]: MIIFczCCA9ugAwIBAgIRAKoreeq4tywwMkbCCAzb29IwDQYJKoZIhvcNAQELBQAw Feb 2 07:56:43 np0005604725 certmonger[42464]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:56:43 np0005604725 certmonger[42464]: cml0eTAeFw0yNjAyMDIwNzU2NDNaFw0yODAyMDMwNzU2NDNaMD8xETAPBgNVBAoM Feb 2 07:56:43 np0005604725 certmonger[42464]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:56:43 np0005604725 certmonger[42464]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCgtnGwJhkRLjBy Feb 2 07:56:43 np0005604725 certmonger[42464]: vhGsLXj+jS7ePP84D7i8fcdIbUSBfFRw/6G/PTNsSNkky43PPi4WGep0WF5PiMQT Feb 2 07:56:43 np0005604725 certmonger[42464]: ub2z7rULHc/jo1EeZWHffWzZsGs692Wmp077tsRe6SNDQIs+ProJ3wIGxWxYC7vw Feb 2 07:56:43 np0005604725 certmonger[42464]: BqR0U/z3JRHw37oYhHdjuf1eox94Sfgy7IYQuEZtANFcT5K/fz23CWWN4PJK/9l0 Feb 2 07:56:43 np0005604725 certmonger[42464]: 1VpK97miKCNflfv3gvDGb8/UDcadEVcdjbA3OqcuIX8RF7vVe3Jj8cbzHhNafy7w Feb 2 07:56:43 np0005604725 certmonger[42464]: TYzZuTZEA0UAocJvdD09DRf+ZP9xcqvoDC8f9EP6KsMwLFWLKDDxsT2oWYaIEWJD Feb 2 07:56:43 np0005604725 certmonger[42464]: j6VQND/PAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 07:56:43 np0005604725 certmonger[42464]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:43 np0005604725 certmonger[42464]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 07:56:43 np0005604725 certmonger[42464]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:43 np0005604725 certmonger[42464]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 07:56:43 np0005604725 certmonger[42464]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBS+ Feb 2 07:56:43 np0005604725 certmonger[42464]: +U/3hU9Xri+8Zu7VYVJUxor+lzCBzQYDVR0RBIHFMIHCgiFucDAwMDU2MDQ3MjUu Feb 2 07:56:43 np0005604725 certmonger[42464]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZsaWJ2aXJ0LXZu Feb 2 07:56:43 np0005604725 certmonger[42464]: Yy9ucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Feb 2 07:56:43 np0005604725 certmonger[42464]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC2xpYnZpcnQtdm5j Feb 2 07:56:43 np0005604725 certmonger[42464]: GyFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Feb 2 07:56:43 np0005604725 certmonger[42464]: BQADggGBAH1ib7LJefHeIgZ4x5GPuZoprVvLwKbGOpJRTwlpfvkSCazcXdx9HRB4 Feb 2 07:56:43 np0005604725 certmonger[42464]: gAzIUulJQxO/aTYZQsByRYPjU+YHh4pmgNAYV3ZBBxcvkGRBP3MY1doY1JNF8Xau Feb 2 07:56:43 np0005604725 certmonger[42464]: t0ws7zAMp0Us+pk3fYTupTBVmRF9oshHXjNnK2wOUf1cY9DfBCszhsJXFJqyKk/v Feb 2 07:56:43 np0005604725 certmonger[42464]: ewfHQHi8bonRzaAW7gwC1tjkBlaseqgvOWUJ32qYcr27GqX0ggO5MLIgOL6LCe0y Feb 2 07:56:43 np0005604725 certmonger[42464]: 5nw6n63sW24rce0qf+cqRcMPVF9WJMhncBg5aXiR61nZQWJBeg5d+kaoFv3uO/nX Feb 2 07:56:43 np0005604725 certmonger[42464]: l8xeeTardhrjIpbdpZqLD0g9mNUbez5pi9wmD0iTAtAlQKWmPg4OG9evM9u+AR0B Feb 2 07:56:43 np0005604725 certmonger[42464]: kCrsSSUumDseXf2HNZT4qKtONn9r2P4yWGeLPIzZyZjFQHOaTUKTnZ6gEp1ku6M4 Feb 2 07:56:43 np0005604725 certmonger[42464]: 41//qTIOKyEEMfBIdl4OyCGTkQeEyJmHBZ7c8QhLkANIsmvFXak3FjRf40saWBo1 Feb 2 07:56:43 np0005604725 certmonger[42464]: +jtc0WAYqQ== Feb 2 07:56:43 np0005604725 certmonger[42464]: -----END CERTIFICATE----- Feb 2 07:56:43 np0005604725 certmonger[42464]: ". Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Certificate submission still ongoing. Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Certificate submission postprocessing complete. Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Child status = 0. Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Child output: Feb 2 07:56:43 np0005604725 certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFczCCA9ugAwIBAgIRAKoreeq4tywwMkbCCAzb29IwDQYJKoZIhvcNAQELBQAw\nMzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv\ncml0eTAeFw0yNjAyMDIwNzU2NDNaFw0yODAyMDMwNzU2NDNaMD8xETAPBgNVBAoM\nCE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v\nLnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCgtnGwJhkRLjBy\nvhGsLXj+jS7ePP84D7i8fcdIbUSBfFRw/6G/PTNsSNkky43PPi4WGep0WF5PiMQT\nub2z7rULHc/jo1EeZWHffWzZsGs692Wmp077tsRe6SNDQIs+ProJ3wIGxWxYC7vw\nBqR0U/z3JRHw37oYhHdjuf1eox94Sfgy7IYQuEZtANFcT5K/fz23CWWN4PJK/9l0\n1VpK97miKCNflfv3gvDGb8/UDcadEVcdjbA3OqcuIX8RF7vVe3Jj8cbzHhNafy7w\nTYzZuTZEA0UAocJvdD09DRf+ZP9xcqvoDC8f9EP6KsMwLFWLKDDxsT2oWYaIEWJD\nj6VQND/PAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H\nrAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu\nb29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB\nBQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu\nb29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp\ncGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBS+\n+U/3hU9Xri+8Zu7VYVJUxor+lzCBzQYDVR0RBIHFMIHCgiFucDAwMDU2MDQ3MjUu\naW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZsaWJ2aXJ0LXZu\nYy9ucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG\nKwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC2xpYnZpcnQtdm5j\nGyFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL\nBQADggGBAH1ib7LJefHeIgZ4x5GPuZoprVvLwKbGOpJRTwlpfvkSCazcXdx9HRB4\ngAzIUulJQxO/aTYZQsByRYPjU+YHh4pmgNAYV3ZBBxcvkGRBP3MY1doY1JNF8Xau\nt0ws7zAMp0Us+pk3fYTupTBVmRF9oshHXjNnK2wOUf1cY9DfBCszhsJXFJqyKk/v\newfHQHi8bonRzaAW7gwC1tjkBlaseqgvOWUJ32qYcr27GqX0ggO5MLIgOL6LCe0y\n5nw6n63sW24rce0qf+cqRcMPVF9WJMhncBg5aXiR61nZQWJBeg5d+kaoFv3uO/nX\nl8xeeTardhrjIpbdpZqLD0g9mNUbez5pi9wmD0iTAtAlQKWmPg4OG9evM9u+AR0B\nkCrsSSUumDseXf2HNZT4qKtONn9r2P4yWGeLPIzZyZjFQHOaTUKTnZ6gEp1ku6M4\n41//qTIOKyEEMfBIdl4OyCGTkQeEyJmHBZ7c8QhLkANIsmvFXak3FjRf40saWBo1\n+jtc0WAYqQ==\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 07:56:43 np0005604725 certmonger[39011]: " Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 07:56:43 np0005604725 certmonger[39011]: MIIFczCCA9ugAwIBAgIRAKoreeq4tywwMkbCCAzb29IwDQYJKoZIhvcNAQELBQAw Feb 2 07:56:43 np0005604725 certmonger[39011]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Feb 2 07:56:43 np0005604725 certmonger[39011]: cml0eTAeFw0yNjAyMDIwNzU2NDNaFw0yODAyMDMwNzU2NDNaMD8xETAPBgNVBAoM Feb 2 07:56:43 np0005604725 certmonger[39011]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:56:43 np0005604725 certmonger[39011]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCgtnGwJhkRLjBy Feb 2 07:56:43 np0005604725 certmonger[39011]: vhGsLXj+jS7ePP84D7i8fcdIbUSBfFRw/6G/PTNsSNkky43PPi4WGep0WF5PiMQT Feb 2 07:56:43 np0005604725 certmonger[39011]: ub2z7rULHc/jo1EeZWHffWzZsGs692Wmp077tsRe6SNDQIs+ProJ3wIGxWxYC7vw Feb 2 07:56:43 np0005604725 certmonger[39011]: BqR0U/z3JRHw37oYhHdjuf1eox94Sfgy7IYQuEZtANFcT5K/fz23CWWN4PJK/9l0 Feb 2 07:56:43 np0005604725 certmonger[39011]: 1VpK97miKCNflfv3gvDGb8/UDcadEVcdjbA3OqcuIX8RF7vVe3Jj8cbzHhNafy7w Feb 2 07:56:43 np0005604725 certmonger[39011]: TYzZuTZEA0UAocJvdD09DRf+ZP9xcqvoDC8f9EP6KsMwLFWLKDDxsT2oWYaIEWJD Feb 2 07:56:43 np0005604725 certmonger[39011]: j6VQND/PAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBQySviJk4fo46HeQav79Q5H Feb 2 07:56:43 np0005604725 certmonger[39011]: rAPqaTA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:43 np0005604725 certmonger[39011]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Feb 2 07:56:43 np0005604725 certmonger[39011]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Feb 2 07:56:43 np0005604725 certmonger[39011]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Feb 2 07:56:43 np0005604725 certmonger[39011]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBS+ Feb 2 07:56:43 np0005604725 certmonger[39011]: +U/3hU9Xri+8Zu7VYVJUxor+lzCBzQYDVR0RBIHFMIHCgiFucDAwMDU2MDQ3MjUu Feb 2 07:56:43 np0005604725 certmonger[39011]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZsaWJ2aXJ0LXZu Feb 2 07:56:43 np0005604725 certmonger[39011]: Yy9ucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Feb 2 07:56:43 np0005604725 certmonger[39011]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC2xpYnZpcnQtdm5j Feb 2 07:56:43 np0005604725 certmonger[39011]: GyFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Feb 2 07:56:43 np0005604725 certmonger[39011]: BQADggGBAH1ib7LJefHeIgZ4x5GPuZoprVvLwKbGOpJRTwlpfvkSCazcXdx9HRB4 Feb 2 07:56:43 np0005604725 certmonger[39011]: gAzIUulJQxO/aTYZQsByRYPjU+YHh4pmgNAYV3ZBBxcvkGRBP3MY1doY1JNF8Xau Feb 2 07:56:43 np0005604725 certmonger[39011]: t0ws7zAMp0Us+pk3fYTupTBVmRF9oshHXjNnK2wOUf1cY9DfBCszhsJXFJqyKk/v Feb 2 07:56:43 np0005604725 certmonger[39011]: ewfHQHi8bonRzaAW7gwC1tjkBlaseqgvOWUJ32qYcr27GqX0ggO5MLIgOL6LCe0y Feb 2 07:56:43 np0005604725 certmonger[39011]: 5nw6n63sW24rce0qf+cqRcMPVF9WJMhncBg5aXiR61nZQWJBeg5d+kaoFv3uO/nX Feb 2 07:56:43 np0005604725 certmonger[39011]: l8xeeTardhrjIpbdpZqLD0g9mNUbez5pi9wmD0iTAtAlQKWmPg4OG9evM9u+AR0B Feb 2 07:56:43 np0005604725 certmonger[39011]: kCrsSSUumDseXf2HNZT4qKtONn9r2P4yWGeLPIzZyZjFQHOaTUKTnZ6gEp1ku6M4 Feb 2 07:56:43 np0005604725 certmonger[39011]: 41//qTIOKyEEMfBIdl4OyCGTkQeEyJmHBZ7c8QhLkANIsmvFXak3FjRf40saWBo1 Feb 2 07:56:43 np0005604725 certmonger[39011]: +jtc0WAYqQ== Feb 2 07:56:43 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:56:43 np0005604725 certmonger[39011]: ". Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] No hooks set for pre-save command. Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 certmonger[39011]: 2026-02-02 07:56:43 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:43 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:56:43 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:56:44 np0005604725 certmonger[39011]: 2026-02-02 07:56:44 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:44 np0005604725 certmonger[39011]: 2026-02-02 07:56:44 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:44 np0005604725 certmonger[42538]: Certificate in file "/etc/pki/tls/certs/libvirt-vnc-client-cert.crt" issued by CA and saved. Feb 2 07:56:44 np0005604725 certmonger[39011]: 2026-02-02 07:56:44 [39011] Wrote to /var/lib/certmonger/requests/20260202075642 Feb 2 07:56:44 np0005604725 python3[42554]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 07:56:44 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:56:45 np0005604725 python3[42574]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:56:48 np0005604725 python3[42591]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:56:52 np0005604725 python3[42608]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:56:52 np0005604725 python3[42624]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:56:52 np0005604725 python3[42640]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 07:56:53 np0005604725 python3[42658]: ansible-certificate_request Invoked with name=novnc-proxy dns=['np0005604725.internalapi.ooo.test'] principal=['novnc-proxy/np0005604725.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep nova_vnc_proxy)#012service_crt="/etc/pki/tls/certs/novnc-proxy.crt"#012service_key="/etc/pki/tls/private/novnc-proxy.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012#012# Set permissions#012podman exec -u root "$container_name" chmod 0644 $service_crt#012podman exec -u root "$container_name" chmod 0640 $service_key#012podman exec -u root "$container_name" chgrp qemu $service_key#012#012# No need to trigger a reload for novnc proxy since the cert is not cached#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 07:56:53 np0005604725 certmonger[39011]: 2026-02-02 07:56:53 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:53 np0005604725 certmonger[39011]: 2026-02-02 07:56:53 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:53 np0005604725 certmonger[39011]: 2026-02-02 07:56:53 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:53 np0005604725 certmonger[39011]: 2026-02-02 07:56:53 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:53 np0005604725 certmonger[39011]: 2026-02-02 07:56:53 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:53 np0005604725 certmonger[39011]: 2026-02-02 07:56:53 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:53 np0005604725 certmonger[39011]: 2026-02-02 07:56:53 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:53 np0005604725 certmonger[39011]: 2026-02-02 07:56:53 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:53 np0005604725 certmonger[39011]: 2026-02-02 07:56:53 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[42668]: 2026-02-02 07:56:54 [42668] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.internalapi.ooo.test" for child. Feb 2 07:56:54 np0005604725 certmonger[42668]: 2026-02-02 07:56:54 [42668] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.internalapi.ooo.test Feb 2 07:56:54 np0005604725 certmonger[42668]: " for child. Feb 2 07:56:54 np0005604725 certmonger[42668]: 2026-02-02 07:56:54 [42668] Setting "CERTMONGER_REQ_PRINCIPAL" to "novnc-proxy/np0005604725.internalapi.ooo.test@OOO.TEST Feb 2 07:56:54 np0005604725 certmonger[42668]: " for child. Feb 2 07:56:54 np0005604725 certmonger[42668]: 2026-02-02 07:56:54 [42668] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 07:56:54 np0005604725 certmonger[42668]: 2026-02-02 07:56:54 [42668] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 07:56:54 np0005604725 certmonger[42668]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NjA0NzI1LmludGVybmFsYXBp Feb 2 07:56:54 np0005604725 certmonger[42668]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAo2jT6x6h Feb 2 07:56:54 np0005604725 certmonger[42668]: WceSe1cjbEIaFf4wEME28xTK9Lxg+ubqLiydqsiXQdJWvvrgflDRDkTeDrGHS1n+ Feb 2 07:56:54 np0005604725 certmonger[42668]: YcIaC+6XwhaWxaKvBPex6C1aMmdQlTNP8+9z+umExKXoOMx+lT6CUV9qz+E+6/5B Feb 2 07:56:54 np0005604725 certmonger[42668]: 5lyE2PeUsfP4TXQCfMG93ckKhWQmxIEuvLlTKI0fAnQvrh8Uk8qfdhKbHwbi80lF Feb 2 07:56:54 np0005604725 certmonger[42668]: Xy3rcpCSYptkE/Edf0kA7untIfFdqrsH7FXK9lML0clcJLafwu/ia94Y7+2CwEST Feb 2 07:56:54 np0005604725 certmonger[42668]: SBCB6TJYLRPOHte/XAJyiHhHaKOXMB4u87A14f1uCG4f4JjysYyE/NtWkrTujZSJ Feb 2 07:56:54 np0005604725 certmonger[42668]: Ol4hSYG6MtWEuwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAy Feb 2 07:56:54 np0005604725 certmonger[42668]: ADAAMgAwADcANQA2ADUAMzCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Feb 2 07:56:54 np0005604725 certmonger[42668]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:56:54 np0005604725 certmonger[42668]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZub3ZuYy1wcm94eS9ucDAwMDU2MDQ3MjUu Feb 2 07:56:54 np0005604725 certmonger[42668]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Feb 2 07:56:54 np0005604725 certmonger[42668]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC25vdm5jLXByb3h5GyFucDAwMDU2MDQ3MjUu Feb 2 07:56:54 np0005604725 certmonger[42668]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Feb 2 07:56:54 np0005604725 certmonger[42668]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFCIuk79KaEfcPx0L5TBuUaDraTSQ Feb 2 07:56:54 np0005604725 certmonger[42668]: MA0GCSqGSIb3DQEBCwUAA4IBAQBd62QupRL8i1eFsXb+ZUAhBiDWPhco7LZJxMKF Feb 2 07:56:54 np0005604725 certmonger[42668]: gGD86afyHN3UsEM87zeMCtvl2G4vjA2oDfE0cfSy7ycFRDKok1QJv0oT34RfzHiW Feb 2 07:56:54 np0005604725 certmonger[42668]: GQMAj70GPwYa+eIvzE5Q2Gs8lI+Q+SQX/XgYu2Cw7Ihh/+3qCLdD/5wsilF4FGRO Feb 2 07:56:54 np0005604725 certmonger[42668]: RQBs8SWyPfjFvzGhu2pdr+Zo7p8ZEwWCG7A7pvqgGeSgIyqRKJO7IvJ3nv8/WBLO Feb 2 07:56:54 np0005604725 certmonger[42668]: m8El+1Xx4ii6FksgFOmWPoonWYmQPZdO4Yh8ULVGMVg3pzrT3hzV2FQVBmOJI5ga Feb 2 07:56:54 np0005604725 certmonger[42668]: Qzbj5IYmOwsPoxptdkIcYmlBZ2Pp1CrRPJH2o6Z1+oMpDHar Feb 2 07:56:54 np0005604725 certmonger[42668]: -----END CERTIFICATE REQUEST----- Feb 2 07:56:54 np0005604725 certmonger[42668]: " for child. Feb 2 07:56:54 np0005604725 certmonger[42668]: 2026-02-02 07:56:54 [42668] Setting "CERTMONGER_SPKAC" to "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" for child. Feb 2 07:56:54 np0005604725 certmonger[42668]: 2026-02-02 07:56:54 [42668] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAo2jT6x6hWceSe1cjbEIaFf4wEME28xTK9Lxg+ubqLiydqsiXQdJWvvrgflDRDkTeDrGHS1n+YcIaC+6XwhaWxaKvBPex6C1aMmdQlTNP8+9z+umExKXoOMx+lT6CUV9qz+E+6/5B5lyE2PeUsfP4TXQCfMG93ckKhWQmxIEuvLlTKI0fAnQvrh8Uk8qfdhKbHwbi80lFXy3rcpCSYptkE/Edf0kA7untIfFdqrsH7FXK9lML0clcJLafwu/ia94Y7+2CwESTSBCB6TJYLRPOHte/XAJyiHhHaKOXMB4u87A14f1uCG4f4JjysYyE/NtWkrTujZSJOl4hSYG6MtWEuwIDAQAB" for child. Feb 2 07:56:54 np0005604725 certmonger[42668]: 2026-02-02 07:56:54 [42668] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 07:56:54 np0005604725 certmonger[42668]: 2026-02-02 07:56:54 [42668] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 07:56:54 np0005604725 certmonger[42668]: 2026-02-02 07:56:54 [42668] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 07:56:54 np0005604725 certmonger[42668]: 2026-02-02 07:56:54 [42668] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 07:56:54 np0005604725 certmonger[42668]: 2026-02-02 07:56:54 [42668] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[42668]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 07:56:54 np0005604725 certmonger[42668]: Certificate: "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" Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Certificate submission still ongoing. Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Certificate submission attempt complete. Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Child status = 0. Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Child output: Feb 2 07:56:54 np0005604725 certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 07:56:54 np0005604725 certmonger[39011]: MIIFcjCCA9qgAwIBAgIQAzDhh1c5meWfqw0OZBkDVDANBgkqhkiG9w0BAQsFADAz Feb 2 07:56:54 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:56:54 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTY1NFoXDTI4MDIwMzA3NTY1NFowPzERMA8GA1UECgwI Feb 2 07:56:54 np0005604725 certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:56:54 np0005604725 certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKNo0+seoVnHkntX Feb 2 07:56:54 np0005604725 certmonger[39011]: I2xCGhX+MBDBNvMUyvS8YPrm6i4snarIl0HSVr764H5Q0Q5E3g6xh0tZ/mHCGgvu Feb 2 07:56:54 np0005604725 certmonger[39011]: l8IWlsWirwT3segtWjJnUJUzT/Pvc/rphMSl6DjMfpU+glFfas/hPuv+QeZchNj3 Feb 2 07:56:54 np0005604725 certmonger[39011]: lLHz+E10AnzBvd3JCoVkJsSBLry5UyiNHwJ0L64fFJPKn3YSmx8G4vNJRV8t63KQ Feb 2 07:56:54 np0005604725 certmonger[39011]: kmKbZBPxHX9JAO7p7SHxXaq7B+xVyvZTC9HJXCS2n8Lv4mveGO/tgsBEk0gQgeky Feb 2 07:56:54 np0005604725 certmonger[39011]: WC0Tzh7Xv1wCcoh4R2ijlzAeLvOwNeH9bghuH+CY8rGMhPzbVpK07o2UiTpeIUmB Feb 2 07:56:54 np0005604725 certmonger[39011]: ujLVhLsCAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:56:54 np0005604725 certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:56:54 np0005604725 certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:56:54 np0005604725 certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:56:54 np0005604725 certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:56:54 np0005604725 certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFB3m Feb 2 07:56:54 np0005604725 certmonger[39011]: z/9V/uxj4oxsXuP0SoZAhjBqMIHNBgNVHREEgcUwgcKCIW5wMDAwNTYwNDcyNS5p Feb 2 07:56:54 np0005604725 certmonger[39011]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5 Feb 2 07:56:54 np0005604725 certmonger[39011]: L25wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Feb 2 07:56:54 np0005604725 certmonger[39011]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkb Feb 2 07:56:54 np0005604725 certmonger[39011]: IW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Feb 2 07:56:54 np0005604725 certmonger[39011]: AAOCAYEAH2RzjzHDArEToC86RgDjuugx/EL04IxJv2b/AyKo2YN3XYm5SbmYhLJf Feb 2 07:56:54 np0005604725 certmonger[39011]: uNwqs6U8j3/HjjYv8FeNIuckMPeyHBe5S3GffKaZGfopkuW80GkPqll5scZorgDG Feb 2 07:56:54 np0005604725 certmonger[39011]: BoHk00TAFinyWLbsunx3vh3h7WZbptNIryYXzlEfvtD0Hu0qa7LuDFHfk1PnVwBT Feb 2 07:56:54 np0005604725 certmonger[39011]: QlF8Qkz7/6RjVGfdSi9R1l+/joiRoK70pUQF9smcPTTBPyD8EAsy/XBStRfMeXnf Feb 2 07:56:54 np0005604725 certmonger[39011]: MLQDR6EPxHDddLup25Pw/amJg1oiX2atMbdNaYCpfg7vI5/tuVIGKm0gXqzPmmcO Feb 2 07:56:54 np0005604725 certmonger[39011]: TxdnWOchN4Wi+l9x8WJeMOiwu6go4NLJwb/2rpQbboS+pTfoGeQ/eWHlFjIkNnBy Feb 2 07:56:54 np0005604725 certmonger[39011]: 0WCkfWh1aTn5efwLFCUIdXHlbNdWQt+sWSPDSsrWQzOmoTtX5J5wOF2S+Bb3JDtW Feb 2 07:56:54 np0005604725 certmonger[39011]: lqSvRi2CPokseAkBpdM/LVudQbC+LH59rcik4KTuSK/bKJuhyPAAn90iwu2sgzLa Feb 2 07:56:54 np0005604725 certmonger[39011]: MOMnRlPf Feb 2 07:56:54 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:56:54 np0005604725 certmonger[39011]: " Feb 2 07:56:54 np0005604725 certmonger[42670]: 2026-02-02 07:56:54 [42670] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 07:56:54 np0005604725 certmonger[42670]: MIIFcjCCA9qgAwIBAgIQAzDhh1c5meWfqw0OZBkDVDANBgkqhkiG9w0BAQsFADAz Feb 2 07:56:54 np0005604725 certmonger[42670]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:56:54 np0005604725 certmonger[42670]: aXR5MB4XDTI2MDIwMjA3NTY1NFoXDTI4MDIwMzA3NTY1NFowPzERMA8GA1UECgwI Feb 2 07:56:54 np0005604725 certmonger[42670]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:56:54 np0005604725 certmonger[42670]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKNo0+seoVnHkntX Feb 2 07:56:54 np0005604725 certmonger[42670]: I2xCGhX+MBDBNvMUyvS8YPrm6i4snarIl0HSVr764H5Q0Q5E3g6xh0tZ/mHCGgvu Feb 2 07:56:54 np0005604725 certmonger[42670]: l8IWlsWirwT3segtWjJnUJUzT/Pvc/rphMSl6DjMfpU+glFfas/hPuv+QeZchNj3 Feb 2 07:56:54 np0005604725 certmonger[42670]: lLHz+E10AnzBvd3JCoVkJsSBLry5UyiNHwJ0L64fFJPKn3YSmx8G4vNJRV8t63KQ Feb 2 07:56:54 np0005604725 certmonger[42670]: kmKbZBPxHX9JAO7p7SHxXaq7B+xVyvZTC9HJXCS2n8Lv4mveGO/tgsBEk0gQgeky Feb 2 07:56:54 np0005604725 certmonger[42670]: WC0Tzh7Xv1wCcoh4R2ijlzAeLvOwNeH9bghuH+CY8rGMhPzbVpK07o2UiTpeIUmB Feb 2 07:56:54 np0005604725 certmonger[42670]: ujLVhLsCAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:56:54 np0005604725 certmonger[42670]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:56:54 np0005604725 certmonger[42670]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:56:54 np0005604725 certmonger[42670]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:56:54 np0005604725 certmonger[42670]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:56:54 np0005604725 certmonger[42670]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFB3m Feb 2 07:56:54 np0005604725 certmonger[42670]: z/9V/uxj4oxsXuP0SoZAhjBqMIHNBgNVHREEgcUwgcKCIW5wMDAwNTYwNDcyNS5p Feb 2 07:56:54 np0005604725 certmonger[42670]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5 Feb 2 07:56:54 np0005604725 certmonger[42670]: L25wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Feb 2 07:56:54 np0005604725 certmonger[42670]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkb Feb 2 07:56:54 np0005604725 certmonger[42670]: IW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Feb 2 07:56:54 np0005604725 certmonger[42670]: AAOCAYEAH2RzjzHDArEToC86RgDjuugx/EL04IxJv2b/AyKo2YN3XYm5SbmYhLJf Feb 2 07:56:54 np0005604725 certmonger[42670]: uNwqs6U8j3/HjjYv8FeNIuckMPeyHBe5S3GffKaZGfopkuW80GkPqll5scZorgDG Feb 2 07:56:54 np0005604725 certmonger[42670]: BoHk00TAFinyWLbsunx3vh3h7WZbptNIryYXzlEfvtD0Hu0qa7LuDFHfk1PnVwBT Feb 2 07:56:54 np0005604725 certmonger[42670]: QlF8Qkz7/6RjVGfdSi9R1l+/joiRoK70pUQF9smcPTTBPyD8EAsy/XBStRfMeXnf Feb 2 07:56:54 np0005604725 certmonger[42670]: MLQDR6EPxHDddLup25Pw/amJg1oiX2atMbdNaYCpfg7vI5/tuVIGKm0gXqzPmmcO Feb 2 07:56:54 np0005604725 certmonger[42670]: TxdnWOchN4Wi+l9x8WJeMOiwu6go4NLJwb/2rpQbboS+pTfoGeQ/eWHlFjIkNnBy Feb 2 07:56:54 np0005604725 certmonger[42670]: 0WCkfWh1aTn5efwLFCUIdXHlbNdWQt+sWSPDSsrWQzOmoTtX5J5wOF2S+Bb3JDtW Feb 2 07:56:54 np0005604725 certmonger[42670]: lqSvRi2CPokseAkBpdM/LVudQbC+LH59rcik4KTuSK/bKJuhyPAAn90iwu2sgzLa Feb 2 07:56:54 np0005604725 certmonger[42670]: MOMnRlPf Feb 2 07:56:54 np0005604725 certmonger[42670]: -----END CERTIFICATE----- Feb 2 07:56:54 np0005604725 certmonger[42670]: ". Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Certificate submission still ongoing. Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Certificate submission postprocessing complete. Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Child status = 0. Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Child output: Feb 2 07:56:54 np0005604725 certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nMOMnRlPf\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 07:56:54 np0005604725 certmonger[39011]: " Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 07:56:54 np0005604725 certmonger[39011]: MIIFcjCCA9qgAwIBAgIQAzDhh1c5meWfqw0OZBkDVDANBgkqhkiG9w0BAQsFADAz Feb 2 07:56:54 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:56:54 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTY1NFoXDTI4MDIwMzA3NTY1NFowPzERMA8GA1UECgwI Feb 2 07:56:54 np0005604725 certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:56:54 np0005604725 certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKNo0+seoVnHkntX Feb 2 07:56:54 np0005604725 certmonger[39011]: I2xCGhX+MBDBNvMUyvS8YPrm6i4snarIl0HSVr764H5Q0Q5E3g6xh0tZ/mHCGgvu Feb 2 07:56:54 np0005604725 certmonger[39011]: l8IWlsWirwT3segtWjJnUJUzT/Pvc/rphMSl6DjMfpU+glFfas/hPuv+QeZchNj3 Feb 2 07:56:54 np0005604725 certmonger[39011]: lLHz+E10AnzBvd3JCoVkJsSBLry5UyiNHwJ0L64fFJPKn3YSmx8G4vNJRV8t63KQ Feb 2 07:56:54 np0005604725 certmonger[39011]: kmKbZBPxHX9JAO7p7SHxXaq7B+xVyvZTC9HJXCS2n8Lv4mveGO/tgsBEk0gQgeky Feb 2 07:56:54 np0005604725 certmonger[39011]: WC0Tzh7Xv1wCcoh4R2ijlzAeLvOwNeH9bghuH+CY8rGMhPzbVpK07o2UiTpeIUmB Feb 2 07:56:54 np0005604725 certmonger[39011]: ujLVhLsCAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:56:54 np0005604725 certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:56:54 np0005604725 certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:56:54 np0005604725 certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:56:54 np0005604725 certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:56:54 np0005604725 certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFB3m Feb 2 07:56:54 np0005604725 certmonger[39011]: z/9V/uxj4oxsXuP0SoZAhjBqMIHNBgNVHREEgcUwgcKCIW5wMDAwNTYwNDcyNS5p Feb 2 07:56:54 np0005604725 certmonger[39011]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5 Feb 2 07:56:54 np0005604725 certmonger[39011]: L25wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Feb 2 07:56:54 np0005604725 certmonger[39011]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkb Feb 2 07:56:54 np0005604725 certmonger[39011]: IW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Feb 2 07:56:54 np0005604725 certmonger[39011]: AAOCAYEAH2RzjzHDArEToC86RgDjuugx/EL04IxJv2b/AyKo2YN3XYm5SbmYhLJf Feb 2 07:56:54 np0005604725 certmonger[39011]: uNwqs6U8j3/HjjYv8FeNIuckMPeyHBe5S3GffKaZGfopkuW80GkPqll5scZorgDG Feb 2 07:56:54 np0005604725 certmonger[39011]: BoHk00TAFinyWLbsunx3vh3h7WZbptNIryYXzlEfvtD0Hu0qa7LuDFHfk1PnVwBT Feb 2 07:56:54 np0005604725 certmonger[39011]: QlF8Qkz7/6RjVGfdSi9R1l+/joiRoK70pUQF9smcPTTBPyD8EAsy/XBStRfMeXnf Feb 2 07:56:54 np0005604725 certmonger[39011]: MLQDR6EPxHDddLup25Pw/amJg1oiX2atMbdNaYCpfg7vI5/tuVIGKm0gXqzPmmcO Feb 2 07:56:54 np0005604725 certmonger[39011]: TxdnWOchN4Wi+l9x8WJeMOiwu6go4NLJwb/2rpQbboS+pTfoGeQ/eWHlFjIkNnBy Feb 2 07:56:54 np0005604725 certmonger[39011]: 0WCkfWh1aTn5efwLFCUIdXHlbNdWQt+sWSPDSsrWQzOmoTtX5J5wOF2S+Bb3JDtW Feb 2 07:56:54 np0005604725 certmonger[39011]: lqSvRi2CPokseAkBpdM/LVudQbC+LH59rcik4KTuSK/bKJuhyPAAn90iwu2sgzLa Feb 2 07:56:54 np0005604725 certmonger[39011]: MOMnRlPf Feb 2 07:56:54 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:56:54 np0005604725 certmonger[39011]: ". Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] No hooks set for pre-save command. Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:56:54 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:54 np0005604725 certmonger[42748]: Certificate in file "/etc/pki/tls/certs/novnc-proxy.crt" issued by CA and saved. Feb 2 07:56:54 np0005604725 certmonger[39011]: 2026-02-02 07:56:54 [39011] Wrote to /var/lib/certmonger/requests/20260202075653 Feb 2 07:56:55 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:56:56 np0005604725 python3[42764]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 07:56:57 np0005604725 python3[42784]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:57:00 np0005604725 python3[42801]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:57:03 np0005604725 python3[42818]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:57:03 np0005604725 python3[42834]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:57:04 np0005604725 python3[42850]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 07:57:05 np0005604725 python3[42868]: ansible-certificate_request Invoked with name=ovn_dbs dns=['np0005604725.internalapi.ooo.test'] principal=['ovn_dbs/np0005604725.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:05 np0005604725 certmonger[42878]: 2026-02-02 07:57:05 [42878] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.internalapi.ooo.test" for child. Feb 2 07:57:05 np0005604725 certmonger[42878]: 2026-02-02 07:57:05 [42878] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.internalapi.ooo.test Feb 2 07:57:05 np0005604725 certmonger[42878]: " for child. Feb 2 07:57:05 np0005604725 certmonger[42878]: 2026-02-02 07:57:05 [42878] Setting "CERTMONGER_REQ_PRINCIPAL" to "ovn_dbs/np0005604725.internalapi.ooo.test@OOO.TEST Feb 2 07:57:05 np0005604725 certmonger[42878]: " for child. Feb 2 07:57:05 np0005604725 certmonger[42878]: 2026-02-02 07:57:05 [42878] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 07:57:05 np0005604725 certmonger[42878]: 2026-02-02 07:57:05 [42878] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 07:57:05 np0005604725 certmonger[42878]: MIID2DCCAsACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NjA0NzI1LmludGVybmFsYXBp Feb 2 07:57:05 np0005604725 certmonger[42878]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAusyrESJP Feb 2 07:57:05 np0005604725 certmonger[42878]: XZdSe0X+e3j1ChxttDoQ2zxSQU4AAeBOxynkC11/Jz/QDzig9B1EaSsstRkDSEus Feb 2 07:57:05 np0005604725 certmonger[42878]: S8Co+VHlXvnkO7jMeWtrzbguW+V1jfZZp/4HzM9jpIjgbTsehozov+UKcfgMMkW/ Feb 2 07:57:05 np0005604725 certmonger[42878]: D4CzxlMq8YzL+QcllYb7nx0fvz4KQ41n5ZfukU8Py3SahMENH5Q6HdRcimAzjIXx Feb 2 07:57:05 np0005604725 certmonger[42878]: ER88U43ceBMNQxfv5vW0GfNzoZ9pLjJQw/lZyEvvAuTSCbthNqG0l/vHw3SLYTO1 Feb 2 07:57:05 np0005604725 certmonger[42878]: OIHlaqV5WbQD1r45HNAu471D2F3u5/DHJVeW1cP8UZTm+eCBDtSdeTyajsKeHwAr Feb 2 07:57:05 np0005604725 certmonger[42878]: BP2Ffjtfw69hLQIDAQABoIIBZTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAy Feb 2 07:57:05 np0005604725 certmonger[42878]: ADAAMgAwADcANQA3ADAANTCCATQGCSqGSIb3DQEJDjGCASUwggEhMAsGA1UdDwQE Feb 2 07:57:05 np0005604725 certmonger[42878]: AwIFoDCBxQYDVR0RBIG9MIG6giFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:57:05 np0005604725 certmonger[42878]: LnRlc3SgQgYKKwYBBAGCNxQCA6A0DDJvdm5fZGJzL25wMDAwNTYwNDcyNS5pbnRl Feb 2 07:57:05 np0005604725 certmonger[42878]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBRBgYrBgEFAgKgRzBFoAobCE9PTy5U Feb 2 07:57:05 np0005604725 certmonger[42878]: RVNUoTcwNaADAgEBoS4wLBsHb3ZuX2RicxshbnAwMDA1NjA0NzI1LmludGVybmFs Feb 2 07:57:05 np0005604725 certmonger[42878]: YXBpLm9vby50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNV Feb 2 07:57:05 np0005604725 certmonger[42878]: HRMBAf8EAjAAMB0GA1UdDgQWBBQiLpO/SmhH3D8dC+UwblGg62k0kDANBgkqhkiG Feb 2 07:57:05 np0005604725 certmonger[42878]: 9w0BAQsFAAOCAQEACBG9hh8xbWzOubKJIJcpUJ2kXPodf0cF3ksm4Q7heAS1sk4T Feb 2 07:57:05 np0005604725 certmonger[42878]: tAlv9FB/bdLEnYVJiAM1Mcjd9pqWe1ZM3jDY0i9QADjv8uayE4rucfIiIx4kYwZj Feb 2 07:57:05 np0005604725 certmonger[42878]: blQYbw8TWyc8owEj6MxjEJxj7aGJSIc2Mi8kWkib+3I3H2HcgZK3ooRgJmmqAP48 Feb 2 07:57:05 np0005604725 certmonger[42878]: gY6feHta/gvrgHnUqYB66+mqaRGQnBgx4RdMBFDuBp3ihb/wmYFNg9Pon+7j63vl Feb 2 07:57:05 np0005604725 certmonger[42878]: 4ufhuA0FBr9ElwyKAFNrYqphnQNrYWab+pJ1H+Y0lAd1OMfBzIvwNrvzttOV10Rg Feb 2 07:57:05 np0005604725 certmonger[42878]: uMqY/buxtMMhnYfBjEjZaOuFYTqdKyxDEy3q0g== Feb 2 07:57:05 np0005604725 certmonger[42878]: -----END CERTIFICATE REQUEST----- Feb 2 07:57:05 np0005604725 certmonger[42878]: " for child. Feb 2 07:57:05 np0005604725 certmonger[42878]: 2026-02-02 07:57:05 [42878] Setting "CERTMONGER_SPKAC" to "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" for child. Feb 2 07:57:05 np0005604725 certmonger[42878]: 2026-02-02 07:57:05 [42878] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAusyrESJPXZdSe0X+e3j1ChxttDoQ2zxSQU4AAeBOxynkC11/Jz/QDzig9B1EaSsstRkDSEusS8Co+VHlXvnkO7jMeWtrzbguW+V1jfZZp/4HzM9jpIjgbTsehozov+UKcfgMMkW/D4CzxlMq8YzL+QcllYb7nx0fvz4KQ41n5ZfukU8Py3SahMENH5Q6HdRcimAzjIXxER88U43ceBMNQxfv5vW0GfNzoZ9pLjJQw/lZyEvvAuTSCbthNqG0l/vHw3SLYTO1OIHlaqV5WbQD1r45HNAu471D2F3u5/DHJVeW1cP8UZTm+eCBDtSdeTyajsKeHwArBP2Ffjtfw69hLQIDAQAB" for child. Feb 2 07:57:05 np0005604725 certmonger[42878]: 2026-02-02 07:57:05 [42878] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 07:57:05 np0005604725 certmonger[42878]: 2026-02-02 07:57:05 [42878] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 07:57:05 np0005604725 certmonger[42878]: 2026-02-02 07:57:05 [42878] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 07:57:05 np0005604725 certmonger[42878]: 2026-02-02 07:57:05 [42878] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 07:57:05 np0005604725 certmonger[42878]: 2026-02-02 07:57:05 [42878] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 07:57:05 np0005604725 certmonger[39011]: 2026-02-02 07:57:05 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:06 np0005604725 certmonger[42878]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 07:57:06 np0005604725 certmonger[42878]: Certificate: "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" Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Certificate submission still ongoing. Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Certificate submission attempt complete. Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Child status = 0. Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Child output: Feb 2 07:57:06 np0005604725 certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 07:57:06 np0005604725 certmonger[39011]: MIIFajCCA9KgAwIBAgIQJkhPzg8mRd3v7fJcsZNF2DANBgkqhkiG9w0BAQsFADAz Feb 2 07:57:06 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:57:06 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTcwNloXDTI4MDIwMzA3NTcwNlowPzERMA8GA1UECgwI Feb 2 07:57:06 np0005604725 certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:57:06 np0005604725 certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALrMqxEiT12XUntF Feb 2 07:57:06 np0005604725 certmonger[39011]: /nt49QocbbQ6ENs8UkFOAAHgTscp5Atdfyc/0A84oPQdRGkrLLUZA0hLrEvAqPlR Feb 2 07:57:06 np0005604725 certmonger[39011]: 5V755Du4zHlra824LlvldY32Waf+B8zPY6SI4G07HoaM6L/lCnH4DDJFvw+As8ZT Feb 2 07:57:06 np0005604725 certmonger[39011]: KvGMy/kHJZWG+58dH78+CkONZ+WX7pFPD8t0moTBDR+UOh3UXIpgM4yF8REfPFON Feb 2 07:57:06 np0005604725 certmonger[39011]: 3HgTDUMX7+b1tBnzc6GfaS4yUMP5WchL7wLk0gm7YTahtJf7x8N0i2EztTiB5Wql Feb 2 07:57:06 np0005604725 certmonger[39011]: eVm0A9a+ORzQLuO9Q9hd7ufwxyVXltXD/FGU5vnggQ7UnXk8mo7Cnh8AKwT9hX47 Feb 2 07:57:06 np0005604725 certmonger[39011]: X8OvYS0CAwEAAaOCAewwggHoMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:57:06 np0005604725 certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:57:06 np0005604725 certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:57:06 np0005604725 certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:57:06 np0005604725 certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:57:06 np0005604725 certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCGw Feb 2 07:57:06 np0005604725 certmonger[39011]: kvfFJacYBzRYVssCO6YX3sgAMIHFBgNVHREEgb0wgbqCIW5wMDAwNTYwNDcyNS5p Feb 2 07:57:06 np0005604725 certmonger[39011]: bnRlcm5hbGFwaS5vb28udGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAw Feb 2 07:57:06 np0005604725 certmonger[39011]: MDA1NjA0NzI1LmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUC Feb 2 07:57:06 np0005604725 certmonger[39011]: AqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU2 Feb 2 07:57:06 np0005604725 certmonger[39011]: MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAIZJ Feb 2 07:57:06 np0005604725 certmonger[39011]: uZGE/ZuNA0DVx8h26zMTuKRbUg4NoHHWE5op5vhC7pIdSY9czJd2/ERIsLz+jIaO Feb 2 07:57:06 np0005604725 certmonger[39011]: mKBdb5FiTKoWojNWMi7cCo+QkO6JqNupReykaydQwiZZeRNvROC7Xq+upbTpZwzm Feb 2 07:57:06 np0005604725 certmonger[39011]: 8sy5st/Gzutc98kuilNfvU6rS0GK5hBLhPFOmM0V7HZ4ZNF8B3OUgzBy5QJB7mY1 Feb 2 07:57:06 np0005604725 certmonger[39011]: Ly0WFA1PgC7wK1XSjH5M6qBB6Ju1NWkDcg44/AxXgnfpgPeFNG27XaGS3iEcUemf Feb 2 07:57:06 np0005604725 certmonger[39011]: h88RgSTMrsu9kN7KTSyxvWxsShMhgQN2Higp7LJnsXf9Sb7fci8oFo3QrtzV/tm8 Feb 2 07:57:06 np0005604725 certmonger[39011]: 7k8egsDIz9rOQ/wBITHSa6Nc35PM68Sb8xnhr4lSRPhoqRGqIMKv7qCS9iDV2jjG Feb 2 07:57:06 np0005604725 certmonger[39011]: cug6YdquXWjtlS21byNzvunv5ETQHJP1/0blXqy/RKVKHlPCXKyKs4URftNZClnW Feb 2 07:57:06 np0005604725 certmonger[39011]: EfFl/0h+SMv9vM5rRyw5H6Senz2W6VeUD3yj6pY2a9GK7uZ+M9l7yEYi6xHBiA== Feb 2 07:57:06 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:57:06 np0005604725 certmonger[39011]: " Feb 2 07:57:06 np0005604725 certmonger[42880]: 2026-02-02 07:57:06 [42880] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 07:57:06 np0005604725 certmonger[42880]: MIIFajCCA9KgAwIBAgIQJkhPzg8mRd3v7fJcsZNF2DANBgkqhkiG9w0BAQsFADAz Feb 2 07:57:06 np0005604725 certmonger[42880]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:57:06 np0005604725 certmonger[42880]: aXR5MB4XDTI2MDIwMjA3NTcwNloXDTI4MDIwMzA3NTcwNlowPzERMA8GA1UECgwI Feb 2 07:57:06 np0005604725 certmonger[42880]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:57:06 np0005604725 certmonger[42880]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALrMqxEiT12XUntF Feb 2 07:57:06 np0005604725 certmonger[42880]: /nt49QocbbQ6ENs8UkFOAAHgTscp5Atdfyc/0A84oPQdRGkrLLUZA0hLrEvAqPlR Feb 2 07:57:06 np0005604725 certmonger[42880]: 5V755Du4zHlra824LlvldY32Waf+B8zPY6SI4G07HoaM6L/lCnH4DDJFvw+As8ZT Feb 2 07:57:06 np0005604725 certmonger[42880]: KvGMy/kHJZWG+58dH78+CkONZ+WX7pFPD8t0moTBDR+UOh3UXIpgM4yF8REfPFON Feb 2 07:57:06 np0005604725 certmonger[42880]: 3HgTDUMX7+b1tBnzc6GfaS4yUMP5WchL7wLk0gm7YTahtJf7x8N0i2EztTiB5Wql Feb 2 07:57:06 np0005604725 certmonger[42880]: eVm0A9a+ORzQLuO9Q9hd7ufwxyVXltXD/FGU5vnggQ7UnXk8mo7Cnh8AKwT9hX47 Feb 2 07:57:06 np0005604725 certmonger[42880]: X8OvYS0CAwEAAaOCAewwggHoMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:57:06 np0005604725 certmonger[42880]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:57:06 np0005604725 certmonger[42880]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:57:06 np0005604725 certmonger[42880]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:57:06 np0005604725 certmonger[42880]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:57:06 np0005604725 certmonger[42880]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCGw Feb 2 07:57:06 np0005604725 certmonger[42880]: kvfFJacYBzRYVssCO6YX3sgAMIHFBgNVHREEgb0wgbqCIW5wMDAwNTYwNDcyNS5p Feb 2 07:57:06 np0005604725 certmonger[42880]: bnRlcm5hbGFwaS5vb28udGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAw Feb 2 07:57:06 np0005604725 certmonger[42880]: MDA1NjA0NzI1LmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUC Feb 2 07:57:06 np0005604725 certmonger[42880]: AqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU2 Feb 2 07:57:06 np0005604725 certmonger[42880]: MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAIZJ Feb 2 07:57:06 np0005604725 certmonger[42880]: uZGE/ZuNA0DVx8h26zMTuKRbUg4NoHHWE5op5vhC7pIdSY9czJd2/ERIsLz+jIaO Feb 2 07:57:06 np0005604725 certmonger[42880]: mKBdb5FiTKoWojNWMi7cCo+QkO6JqNupReykaydQwiZZeRNvROC7Xq+upbTpZwzm Feb 2 07:57:06 np0005604725 certmonger[42880]: 8sy5st/Gzutc98kuilNfvU6rS0GK5hBLhPFOmM0V7HZ4ZNF8B3OUgzBy5QJB7mY1 Feb 2 07:57:06 np0005604725 certmonger[42880]: Ly0WFA1PgC7wK1XSjH5M6qBB6Ju1NWkDcg44/AxXgnfpgPeFNG27XaGS3iEcUemf Feb 2 07:57:06 np0005604725 certmonger[42880]: h88RgSTMrsu9kN7KTSyxvWxsShMhgQN2Higp7LJnsXf9Sb7fci8oFo3QrtzV/tm8 Feb 2 07:57:06 np0005604725 certmonger[42880]: 7k8egsDIz9rOQ/wBITHSa6Nc35PM68Sb8xnhr4lSRPhoqRGqIMKv7qCS9iDV2jjG Feb 2 07:57:06 np0005604725 certmonger[42880]: cug6YdquXWjtlS21byNzvunv5ETQHJP1/0blXqy/RKVKHlPCXKyKs4URftNZClnW Feb 2 07:57:06 np0005604725 certmonger[42880]: EfFl/0h+SMv9vM5rRyw5H6Senz2W6VeUD3yj6pY2a9GK7uZ+M9l7yEYi6xHBiA== Feb 2 07:57:06 np0005604725 certmonger[42880]: -----END CERTIFICATE----- Feb 2 07:57:06 np0005604725 certmonger[42880]: ". Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Certificate submission still ongoing. Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Certificate submission postprocessing complete. Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Child status = 0. Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Child output: Feb 2 07:57:06 np0005604725 certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 07:57:06 np0005604725 certmonger[39011]: " Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 07:57:06 np0005604725 certmonger[39011]: MIIFajCCA9KgAwIBAgIQJkhPzg8mRd3v7fJcsZNF2DANBgkqhkiG9w0BAQsFADAz Feb 2 07:57:06 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:57:06 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTcwNloXDTI4MDIwMzA3NTcwNlowPzERMA8GA1UECgwI Feb 2 07:57:06 np0005604725 certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:57:06 np0005604725 certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALrMqxEiT12XUntF Feb 2 07:57:06 np0005604725 certmonger[39011]: /nt49QocbbQ6ENs8UkFOAAHgTscp5Atdfyc/0A84oPQdRGkrLLUZA0hLrEvAqPlR Feb 2 07:57:06 np0005604725 certmonger[39011]: 5V755Du4zHlra824LlvldY32Waf+B8zPY6SI4G07HoaM6L/lCnH4DDJFvw+As8ZT Feb 2 07:57:06 np0005604725 certmonger[39011]: KvGMy/kHJZWG+58dH78+CkONZ+WX7pFPD8t0moTBDR+UOh3UXIpgM4yF8REfPFON Feb 2 07:57:06 np0005604725 certmonger[39011]: 3HgTDUMX7+b1tBnzc6GfaS4yUMP5WchL7wLk0gm7YTahtJf7x8N0i2EztTiB5Wql Feb 2 07:57:06 np0005604725 certmonger[39011]: eVm0A9a+ORzQLuO9Q9hd7ufwxyVXltXD/FGU5vnggQ7UnXk8mo7Cnh8AKwT9hX47 Feb 2 07:57:06 np0005604725 certmonger[39011]: X8OvYS0CAwEAAaOCAewwggHoMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:57:06 np0005604725 certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:57:06 np0005604725 certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:57:06 np0005604725 certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:57:06 np0005604725 certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:57:06 np0005604725 certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCGw Feb 2 07:57:06 np0005604725 certmonger[39011]: kvfFJacYBzRYVssCO6YX3sgAMIHFBgNVHREEgb0wgbqCIW5wMDAwNTYwNDcyNS5p Feb 2 07:57:06 np0005604725 certmonger[39011]: bnRlcm5hbGFwaS5vb28udGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAw Feb 2 07:57:06 np0005604725 certmonger[39011]: MDA1NjA0NzI1LmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUC Feb 2 07:57:06 np0005604725 certmonger[39011]: AqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU2 Feb 2 07:57:06 np0005604725 certmonger[39011]: MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAIZJ Feb 2 07:57:06 np0005604725 certmonger[39011]: uZGE/ZuNA0DVx8h26zMTuKRbUg4NoHHWE5op5vhC7pIdSY9czJd2/ERIsLz+jIaO Feb 2 07:57:06 np0005604725 certmonger[39011]: mKBdb5FiTKoWojNWMi7cCo+QkO6JqNupReykaydQwiZZeRNvROC7Xq+upbTpZwzm Feb 2 07:57:06 np0005604725 certmonger[39011]: 8sy5st/Gzutc98kuilNfvU6rS0GK5hBLhPFOmM0V7HZ4ZNF8B3OUgzBy5QJB7mY1 Feb 2 07:57:06 np0005604725 certmonger[39011]: Ly0WFA1PgC7wK1XSjH5M6qBB6Ju1NWkDcg44/AxXgnfpgPeFNG27XaGS3iEcUemf Feb 2 07:57:06 np0005604725 certmonger[39011]: h88RgSTMrsu9kN7KTSyxvWxsShMhgQN2Higp7LJnsXf9Sb7fci8oFo3QrtzV/tm8 Feb 2 07:57:06 np0005604725 certmonger[39011]: 7k8egsDIz9rOQ/wBITHSa6Nc35PM68Sb8xnhr4lSRPhoqRGqIMKv7qCS9iDV2jjG Feb 2 07:57:06 np0005604725 certmonger[39011]: cug6YdquXWjtlS21byNzvunv5ETQHJP1/0blXqy/RKVKHlPCXKyKs4URftNZClnW Feb 2 07:57:06 np0005604725 certmonger[39011]: EfFl/0h+SMv9vM5rRyw5H6Senz2W6VeUD3yj6pY2a9GK7uZ+M9l7yEYi6xHBiA== Feb 2 07:57:06 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:57:06 np0005604725 certmonger[39011]: ". Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] No hooks set for pre-save command. Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] No hooks set for post-save command. Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:06 np0005604725 certmonger[42884]: Certificate in file "/etc/pki/tls/certs/ovn_dbs.crt" issued by CA and saved. Feb 2 07:57:06 np0005604725 certmonger[39011]: 2026-02-02 07:57:06 [39011] Wrote to /var/lib/certmonger/requests/20260202075705 Feb 2 07:57:07 np0005604725 python3[42900]: ansible-ansible.builtin.file Invoked with path=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig recurse=True state=directory selevel=s0 setype=container_file_t force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Feb 2 07:57:07 np0005604725 python3[42916]: ansible-ansible.legacy.command Invoked with _raw_params=ovsdb-tool --help|grep -q election-timer _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 07:57:08 np0005604725 python3[42967]: ansible-ansible.legacy.stat Invoked with path=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig/ovn_cluster follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 07:57:08 np0005604725 python3[43010]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019027.7637897-112215-262406090615366/source dest=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig/ovn_cluster mode=640 selevel=s0 setype=container_file_t follow=False _original_basename=ovn_cluster.j2 checksum=f4d8671d476cc2555758c3bbeadd2374b6f70920 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None attributes=None Feb 2 07:57:09 np0005604725 python3[43040]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_north_db_server _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 07:57:09 np0005604725 python3[43057]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_south_db_server _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 07:57:10 np0005604725 python3[43074]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_northd _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 07:57:11 np0005604725 python3[43091]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 07:57:12 np0005604725 python3[43111]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:57:15 np0005604725 python3[43128]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:57:18 np0005604725 python3[43145]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:57:18 np0005604725 python3[43161]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:57:19 np0005604725 python3[43177]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 07:57:20 np0005604725 python3[43195]: ansible-certificate_request Invoked with name=ovn_controller dns=['np0005604725.internalapi.ooo.test'] principal=['ovn_controller/np0005604725.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=systemctl restart tripleo_ovn_controller#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[43205]: 2026-02-02 07:57:20 [43205] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.internalapi.ooo.test" for child. Feb 2 07:57:20 np0005604725 certmonger[43205]: 2026-02-02 07:57:20 [43205] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.internalapi.ooo.test Feb 2 07:57:20 np0005604725 certmonger[43205]: " for child. Feb 2 07:57:20 np0005604725 certmonger[43205]: 2026-02-02 07:57:20 [43205] Setting "CERTMONGER_REQ_PRINCIPAL" to "ovn_controller/np0005604725.internalapi.ooo.test@OOO.TEST Feb 2 07:57:20 np0005604725 certmonger[43205]: " for child. Feb 2 07:57:20 np0005604725 certmonger[43205]: 2026-02-02 07:57:20 [43205] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 07:57:20 np0005604725 certmonger[43205]: 2026-02-02 07:57:20 [43205] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 07:57:20 np0005604725 certmonger[43205]: MIID5jCCAs4CAQAwLDEqMCgGA1UEAxMhbnAwMDA1NjA0NzI1LmludGVybmFsYXBp Feb 2 07:57:20 np0005604725 certmonger[43205]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2f/u+KQT Feb 2 07:57:20 np0005604725 certmonger[43205]: b7GYNZIbTYq4BnU7B4s9454iZQ6SZz3hVgnPNLjgW0a3HwCuMG9N2kTsnJFRyxOm Feb 2 07:57:20 np0005604725 certmonger[43205]: Siouap68c2pbOZOJwLoP/WUICi1i2VNCM22CaPdDQ6uQWUa03JGRSSIfIQdZhpm1 Feb 2 07:57:20 np0005604725 certmonger[43205]: 0FFtvnEtGMFfAzZ+IH5nLo3cmhoaH2PjXiCkzIOyLwIbJdFX2dB+el4+AUFvx8co Feb 2 07:57:20 np0005604725 certmonger[43205]: ZIhwot8k3WoV572QRQweYXuLS2OS3KXh+/sa2c0DZmJo5U9mQHzh38UDOFm17/nD Feb 2 07:57:20 np0005604725 certmonger[43205]: 3czQ7DYraXekxYrg1TqoA2hfWitjFoob2xjRKMRQ2LFLaYTvEOrBHMVhoLK5noyk Feb 2 07:57:20 np0005604725 certmonger[43205]: Rue1OPO34DAu5wIDAQABoIIBczArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAy Feb 2 07:57:20 np0005604725 certmonger[43205]: ADAAMgAwADcANQA3ADIAMDCCAUIGCSqGSIb3DQEJDjGCATMwggEvMAsGA1UdDwQE Feb 2 07:57:20 np0005604725 certmonger[43205]: AwIFoDCB0wYDVR0RBIHLMIHIgiFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:57:20 np0005604725 certmonger[43205]: LnRlc3SgSQYKKwYBBAGCNxQCA6A7DDlvdm5fY29udHJvbGxlci9ucDAwMDU2MDQ3 Feb 2 07:57:20 np0005604725 certmonger[43205]: MjUuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgWAYGKwYBBQICoE4wTKAK Feb 2 07:57:20 np0005604725 certmonger[43205]: GwhPT08uVEVTVKE+MDygAwIBAaE1MDMbDm92bl9jb250cm9sbGVyGyFucDAwMDU2 Feb 2 07:57:20 np0005604725 certmonger[43205]: MDQ3MjUuaW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEG Feb 2 07:57:20 np0005604725 certmonger[43205]: CCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFCIuk79KaEfcPx0L5TBu Feb 2 07:57:20 np0005604725 certmonger[43205]: UaDraTSQMA0GCSqGSIb3DQEBCwUAA4IBAQB1kM0XXAa1CTPx48KE+2hda9bGjffL Feb 2 07:57:20 np0005604725 certmonger[43205]: 5ApCvIXhYdBXBGHUKGGkN24BAfqs8caZPjjc3r5OdsMdXn+dQkBZ3xkYGN6YxTK/ Feb 2 07:57:20 np0005604725 certmonger[43205]: UzcCx+ZIz3t2uOklXkThRo6S/hk37h6Mknv6hDPLJteIU5NMD20frj7dJBmtvZG3 Feb 2 07:57:20 np0005604725 certmonger[43205]: fy5R+RpK3pnhTvacDORLvqQc6BMVVROA0DkulPoZVlwE3wGpCt4tPIeWE1JoG0vP Feb 2 07:57:20 np0005604725 certmonger[43205]: dH6UVxlTl2L0N04TVj3J10KBibdrHy8j06ay84MWdrUuq5afNAId7clIqGpBl3P3 Feb 2 07:57:20 np0005604725 certmonger[43205]: VwrO379uNMs7O+wM7gu9C2STp8CJEXQQijkWqvDW4yaHaDeAafT0N7/F Feb 2 07:57:20 np0005604725 certmonger[43205]: -----END CERTIFICATE REQUEST----- Feb 2 07:57:20 np0005604725 certmonger[43205]: " for child. Feb 2 07:57:20 np0005604725 certmonger[43205]: 2026-02-02 07:57:20 [43205] Setting "CERTMONGER_SPKAC" to "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" for child. Feb 2 07:57:20 np0005604725 certmonger[43205]: 2026-02-02 07:57:20 [43205] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2f/u+KQTb7GYNZIbTYq4BnU7B4s9454iZQ6SZz3hVgnPNLjgW0a3HwCuMG9N2kTsnJFRyxOmSiouap68c2pbOZOJwLoP/WUICi1i2VNCM22CaPdDQ6uQWUa03JGRSSIfIQdZhpm10FFtvnEtGMFfAzZ+IH5nLo3cmhoaH2PjXiCkzIOyLwIbJdFX2dB+el4+AUFvx8coZIhwot8k3WoV572QRQweYXuLS2OS3KXh+/sa2c0DZmJo5U9mQHzh38UDOFm17/nD3czQ7DYraXekxYrg1TqoA2hfWitjFoob2xjRKMRQ2LFLaYTvEOrBHMVhoLK5noykRue1OPO34DAu5wIDAQAB" for child. Feb 2 07:57:20 np0005604725 certmonger[43205]: 2026-02-02 07:57:20 [43205] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 07:57:20 np0005604725 certmonger[43205]: 2026-02-02 07:57:20 [43205] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 07:57:20 np0005604725 certmonger[43205]: 2026-02-02 07:57:20 [43205] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 07:57:20 np0005604725 certmonger[43205]: 2026-02-02 07:57:20 [43205] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 07:57:20 np0005604725 certmonger[43205]: 2026-02-02 07:57:20 [43205] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[43205]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 07:57:20 np0005604725 certmonger[43205]: Certificate: "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" Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Certificate submission still ongoing. Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Certificate submission attempt complete. Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Child status = 0. Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Child output: Feb 2 07:57:20 np0005604725 certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 07:57:20 np0005604725 certmonger[39011]: MIIFeDCCA+CgAwIBAgIQe0PW7OZVzGnS0NVYOLO8JzANBgkqhkiG9w0BAQsFADAz Feb 2 07:57:20 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:57:20 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTcyMFoXDTI4MDIwMzA3NTcyMFowPzERMA8GA1UECgwI Feb 2 07:57:20 np0005604725 certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:57:20 np0005604725 certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANn/7vikE2+xmDWS Feb 2 07:57:20 np0005604725 certmonger[39011]: G02KuAZ1OweLPeOeImUOkmc94VYJzzS44FtGtx8ArjBvTdpE7JyRUcsTpkoqLmqe Feb 2 07:57:20 np0005604725 certmonger[39011]: vHNqWzmTicC6D/1lCAotYtlTQjNtgmj3Q0OrkFlGtNyRkUkiHyEHWYaZtdBRbb5x Feb 2 07:57:20 np0005604725 certmonger[39011]: LRjBXwM2fiB+Zy6N3JoaGh9j414gpMyDsi8CGyXRV9nQfnpePgFBb8fHKGSIcKLf Feb 2 07:57:20 np0005604725 certmonger[39011]: JN1qFee9kEUMHmF7i0tjktyl4fv7GtnNA2ZiaOVPZkB84d/FAzhZte/5w93M0Ow2 Feb 2 07:57:20 np0005604725 certmonger[39011]: K2l3pMWK4NU6qANoX1orYxaKG9sY0SjEUNixS2mE7xDqwRzFYaCyuZ6MpEbntTjz Feb 2 07:57:20 np0005604725 certmonger[39011]: t+AwLucCAwEAAaOCAfowggH2MB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:57:20 np0005604725 certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:57:20 np0005604725 certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:57:20 np0005604725 certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:57:20 np0005604725 certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:57:20 np0005604725 certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFE9Z Feb 2 07:57:20 np0005604725 certmonger[39011]: fT+dX4u2st7f9bfhlS5oFuP1MIHTBgNVHREEgcswgciCIW5wMDAwNTYwNDcyNS5p Feb 2 07:57:20 np0005604725 certmonger[39011]: bnRlcm5hbGFwaS5vb28udGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9s Feb 2 07:57:20 np0005604725 certmonger[39011]: bGVyL25wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBY Feb 2 07:57:20 np0005604725 certmonger[39011]: BgYrBgEFAgKgTjBMoAobCE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRy Feb 2 07:57:20 np0005604725 certmonger[39011]: b2xsZXIbIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG Feb 2 07:57:20 np0005604725 certmonger[39011]: 9w0BAQsFAAOCAYEAmdCjT/csNOGmokIAFz7AZGH0gZbARrPmW0CKJ27Pz/9lJDXn Feb 2 07:57:20 np0005604725 certmonger[39011]: HI/bEHLpvnkaQb/qEK7Tk9U1LYQQz93nc2fhzxJv7ggY+uqg3SEA/ZdendhtjR+/ Feb 2 07:57:20 np0005604725 certmonger[39011]: Aa8BiKEOK0rjKQUj9GvJq8Mddptdqb2a4EBAtFhwdv26e7GGRKYMoGEhAw0u6mHD Feb 2 07:57:20 np0005604725 certmonger[39011]: yAQSuzDvrJgWyCr/ncCLxIm5acIPmNaV7hLRJIw+M4Wwm6utb3sPOmtMNrO1rgiE Feb 2 07:57:20 np0005604725 certmonger[39011]: 4s+N8nRyKGp761ernPt/kA5CC3oZAIJlDPbAOy3upVnsqgdnzMIS9PMhd2i1RM0R Feb 2 07:57:20 np0005604725 certmonger[39011]: 7ZcNQnn+ETaJotxP6OadUVhZy/2HHDixkCPGE/LTtaRhkKLzWw1m2zZgzr2QUXv4 Feb 2 07:57:20 np0005604725 certmonger[39011]: mHrxWwoVcXfxFyDD1WiAkrqG2kH+J1WmQcOcs6ZC6I1e/d/gzIIKOWZNL7yy43Pk Feb 2 07:57:20 np0005604725 certmonger[39011]: PINo8RIP7yaI/OystPr+74lzWmBFCw2MVDw34M2aYZ9Q0CmJn/XIv5LpePoY8BGn Feb 2 07:57:20 np0005604725 certmonger[39011]: fKFGIP3Ia3FskBHD Feb 2 07:57:20 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:57:20 np0005604725 certmonger[39011]: " Feb 2 07:57:20 np0005604725 certmonger[43207]: 2026-02-02 07:57:20 [43207] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 07:57:20 np0005604725 certmonger[43207]: MIIFeDCCA+CgAwIBAgIQe0PW7OZVzGnS0NVYOLO8JzANBgkqhkiG9w0BAQsFADAz Feb 2 07:57:20 np0005604725 certmonger[43207]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:57:20 np0005604725 certmonger[43207]: aXR5MB4XDTI2MDIwMjA3NTcyMFoXDTI4MDIwMzA3NTcyMFowPzERMA8GA1UECgwI Feb 2 07:57:20 np0005604725 certmonger[43207]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:57:20 np0005604725 certmonger[43207]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANn/7vikE2+xmDWS Feb 2 07:57:20 np0005604725 certmonger[43207]: G02KuAZ1OweLPeOeImUOkmc94VYJzzS44FtGtx8ArjBvTdpE7JyRUcsTpkoqLmqe Feb 2 07:57:20 np0005604725 certmonger[43207]: vHNqWzmTicC6D/1lCAotYtlTQjNtgmj3Q0OrkFlGtNyRkUkiHyEHWYaZtdBRbb5x Feb 2 07:57:20 np0005604725 certmonger[43207]: LRjBXwM2fiB+Zy6N3JoaGh9j414gpMyDsi8CGyXRV9nQfnpePgFBb8fHKGSIcKLf Feb 2 07:57:20 np0005604725 certmonger[43207]: JN1qFee9kEUMHmF7i0tjktyl4fv7GtnNA2ZiaOVPZkB84d/FAzhZte/5w93M0Ow2 Feb 2 07:57:20 np0005604725 certmonger[43207]: K2l3pMWK4NU6qANoX1orYxaKG9sY0SjEUNixS2mE7xDqwRzFYaCyuZ6MpEbntTjz Feb 2 07:57:20 np0005604725 certmonger[43207]: t+AwLucCAwEAAaOCAfowggH2MB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:57:20 np0005604725 certmonger[43207]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:57:20 np0005604725 certmonger[43207]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:57:20 np0005604725 certmonger[43207]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:57:20 np0005604725 certmonger[43207]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:57:20 np0005604725 certmonger[43207]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFE9Z Feb 2 07:57:20 np0005604725 certmonger[43207]: fT+dX4u2st7f9bfhlS5oFuP1MIHTBgNVHREEgcswgciCIW5wMDAwNTYwNDcyNS5p Feb 2 07:57:20 np0005604725 certmonger[43207]: bnRlcm5hbGFwaS5vb28udGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9s Feb 2 07:57:20 np0005604725 certmonger[43207]: bGVyL25wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBY Feb 2 07:57:20 np0005604725 certmonger[43207]: BgYrBgEFAgKgTjBMoAobCE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRy Feb 2 07:57:20 np0005604725 certmonger[43207]: b2xsZXIbIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG Feb 2 07:57:20 np0005604725 certmonger[43207]: 9w0BAQsFAAOCAYEAmdCjT/csNOGmokIAFz7AZGH0gZbARrPmW0CKJ27Pz/9lJDXn Feb 2 07:57:20 np0005604725 certmonger[43207]: HI/bEHLpvnkaQb/qEK7Tk9U1LYQQz93nc2fhzxJv7ggY+uqg3SEA/ZdendhtjR+/ Feb 2 07:57:20 np0005604725 certmonger[43207]: Aa8BiKEOK0rjKQUj9GvJq8Mddptdqb2a4EBAtFhwdv26e7GGRKYMoGEhAw0u6mHD Feb 2 07:57:20 np0005604725 certmonger[43207]: yAQSuzDvrJgWyCr/ncCLxIm5acIPmNaV7hLRJIw+M4Wwm6utb3sPOmtMNrO1rgiE Feb 2 07:57:20 np0005604725 certmonger[43207]: 4s+N8nRyKGp761ernPt/kA5CC3oZAIJlDPbAOy3upVnsqgdnzMIS9PMhd2i1RM0R Feb 2 07:57:20 np0005604725 certmonger[43207]: 7ZcNQnn+ETaJotxP6OadUVhZy/2HHDixkCPGE/LTtaRhkKLzWw1m2zZgzr2QUXv4 Feb 2 07:57:20 np0005604725 certmonger[43207]: mHrxWwoVcXfxFyDD1WiAkrqG2kH+J1WmQcOcs6ZC6I1e/d/gzIIKOWZNL7yy43Pk Feb 2 07:57:20 np0005604725 certmonger[43207]: PINo8RIP7yaI/OystPr+74lzWmBFCw2MVDw34M2aYZ9Q0CmJn/XIv5LpePoY8BGn Feb 2 07:57:20 np0005604725 certmonger[43207]: fKFGIP3Ia3FskBHD Feb 2 07:57:20 np0005604725 certmonger[43207]: -----END CERTIFICATE----- Feb 2 07:57:20 np0005604725 certmonger[43207]: ". Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Certificate submission still ongoing. Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Certificate submission postprocessing complete. Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Child status = 0. Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Child output: Feb 2 07:57:20 np0005604725 certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFeDCCA+CgAwIBAgIQe0PW7OZVzGnS0NVYOLO8JzANBgkqhkiG9w0BAQsFADAz\nMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y\naXR5MB4XDTI2MDIwMjA3NTcyMFoXDTI4MDIwMzA3NTcyMFowPzERMA8GA1UECgwI\nT09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u\ndGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANn/7vikE2+xmDWS\nG02KuAZ1OweLPeOeImUOkmc94VYJzzS44FtGtx8ArjBvTdpE7JyRUcsTpkoqLmqe\nvHNqWzmTicC6D/1lCAotYtlTQjNtgmj3Q0OrkFlGtNyRkUkiHyEHWYaZtdBRbb5x\nLRjBXwM2fiB+Zy6N3JoaGh9j414gpMyDsi8CGyXRV9nQfnpePgFBb8fHKGSIcKLf\nJN1qFee9kEUMHmF7i0tjktyl4fv7GtnNA2ZiaOVPZkB84d/FAzhZte/5w93M0Ow2\nK2l3pMWK4NU6qANoX1orYxaKG9sY0SjEUNixS2mE7xDqwRzFYaCyuZ6MpEbntTjz\nt+AwLucCAwEAAaOCAfowggH2MB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes\nA+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v\nb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF\nBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v\nb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw\nYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFE9Z\nfT+dX4u2st7f9bfhlS5oFuP1MIHTBgNVHREEgcswgciCIW5wMDAwNTYwNDcyNS5p\nbnRlcm5hbGFwaS5vb28udGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9s\nbGVyL25wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBY\nBgYrBgEFAgKgTjBMoAobCE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRy\nb2xsZXIbIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG\n9w0BAQsFAAOCAYEAmdCjT/csNOGmokIAFz7AZGH0gZbARrPmW0CKJ27Pz/9lJDXn\nHI/bEHLpvnkaQb/qEK7Tk9U1LYQQz93nc2fhzxJv7ggY+uqg3SEA/ZdendhtjR+/\nAa8BiKEOK0rjKQUj9GvJq8Mddptdqb2a4EBAtFhwdv26e7GGRKYMoGEhAw0u6mHD\nyAQSuzDvrJgWyCr/ncCLxIm5acIPmNaV7hLRJIw+M4Wwm6utb3sPOmtMNrO1rgiE\n4s+N8nRyKGp761ernPt/kA5CC3oZAIJlDPbAOy3upVnsqgdnzMIS9PMhd2i1RM0R\n7ZcNQnn+ETaJotxP6OadUVhZy/2HHDixkCPGE/LTtaRhkKLzWw1m2zZgzr2QUXv4\nmHrxWwoVcXfxFyDD1WiAkrqG2kH+J1WmQcOcs6ZC6I1e/d/gzIIKOWZNL7yy43Pk\nPINo8RIP7yaI/OystPr+74lzWmBFCw2MVDw34M2aYZ9Q0CmJn/XIv5LpePoY8BGn\nfKFGIP3Ia3FskBHD\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 07:57:20 np0005604725 certmonger[39011]: " Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 07:57:20 np0005604725 certmonger[39011]: MIIFeDCCA+CgAwIBAgIQe0PW7OZVzGnS0NVYOLO8JzANBgkqhkiG9w0BAQsFADAz Feb 2 07:57:20 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:57:20 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTcyMFoXDTI4MDIwMzA3NTcyMFowPzERMA8GA1UECgwI Feb 2 07:57:20 np0005604725 certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:57:20 np0005604725 certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANn/7vikE2+xmDWS Feb 2 07:57:20 np0005604725 certmonger[39011]: G02KuAZ1OweLPeOeImUOkmc94VYJzzS44FtGtx8ArjBvTdpE7JyRUcsTpkoqLmqe Feb 2 07:57:20 np0005604725 certmonger[39011]: vHNqWzmTicC6D/1lCAotYtlTQjNtgmj3Q0OrkFlGtNyRkUkiHyEHWYaZtdBRbb5x Feb 2 07:57:20 np0005604725 certmonger[39011]: LRjBXwM2fiB+Zy6N3JoaGh9j414gpMyDsi8CGyXRV9nQfnpePgFBb8fHKGSIcKLf Feb 2 07:57:20 np0005604725 certmonger[39011]: JN1qFee9kEUMHmF7i0tjktyl4fv7GtnNA2ZiaOVPZkB84d/FAzhZte/5w93M0Ow2 Feb 2 07:57:20 np0005604725 certmonger[39011]: K2l3pMWK4NU6qANoX1orYxaKG9sY0SjEUNixS2mE7xDqwRzFYaCyuZ6MpEbntTjz Feb 2 07:57:20 np0005604725 certmonger[39011]: t+AwLucCAwEAAaOCAfowggH2MB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:57:20 np0005604725 certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:57:20 np0005604725 certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:57:20 np0005604725 certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:57:20 np0005604725 certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:57:20 np0005604725 certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFE9Z Feb 2 07:57:20 np0005604725 certmonger[39011]: fT+dX4u2st7f9bfhlS5oFuP1MIHTBgNVHREEgcswgciCIW5wMDAwNTYwNDcyNS5p Feb 2 07:57:20 np0005604725 certmonger[39011]: bnRlcm5hbGFwaS5vb28udGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9s Feb 2 07:57:20 np0005604725 certmonger[39011]: bGVyL25wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBY Feb 2 07:57:20 np0005604725 certmonger[39011]: BgYrBgEFAgKgTjBMoAobCE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRy Feb 2 07:57:20 np0005604725 certmonger[39011]: b2xsZXIbIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG Feb 2 07:57:20 np0005604725 certmonger[39011]: 9w0BAQsFAAOCAYEAmdCjT/csNOGmokIAFz7AZGH0gZbARrPmW0CKJ27Pz/9lJDXn Feb 2 07:57:20 np0005604725 certmonger[39011]: HI/bEHLpvnkaQb/qEK7Tk9U1LYQQz93nc2fhzxJv7ggY+uqg3SEA/ZdendhtjR+/ Feb 2 07:57:20 np0005604725 certmonger[39011]: Aa8BiKEOK0rjKQUj9GvJq8Mddptdqb2a4EBAtFhwdv26e7GGRKYMoGEhAw0u6mHD Feb 2 07:57:20 np0005604725 certmonger[39011]: yAQSuzDvrJgWyCr/ncCLxIm5acIPmNaV7hLRJIw+M4Wwm6utb3sPOmtMNrO1rgiE Feb 2 07:57:20 np0005604725 certmonger[39011]: 4s+N8nRyKGp761ernPt/kA5CC3oZAIJlDPbAOy3upVnsqgdnzMIS9PMhd2i1RM0R Feb 2 07:57:20 np0005604725 certmonger[39011]: 7ZcNQnn+ETaJotxP6OadUVhZy/2HHDixkCPGE/LTtaRhkKLzWw1m2zZgzr2QUXv4 Feb 2 07:57:20 np0005604725 certmonger[39011]: mHrxWwoVcXfxFyDD1WiAkrqG2kH+J1WmQcOcs6ZC6I1e/d/gzIIKOWZNL7yy43Pk Feb 2 07:57:20 np0005604725 certmonger[39011]: PINo8RIP7yaI/OystPr+74lzWmBFCw2MVDw34M2aYZ9Q0CmJn/XIv5LpePoY8BGn Feb 2 07:57:20 np0005604725 certmonger[39011]: fKFGIP3Ia3FskBHD Feb 2 07:57:20 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:57:20 np0005604725 certmonger[39011]: ". Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] No hooks set for pre-save command. Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[43213]: Certificate in file "/etc/pki/tls/certs/ovn_controller.crt" issued by CA and saved. Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:20 np0005604725 certmonger[39011]: 2026-02-02 07:57:20 [39011] Wrote to /var/lib/certmonger/requests/20260202075720 Feb 2 07:57:21 np0005604725 python3[43229]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 07:57:22 np0005604725 python3[43249]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:57:25 np0005604725 python3[43266]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 07:57:28 np0005604725 python3[43283]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:57:29 np0005604725 python3[43299]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 07:57:29 np0005604725 python3[43315]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 07:57:30 np0005604725 python3[43333]: ansible-certificate_request Invoked with name=rabbitmq dns=['np0005604725.internalapi.ooo.test'] principal=['rabbitmq/np0005604725.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'rabbitmq(-bundle-.*-[0-9]+)?')#012service_crt="/etc/pki/tls/certs/rabbitmq.crt"#012service_key="/etc/pki/tls/private/rabbitmq.key"#012if echo "$container_name" | grep -q "^rabbitmq-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_crt" "$service_key" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the cert at the mount-point#012 podman cp $service_crt "$container_name:/var/lib/kolla/config_files/src-tls/$service_crt"#012 # Refresh the key at the mount-point#012 podman cp $service_key "$container_name:/var/lib/kolla/config_files/src-tls/$service_key"#012 # Copy the new cert from the mount-point to the real path#012 podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012 # Copy the new key from the mount-point to the real path#012 podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012fi#012# Set appropriate permissions#012podman exec -u root "$container_name" chown rabbitmq:rabbitmq "$service_crt"#012podman exec -u root "$container_name" chown rabbitmq:rabbitmq "$service_key"#012# Trigger a pem cache clear in RabbitMQ to read the new certificates#012podman exec "$container_name" rabbitmqctl eval "ssl:clear_pem_cache()."#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[43343]: 2026-02-02 07:57:30 [43343] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.internalapi.ooo.test" for child. Feb 2 07:57:30 np0005604725 certmonger[43343]: 2026-02-02 07:57:30 [43343] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.internalapi.ooo.test Feb 2 07:57:30 np0005604725 certmonger[43343]: " for child. Feb 2 07:57:30 np0005604725 certmonger[43343]: 2026-02-02 07:57:30 [43343] Setting "CERTMONGER_REQ_PRINCIPAL" to "rabbitmq/np0005604725.internalapi.ooo.test@OOO.TEST Feb 2 07:57:30 np0005604725 certmonger[43343]: " for child. Feb 2 07:57:30 np0005604725 certmonger[43343]: 2026-02-02 07:57:30 [43343] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 07:57:30 np0005604725 certmonger[43343]: 2026-02-02 07:57:30 [43343] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 07:57:30 np0005604725 certmonger[43343]: MIID2jCCAsICAQAwLDEqMCgGA1UEAxMhbnAwMDA1NjA0NzI1LmludGVybmFsYXBp Feb 2 07:57:30 np0005604725 certmonger[43343]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxu6+S9CE Feb 2 07:57:30 np0005604725 certmonger[43343]: C1OFAgAGTOETZPQnCfOlNge5nTkE4//Ot72FZ4UEa/hHoWBEdq5Md+Ubf2dX9RE1 Feb 2 07:57:30 np0005604725 certmonger[43343]: yzYYgcYztzERa9KvAzguY3bcIHs7IXwZa+wPmd56sQgn1KKLd6++TfQ8x21uOsl9 Feb 2 07:57:30 np0005604725 certmonger[43343]: Ml5Wbdp+BlygWan/o/kEf4d5KpZes0r6e/FfI0nZUzi0ZZ0G4gzG0abGIt5brpoN Feb 2 07:57:30 np0005604725 certmonger[43343]: y4RtLsW3xKyPydHRRvM7ZXwxdPSHTaD8w+Uw7Lx9od6kcFJnGfGCM+AMC0xR3oTo Feb 2 07:57:30 np0005604725 certmonger[43343]: szoPLBCLb9s4gB6WWDV7c6ds7TPkNALS3BfBhdGI5n8zBGbgek1HH3r8NpZeVHHb Feb 2 07:57:30 np0005604725 certmonger[43343]: ZnTKT6xMVZyLLQIDAQABoIIBZzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAy Feb 2 07:57:30 np0005604725 certmonger[43343]: ADAAMgAwADcANQA3ADMAMDCCATYGCSqGSIb3DQEJDjGCAScwggEjMAsGA1UdDwQE Feb 2 07:57:30 np0005604725 certmonger[43343]: AwIFoDCBxwYDVR0RBIG/MIG8giFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 07:57:30 np0005604725 certmonger[43343]: LnRlc3SgQwYKKwYBBAGCNxQCA6A1DDNyYWJiaXRtcS9ucDAwMDU2MDQ3MjUuaW50 Feb 2 07:57:30 np0005604725 certmonger[43343]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUgYGKwYBBQICoEgwRqAKGwhPT08u Feb 2 07:57:30 np0005604725 certmonger[43343]: VEVTVKE4MDagAwIBAaEvMC0bCHJhYmJpdG1xGyFucDAwMDU2MDQ3MjUuaW50ZXJu Feb 2 07:57:30 np0005604725 certmonger[43343]: YWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwG Feb 2 07:57:30 np0005604725 certmonger[43343]: A1UdEwEB/wQCMAAwHQYDVR0OBBYEFCIuk79KaEfcPx0L5TBuUaDraTSQMA0GCSqG Feb 2 07:57:30 np0005604725 certmonger[43343]: SIb3DQEBCwUAA4IBAQC6apDsYNd5zG8MlB3PyG82zZhDBqVIz9GVnhqYTJNgdNht Feb 2 07:57:30 np0005604725 certmonger[43343]: ChIowD3UVImsyWmVaRSELYkbRTdzSIcmZf39GKv2l6zMwVwZ6bXDRj0ldGRNW7Tf Feb 2 07:57:30 np0005604725 certmonger[43343]: /e5feJZaSEde/76OxInSupTU4A6/ud+5tgURGRgrNMezUBEQQjZQ9oCI3i949DJv Feb 2 07:57:30 np0005604725 certmonger[43343]: NzNe2y2jKTf89bnDifT1mVsLTD1rtuesRHk6vYneqkwpbHEKxC4rEgcFUgVNGt2O Feb 2 07:57:30 np0005604725 certmonger[43343]: elQ80WaKVQtrW0nHVrYdElwg+yzszJatvMsl/+Ml7FJuhWAjo7Ut+ZwCIswPvWre Feb 2 07:57:30 np0005604725 certmonger[43343]: Jee7mSIGJ/8bFZYgNEo2W9msUcBPPWS+aG3Xwq/t Feb 2 07:57:30 np0005604725 certmonger[43343]: -----END CERTIFICATE REQUEST----- Feb 2 07:57:30 np0005604725 certmonger[43343]: " for child. Feb 2 07:57:30 np0005604725 certmonger[43343]: 2026-02-02 07:57:30 [43343] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDG7r5L0IQLU4UCAAZM4RNk9CcJ86U2B7mdOQTj/863vYVnhQRr+EehYER2rkx35Rt/Z1f1ETXLNhiBxjO3MRFr0q8DOC5jdtwgezshfBlr7A+Z3nqxCCfUoot3r75N9DzHbW46yX0yXlZt2n4GXKBZqf+j+QR/h3kqll6zSvp78V8jSdlTOLRlnQbiDMbRpsYi3luumg3LhG0uxbfErI/J0dFG8ztlfDF09IdNoPzD5TDsvH2h3qRwUmcZ8YIz4AwLTFHehOizOg8sEItv2ziAHpZYNXtzp2ztM+Q0AtLcF8GF0YjmfzMEZuB6TUcfevw2ll5UcdtmdMpPrExVnIstAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAucolUr5AhN8SVGHYK+DMDEWsvkh3f89vR6f2HXd6zK8a36UzaUAAFwBonYzENAS9ZacrRgKdLgsP4wYYESAqPI/hsFF1sSeXfR/IEbxCdt2iWCcL8fUArxSFf8+cwZSBob6bP9pXCgSfH8FLQi5iX+Hgp0fsgBdRr8QcjqC8qhdN1y+b1x3DD6p4MjKQxCZ2VeJH5KC9LUUI2lqoYDfTfyksl7QibTyq2ljBizFN6a5FqBgJv6mVLSwORotfaTKesZ+VU/w456JEtn9IJgw7/0xsQV/ThQdZ03mFFuXC+9YZMw16y42NDLcO1twyKTBW3UNagcR0fs/MGwK39d2RPA==" for child. Feb 2 07:57:30 np0005604725 certmonger[43343]: 2026-02-02 07:57:30 [43343] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxu6+S9CEC1OFAgAGTOETZPQnCfOlNge5nTkE4//Ot72FZ4UEa/hHoWBEdq5Md+Ubf2dX9RE1yzYYgcYztzERa9KvAzguY3bcIHs7IXwZa+wPmd56sQgn1KKLd6++TfQ8x21uOsl9Ml5Wbdp+BlygWan/o/kEf4d5KpZes0r6e/FfI0nZUzi0ZZ0G4gzG0abGIt5brpoNy4RtLsW3xKyPydHRRvM7ZXwxdPSHTaD8w+Uw7Lx9od6kcFJnGfGCM+AMC0xR3oToszoPLBCLb9s4gB6WWDV7c6ds7TPkNALS3BfBhdGI5n8zBGbgek1HH3r8NpZeVHHbZnTKT6xMVZyLLQIDAQAB" for child. Feb 2 07:57:30 np0005604725 certmonger[43343]: 2026-02-02 07:57:30 [43343] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 07:57:30 np0005604725 certmonger[43343]: 2026-02-02 07:57:30 [43343] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 07:57:30 np0005604725 certmonger[43343]: 2026-02-02 07:57:30 [43343] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 07:57:30 np0005604725 certmonger[43343]: 2026-02-02 07:57:30 [43343] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 07:57:30 np0005604725 certmonger[43343]: 2026-02-02 07:57:30 [43343] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 07:57:30 np0005604725 certmonger[39011]: 2026-02-02 07:57:30 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:30 np0005604725 certmonger[43343]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 07:57:31 np0005604725 certmonger[43343]: Certificate: "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" Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Certificate submission still ongoing. Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Certificate submission attempt complete. Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Child status = 0. Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Child output: Feb 2 07:57:31 np0005604725 certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 07:57:31 np0005604725 certmonger[39011]: MIIFbDCCA9SgAwIBAgIQX7CD0xkzKJmprLcb05KS4TANBgkqhkiG9w0BAQsFADAz Feb 2 07:57:31 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:57:31 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTczMVoXDTI4MDIwMzA3NTczMVowPzERMA8GA1UECgwI Feb 2 07:57:31 np0005604725 certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:57:31 np0005604725 certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbuvkvQhAtThQIA Feb 2 07:57:31 np0005604725 certmonger[39011]: BkzhE2T0JwnzpTYHuZ05BOP/zre9hWeFBGv4R6FgRHauTHflG39nV/URNcs2GIHG Feb 2 07:57:31 np0005604725 certmonger[39011]: M7cxEWvSrwM4LmN23CB7OyF8GWvsD5neerEIJ9Sii3evvk30PMdtbjrJfTJeVm3a Feb 2 07:57:31 np0005604725 certmonger[39011]: fgZcoFmp/6P5BH+HeSqWXrNK+nvxXyNJ2VM4tGWdBuIMxtGmxiLeW66aDcuEbS7F Feb 2 07:57:31 np0005604725 certmonger[39011]: t8Ssj8nR0UbzO2V8MXT0h02g/MPlMOy8faHepHBSZxnxgjPgDAtMUd6E6LM6DywQ Feb 2 07:57:31 np0005604725 certmonger[39011]: i2/bOIAellg1e3OnbO0z5DQC0twXwYXRiOZ/MwRm4HpNRx96/DaWXlRx22Z0yk+s Feb 2 07:57:31 np0005604725 certmonger[39011]: TFWciy0CAwEAAaOCAe4wggHqMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:57:31 np0005604725 certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:57:31 np0005604725 certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:57:31 np0005604725 certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:57:31 np0005604725 certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:57:31 np0005604725 certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFPpa Feb 2 07:57:31 np0005604725 certmonger[39011]: JKcbNq0pt6k7tRbrAZkyKEMPMIHHBgNVHREEgb8wgbyCIW5wMDAwNTYwNDcyNS5p Feb 2 07:57:31 np0005604725 certmonger[39011]: bnRlcm5hbGFwaS5vb28udGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25w Feb 2 07:57:31 np0005604725 certmonger[39011]: MDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEF Feb 2 07:57:31 np0005604725 certmonger[39011]: AgKgSDBGoAobCE9PTy5URVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAw Feb 2 07:57:31 np0005604725 certmonger[39011]: NTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Feb 2 07:57:31 np0005604725 certmonger[39011]: ZRKBZOktLtGGFPJq39c+wfSKuHhPtfBcgVURiSDG9lJiTuMSJ/fBMjdNQbqsJpIh Feb 2 07:57:31 np0005604725 certmonger[39011]: ltJC/86kU3NTlzDRrbSPfmXfz47zFmTDCGtBBINmpzwLtgxe4LuPgBkoPuuLMdX+ Feb 2 07:57:31 np0005604725 certmonger[39011]: Lw/BtRF9gRdA2ek0jsdxshAIzqaaTsXUykYgTbtG+VtkeMhibVfmXzcODha8Y62T Feb 2 07:57:31 np0005604725 certmonger[39011]: vUwvzaOQI+hb4ZL1tlJhFO8SAIl5cNoFDbbIUPRF5yMsjnN+ExIzsl4KBts8jdhv Feb 2 07:57:31 np0005604725 certmonger[39011]: ahK/2inPkjozPo5hDX0b28vTSLUPBaNHNDcXrI27bQ3dgidWmPh1uBcd9uad4+Wb Feb 2 07:57:31 np0005604725 certmonger[39011]: 3DsxdaI1M07rbHHxiRJWRAUtO6BLiLp0O5d4krVaz45BvcEQEiskoPd3bh5fmMqK Feb 2 07:57:31 np0005604725 certmonger[39011]: d42bZUqlCOxG01LtDswkA8e/5Hg2+4W5BKqGJ9BfLhZQcvuWRsIHD0EfN/xLQsfA Feb 2 07:57:31 np0005604725 certmonger[39011]: gupcaPJQyp/jXaCJEl6ZZGT4/z9BlTc9B5R++E0BbyXNLLoqFYepdi19Sp2Ouqp+ Feb 2 07:57:31 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:57:31 np0005604725 certmonger[39011]: " Feb 2 07:57:31 np0005604725 certmonger[43345]: 2026-02-02 07:57:31 [43345] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 07:57:31 np0005604725 certmonger[43345]: MIIFbDCCA9SgAwIBAgIQX7CD0xkzKJmprLcb05KS4TANBgkqhkiG9w0BAQsFADAz Feb 2 07:57:31 np0005604725 certmonger[43345]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:57:31 np0005604725 certmonger[43345]: aXR5MB4XDTI2MDIwMjA3NTczMVoXDTI4MDIwMzA3NTczMVowPzERMA8GA1UECgwI Feb 2 07:57:31 np0005604725 certmonger[43345]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:57:31 np0005604725 certmonger[43345]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbuvkvQhAtThQIA Feb 2 07:57:31 np0005604725 certmonger[43345]: BkzhE2T0JwnzpTYHuZ05BOP/zre9hWeFBGv4R6FgRHauTHflG39nV/URNcs2GIHG Feb 2 07:57:31 np0005604725 certmonger[43345]: M7cxEWvSrwM4LmN23CB7OyF8GWvsD5neerEIJ9Sii3evvk30PMdtbjrJfTJeVm3a Feb 2 07:57:31 np0005604725 certmonger[43345]: fgZcoFmp/6P5BH+HeSqWXrNK+nvxXyNJ2VM4tGWdBuIMxtGmxiLeW66aDcuEbS7F Feb 2 07:57:31 np0005604725 certmonger[43345]: t8Ssj8nR0UbzO2V8MXT0h02g/MPlMOy8faHepHBSZxnxgjPgDAtMUd6E6LM6DywQ Feb 2 07:57:31 np0005604725 certmonger[43345]: i2/bOIAellg1e3OnbO0z5DQC0twXwYXRiOZ/MwRm4HpNRx96/DaWXlRx22Z0yk+s Feb 2 07:57:31 np0005604725 certmonger[43345]: TFWciy0CAwEAAaOCAe4wggHqMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:57:31 np0005604725 certmonger[43345]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:57:31 np0005604725 certmonger[43345]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:57:31 np0005604725 certmonger[43345]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:57:31 np0005604725 certmonger[43345]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:57:31 np0005604725 certmonger[43345]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFPpa Feb 2 07:57:31 np0005604725 certmonger[43345]: JKcbNq0pt6k7tRbrAZkyKEMPMIHHBgNVHREEgb8wgbyCIW5wMDAwNTYwNDcyNS5p Feb 2 07:57:31 np0005604725 certmonger[43345]: bnRlcm5hbGFwaS5vb28udGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25w Feb 2 07:57:31 np0005604725 certmonger[43345]: MDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEF Feb 2 07:57:31 np0005604725 certmonger[43345]: AgKgSDBGoAobCE9PTy5URVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAw Feb 2 07:57:31 np0005604725 certmonger[43345]: NTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Feb 2 07:57:31 np0005604725 certmonger[43345]: ZRKBZOktLtGGFPJq39c+wfSKuHhPtfBcgVURiSDG9lJiTuMSJ/fBMjdNQbqsJpIh Feb 2 07:57:31 np0005604725 certmonger[43345]: ltJC/86kU3NTlzDRrbSPfmXfz47zFmTDCGtBBINmpzwLtgxe4LuPgBkoPuuLMdX+ Feb 2 07:57:31 np0005604725 certmonger[43345]: Lw/BtRF9gRdA2ek0jsdxshAIzqaaTsXUykYgTbtG+VtkeMhibVfmXzcODha8Y62T Feb 2 07:57:31 np0005604725 certmonger[43345]: vUwvzaOQI+hb4ZL1tlJhFO8SAIl5cNoFDbbIUPRF5yMsjnN+ExIzsl4KBts8jdhv Feb 2 07:57:31 np0005604725 certmonger[43345]: ahK/2inPkjozPo5hDX0b28vTSLUPBaNHNDcXrI27bQ3dgidWmPh1uBcd9uad4+Wb Feb 2 07:57:31 np0005604725 certmonger[43345]: 3DsxdaI1M07rbHHxiRJWRAUtO6BLiLp0O5d4krVaz45BvcEQEiskoPd3bh5fmMqK Feb 2 07:57:31 np0005604725 certmonger[43345]: d42bZUqlCOxG01LtDswkA8e/5Hg2+4W5BKqGJ9BfLhZQcvuWRsIHD0EfN/xLQsfA Feb 2 07:57:31 np0005604725 certmonger[43345]: gupcaPJQyp/jXaCJEl6ZZGT4/z9BlTc9B5R++E0BbyXNLLoqFYepdi19Sp2Ouqp+ Feb 2 07:57:31 np0005604725 certmonger[43345]: -----END CERTIFICATE----- Feb 2 07:57:31 np0005604725 certmonger[43345]: ". Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Certificate submission still ongoing. Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Certificate submission postprocessing complete. Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Child status = 0. Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Child output: Feb 2 07:57:31 np0005604725 certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFbDCCA9SgAwIBAgIQX7CD0xkzKJmprLcb05KS4TANBgkqhkiG9w0BAQsFADAz\nMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y\naXR5MB4XDTI2MDIwMjA3NTczMVoXDTI4MDIwMzA3NTczMVowPzERMA8GA1UECgwI\nT09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u\ndGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbuvkvQhAtThQIA\nBkzhE2T0JwnzpTYHuZ05BOP/zre9hWeFBGv4R6FgRHauTHflG39nV/URNcs2GIHG\nM7cxEWvSrwM4LmN23CB7OyF8GWvsD5neerEIJ9Sii3evvk30PMdtbjrJfTJeVm3a\nfgZcoFmp/6P5BH+HeSqWXrNK+nvxXyNJ2VM4tGWdBuIMxtGmxiLeW66aDcuEbS7F\nt8Ssj8nR0UbzO2V8MXT0h02g/MPlMOy8faHepHBSZxnxgjPgDAtMUd6E6LM6DywQ\ni2/bOIAellg1e3OnbO0z5DQC0twXwYXRiOZ/MwRm4HpNRx96/DaWXlRx22Z0yk+s\nTFWciy0CAwEAAaOCAe4wggHqMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes\nA+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v\nb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF\nBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v\nb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw\nYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFPpa\nJKcbNq0pt6k7tRbrAZkyKEMPMIHHBgNVHREEgb8wgbyCIW5wMDAwNTYwNDcyNS5p\nbnRlcm5hbGFwaS5vb28udGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25w\nMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEF\nAgKgSDBGoAobCE9PTy5URVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAw\nNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA\nZRKBZOktLtGGFPJq39c+wfSKuHhPtfBcgVURiSDG9lJiTuMSJ/fBMjdNQbqsJpIh\nltJC/86kU3NTlzDRrbSPfmXfz47zFmTDCGtBBINmpzwLtgxe4LuPgBkoPuuLMdX+\nLw/BtRF9gRdA2ek0jsdxshAIzqaaTsXUykYgTbtG+VtkeMhibVfmXzcODha8Y62T\nvUwvzaOQI+hb4ZL1tlJhFO8SAIl5cNoFDbbIUPRF5yMsjnN+ExIzsl4KBts8jdhv\nahK/2inPkjozPo5hDX0b28vTSLUPBaNHNDcXrI27bQ3dgidWmPh1uBcd9uad4+Wb\n3DsxdaI1M07rbHHxiRJWRAUtO6BLiLp0O5d4krVaz45BvcEQEiskoPd3bh5fmMqK\nd42bZUqlCOxG01LtDswkA8e/5Hg2+4W5BKqGJ9BfLhZQcvuWRsIHD0EfN/xLQsfA\ngupcaPJQyp/jXaCJEl6ZZGT4/z9BlTc9B5R++E0BbyXNLLoqFYepdi19Sp2Ouqp+\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 07:57:31 np0005604725 certmonger[39011]: " Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 07:57:31 np0005604725 certmonger[39011]: MIIFbDCCA9SgAwIBAgIQX7CD0xkzKJmprLcb05KS4TANBgkqhkiG9w0BAQsFADAz Feb 2 07:57:31 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 07:57:31 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA3NTczMVoXDTI4MDIwMzA3NTczMVowPzERMA8GA1UECgwI Feb 2 07:57:31 np0005604725 certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 07:57:31 np0005604725 certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbuvkvQhAtThQIA Feb 2 07:57:31 np0005604725 certmonger[39011]: BkzhE2T0JwnzpTYHuZ05BOP/zre9hWeFBGv4R6FgRHauTHflG39nV/URNcs2GIHG Feb 2 07:57:31 np0005604725 certmonger[39011]: M7cxEWvSrwM4LmN23CB7OyF8GWvsD5neerEIJ9Sii3evvk30PMdtbjrJfTJeVm3a Feb 2 07:57:31 np0005604725 certmonger[39011]: fgZcoFmp/6P5BH+HeSqWXrNK+nvxXyNJ2VM4tGWdBuIMxtGmxiLeW66aDcuEbS7F Feb 2 07:57:31 np0005604725 certmonger[39011]: t8Ssj8nR0UbzO2V8MXT0h02g/MPlMOy8faHepHBSZxnxgjPgDAtMUd6E6LM6DywQ Feb 2 07:57:31 np0005604725 certmonger[39011]: i2/bOIAellg1e3OnbO0z5DQC0twXwYXRiOZ/MwRm4HpNRx96/DaWXlRx22Z0yk+s Feb 2 07:57:31 np0005604725 certmonger[39011]: TFWciy0CAwEAAaOCAe4wggHqMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 07:57:31 np0005604725 certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 07:57:31 np0005604725 certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 07:57:31 np0005604725 certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 07:57:31 np0005604725 certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 07:57:31 np0005604725 certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFPpa Feb 2 07:57:31 np0005604725 certmonger[39011]: JKcbNq0pt6k7tRbrAZkyKEMPMIHHBgNVHREEgb8wgbyCIW5wMDAwNTYwNDcyNS5p Feb 2 07:57:31 np0005604725 certmonger[39011]: bnRlcm5hbGFwaS5vb28udGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25w Feb 2 07:57:31 np0005604725 certmonger[39011]: MDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEF Feb 2 07:57:31 np0005604725 certmonger[39011]: AgKgSDBGoAobCE9PTy5URVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAw Feb 2 07:57:31 np0005604725 certmonger[39011]: NTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Feb 2 07:57:31 np0005604725 certmonger[39011]: ZRKBZOktLtGGFPJq39c+wfSKuHhPtfBcgVURiSDG9lJiTuMSJ/fBMjdNQbqsJpIh Feb 2 07:57:31 np0005604725 certmonger[39011]: ltJC/86kU3NTlzDRrbSPfmXfz47zFmTDCGtBBINmpzwLtgxe4LuPgBkoPuuLMdX+ Feb 2 07:57:31 np0005604725 certmonger[39011]: Lw/BtRF9gRdA2ek0jsdxshAIzqaaTsXUykYgTbtG+VtkeMhibVfmXzcODha8Y62T Feb 2 07:57:31 np0005604725 certmonger[39011]: vUwvzaOQI+hb4ZL1tlJhFO8SAIl5cNoFDbbIUPRF5yMsjnN+ExIzsl4KBts8jdhv Feb 2 07:57:31 np0005604725 certmonger[39011]: ahK/2inPkjozPo5hDX0b28vTSLUPBaNHNDcXrI27bQ3dgidWmPh1uBcd9uad4+Wb Feb 2 07:57:31 np0005604725 certmonger[39011]: 3DsxdaI1M07rbHHxiRJWRAUtO6BLiLp0O5d4krVaz45BvcEQEiskoPd3bh5fmMqK Feb 2 07:57:31 np0005604725 certmonger[39011]: d42bZUqlCOxG01LtDswkA8e/5Hg2+4W5BKqGJ9BfLhZQcvuWRsIHD0EfN/xLQsfA Feb 2 07:57:31 np0005604725 certmonger[39011]: gupcaPJQyp/jXaCJEl6ZZGT4/z9BlTc9B5R++E0BbyXNLLoqFYepdi19Sp2Ouqp+ Feb 2 07:57:31 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 07:57:31 np0005604725 certmonger[39011]: ". Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] No hooks set for pre-save command. Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:31 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:31 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:31 np0005604725 certmonger[43444]: Certificate in file "/etc/pki/tls/certs/rabbitmq.crt" issued by CA and saved. Feb 2 07:57:31 np0005604725 certmonger[39011]: 2026-02-02 07:57:31 [39011] Wrote to /var/lib/certmonger/requests/20260202075730 Feb 2 07:57:32 np0005604725 python3[43460]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 07:57:32 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:38 np0005604725 podman[43461]: 2026-02-02 07:57:32.478121362 +0000 UTC m=+0.047634808 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Feb 2 07:57:38 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:38 np0005604725 python3[43527]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 cluster.common.tag/rabbitmq:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 07:57:38 np0005604725 podman[43528]: 2026-02-02 07:57:38.577680417 +0000 UTC m=+0.047842083 image tag ebc5b8a5125c77996fcbf0999ce3c7229ea823a63f3cb6c0320b1c764325f618 cluster.common.tag/rabbitmq:pcmklatest Feb 2 07:57:38 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:39 np0005604725 python3[43554]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:57:39 np0005604725 python3[43554]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 --format json Feb 2 07:57:39 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:39 np0005604725 python3[43554]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 -q --tls-verify=false Feb 2 07:57:42 np0005604725 podman[43567]: 2026-02-02 07:57:39.233965041 +0000 UTC m=+0.043912005 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 Feb 2 07:57:42 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:42 np0005604725 python3[43554]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 5a5e2641b69ad0961a8c27aa58133107886ca1b4c8afe2578a44e01dfe1c5a13 --format json Feb 2 07:57:43 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:43 np0005604725 python3[43656]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:57:43 np0005604725 python3[43656]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 --format json Feb 2 07:57:43 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:43 np0005604725 python3[43656]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 -q --tls-verify=false Feb 2 07:57:47 np0005604725 podman[43670]: 2026-02-02 07:57:43.465107619 +0000 UTC m=+0.044326937 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 Feb 2 07:57:47 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:47 np0005604725 python3[43656]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 7ca017ef46b48fd1bfc8ff7d8ba632ed4c5b74cd007b6b4ee3937de32bc28d97 --format json Feb 2 07:57:47 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:47 np0005604725 python3[43749]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:57:47 np0005604725 python3[43749]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 --format json Feb 2 07:57:47 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:47 np0005604725 python3[43749]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 -q --tls-verify=false Feb 2 07:57:49 np0005604725 podman[43762]: 2026-02-02 07:57:47.9661145 +0000 UTC m=+0.043356121 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 Feb 2 07:57:49 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:49 np0005604725 python3[43749]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ff994b8c121fabe6af210a74f890fe32489161c6d6833bc26d0d539bd3267bc5 --format json Feb 2 07:57:50 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:50 np0005604725 python3[43840]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:57:50 np0005604725 python3[43840]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 --format json Feb 2 07:57:50 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:50 np0005604725 python3[43840]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 -q --tls-verify=false Feb 2 07:57:53 np0005604725 podman[43852]: 2026-02-02 07:57:50.523574407 +0000 UTC m=+0.040402816 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Feb 2 07:57:53 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:53 np0005604725 python3[43840]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect dd8e67bc89122e0c444ed6ae1b2d44de41f9a93cae4697163ee3fbb95d1d1d93 --format json Feb 2 07:57:53 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:53 np0005604725 python3[43929]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:57:53 np0005604725 python3[43929]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 --format json Feb 2 07:57:53 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:53 np0005604725 python3[43929]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 -q --tls-verify=false Feb 2 07:57:55 np0005604725 podman[43942]: 2026-02-02 07:57:53.698418569 +0000 UTC m=+0.042819873 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Feb 2 07:57:55 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:55 np0005604725 python3[43929]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 591bb9fb46a70e9f840f28502388406078442df6b6701a3c17990ee75e333673 --format json Feb 2 07:57:55 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:56 np0005604725 python3[44019]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:57:56 np0005604725 python3[44019]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 --format json Feb 2 07:57:56 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:56 np0005604725 python3[44019]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 -q --tls-verify=false Feb 2 07:57:57 np0005604725 podman[44032]: 2026-02-02 07:57:56.304280966 +0000 UTC m=+0.040857502 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Feb 2 07:57:57 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:57 np0005604725 python3[44019]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 974f4645061d30b5d4ea2689b013657a5031ef85082639abe85a34f6c689cfed --format json Feb 2 07:57:57 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:58 np0005604725 python3[44097]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:57:58 np0005604725 python3[44097]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 --format json Feb 2 07:57:58 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:58 np0005604725 python3[44097]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 -q --tls-verify=false Feb 2 07:57:59 np0005604725 podman[44111]: 2026-02-02 07:57:58.224162094 +0000 UTC m=+0.042441648 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Feb 2 07:57:59 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:57:59 np0005604725 python3[44097]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ebc5b8a5125c77996fcbf0999ce3c7229ea823a63f3cb6c0320b1c764325f618 --format json Feb 2 07:57:59 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:00 np0005604725 python3[44177]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:58:00 np0005604725 python3[44177]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 --format json Feb 2 07:58:00 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:00 np0005604725 python3[44177]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 -q --tls-verify=false Feb 2 07:58:04 np0005604725 podman[44189]: 2026-02-02 07:58:00.144553332 +0000 UTC m=+0.032585757 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Feb 2 07:58:04 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:04 np0005604725 python3[44177]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 60b83c877ad4dbd44a2c87d0c2cae125e26bf7400e06bad13adac4464c3c00ab --format json Feb 2 07:58:04 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:05 np0005604725 python3[44266]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:58:05 np0005604725 python3[44266]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 --format json Feb 2 07:58:05 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:05 np0005604725 python3[44266]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 -q --tls-verify=false Feb 2 07:58:08 np0005604725 podman[44279]: 2026-02-02 07:58:05.245046528 +0000 UTC m=+0.045142535 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Feb 2 07:58:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:08 np0005604725 python3[44266]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 8511cd9a367abb465858ca953b97701b978247c19d681712abace7e2efe4c836 --format json Feb 2 07:58:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:09 np0005604725 python3[44358]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:58:09 np0005604725 python3[44358]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 --format json Feb 2 07:58:09 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:09 np0005604725 python3[44358]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 -q --tls-verify=false Feb 2 07:58:11 np0005604725 podman[44371]: 2026-02-02 07:58:09.189715836 +0000 UTC m=+0.042253842 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 Feb 2 07:58:11 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:11 np0005604725 python3[44358]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d7bf8a233e8e96545c61c98eab6a76e7a89f267b63c54961bb7b2ec4ab242de0 --format json Feb 2 07:58:11 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:11 np0005604725 python3[44448]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:58:11 np0005604725 python3[44448]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 --format json Feb 2 07:58:11 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:11 np0005604725 python3[44448]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 -q --tls-verify=false Feb 2 07:58:20 np0005604725 podman[44461]: 2026-02-02 07:58:11.822274178 +0000 UTC m=+0.041472114 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 07:58:20 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:20 np0005604725 python3[44448]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 0e54ef64b53595586164c7552e02ef6c5cf1520f94fa5fb38a8177bdbbe157e5 --format json Feb 2 07:58:20 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:21 np0005604725 python3[44540]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:58:21 np0005604725 python3[44540]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 --format json Feb 2 07:58:21 np0005604725 python3[44540]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 -q --tls-verify=false Feb 2 07:58:21 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:27 np0005604725 podman[44553]: 2026-02-02 07:58:21.354647585 +0000 UTC m=+0.042282263 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 Feb 2 07:58:27 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:27 np0005604725 python3[44540]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 31619ae32d61cb3d3665fab1911cf57366155ff137b7ecaf26012a09275c9c7e --format json Feb 2 07:58:28 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:28 np0005604725 python3[44897]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:58:28 np0005604725 python3[44897]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 --format json Feb 2 07:58:28 np0005604725 python3[44897]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 -q --tls-verify=false Feb 2 07:58:28 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:34 np0005604725 podman[44909]: 2026-02-02 07:58:28.476987296 +0000 UTC m=+0.043245147 image pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Feb 2 07:58:34 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:34 np0005604725 python3[44897]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect e6ff10df1642e0409a45e0623e6bf6015e5bf00529f54ae8b856072e41fdfe7f --format json Feb 2 07:58:35 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:35 np0005604725 python3[44986]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:58:35 np0005604725 python3[44986]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 --format json Feb 2 07:58:35 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:35 np0005604725 python3[44986]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 -q --tls-verify=false Feb 2 07:58:39 np0005604725 podman[44998]: 2026-02-02 07:58:35.536600805 +0000 UTC m=+0.047166948 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Feb 2 07:58:39 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:39 np0005604725 python3[44986]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 4c30b6f01447c4ec3304d5a7c66d963cc97101a4fbeef3e30c5cf86294ab9930 --format json Feb 2 07:58:39 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:40 np0005604725 python3[45076]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:58:40 np0005604725 python3[45076]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 --format json Feb 2 07:58:40 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:40 np0005604725 python3[45076]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 -q --tls-verify=false Feb 2 07:58:42 np0005604725 podman[45088]: 2026-02-02 07:58:40.171250875 +0000 UTC m=+0.036506776 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Feb 2 07:58:42 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:42 np0005604725 python3[45076]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect c6defd14dc39ca323ceda8b10a28ebd0549ec4a82ee9a24dd79c352fce99f4ae --format json Feb 2 07:58:42 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:42 np0005604725 python3[45165]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:58:42 np0005604725 python3[45165]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 --format json Feb 2 07:58:42 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:42 np0005604725 python3[45165]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 -q --tls-verify=false Feb 2 07:58:50 np0005604725 podman[45177]: 2026-02-02 07:58:43.005429425 +0000 UTC m=+0.039658979 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Feb 2 07:58:50 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:50 np0005604725 python3[45165]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 56f5037f708e132b9b3bd1626a88084f66df47cc4e655e3c55b2fd1c42053a27 --format json Feb 2 07:58:50 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:50 np0005604725 python3[45266]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:58:50 np0005604725 python3[45266]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 --format json Feb 2 07:58:50 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:58:50 np0005604725 python3[45266]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 -q --tls-verify=false Feb 2 07:59:01 np0005604725 podman[45278]: 2026-02-02 07:58:50.673265243 +0000 UTC m=+0.043596331 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 07:59:01 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:01 np0005604725 python3[45266]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 754b4d8b321cd6dbe24baefcffc3490d5c3c8ac78c3b37d04bb4217fcd3e42a3 --format json Feb 2 07:59:01 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:02 np0005604725 python3[45520]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:02 np0005604725 python3[45520]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 --format json Feb 2 07:59:02 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:02 np0005604725 python3[45520]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 -q --tls-verify=false Feb 2 07:59:04 np0005604725 podman[45532]: 2026-02-02 07:59:02.106447597 +0000 UTC m=+0.044865439 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 Feb 2 07:59:04 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:04 np0005604725 python3[45520]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 166d7e2857919abba6fb8fa507c7c6f188825b8637afd9a9f2023299aeb11129 --format json Feb 2 07:59:04 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:04 np0005604725 python3[45610]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:04 np0005604725 python3[45610]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 --format json Feb 2 07:59:04 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:04 np0005604725 python3[45610]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 -q --tls-verify=false Feb 2 07:59:08 np0005604725 podman[45622]: 2026-02-02 07:59:05.056861852 +0000 UTC m=+0.045936648 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Feb 2 07:59:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:08 np0005604725 python3[45610]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect dda8e5bd050d317f9db2219ee92ac30fe48022ea07fd76cb22a133e64c581bb1 --format json Feb 2 07:59:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:08 np0005604725 python3[45701]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:08 np0005604725 python3[45701]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 --format json Feb 2 07:59:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:08 np0005604725 python3[45701]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 -q --tls-verify=false Feb 2 07:59:12 np0005604725 podman[45714]: 2026-02-02 07:59:08.567362976 +0000 UTC m=+0.044666053 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 Feb 2 07:59:12 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:12 np0005604725 python3[45701]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect e71f274c46df2a889cf43774b5e471b625ff38ede0a1e53f90dbc3b83b25d65c --format json Feb 2 07:59:12 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:12 np0005604725 python3[46035]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:12 np0005604725 python3[46035]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 --format json Feb 2 07:59:12 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:12 np0005604725 python3[46035]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 -q --tls-verify=false Feb 2 07:59:14 np0005604725 podman[46048]: 2026-02-02 07:59:12.692408464 +0000 UTC m=+0.041581047 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 Feb 2 07:59:14 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:14 np0005604725 python3[46035]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 8778bf815403ad609bba0db728b48b06803e16f59a6611aa872ed829d22e5dff --format json Feb 2 07:59:14 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:14 np0005604725 python3[46112]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:14 np0005604725 python3[46112]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 --format json Feb 2 07:59:14 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:14 np0005604725 python3[46112]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 -q --tls-verify=false Feb 2 07:59:16 np0005604725 podman[46125]: 2026-02-02 07:59:14.823084839 +0000 UTC m=+0.030468006 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 Feb 2 07:59:16 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:16 np0005604725 python3[46112]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 9d7e73f3c621e8ed8cb4df18422498c037360127ffb3244364fadcf4c909aa66 --format json Feb 2 07:59:16 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:16 np0005604725 python3[46191]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:16 np0005604725 python3[46191]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 --format json Feb 2 07:59:16 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:16 np0005604725 python3[46191]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 -q --tls-verify=false Feb 2 07:59:21 np0005604725 podman[46203]: 2026-02-02 07:59:16.892862306 +0000 UTC m=+0.044911590 image pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Feb 2 07:59:21 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:21 np0005604725 python3[46191]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 4853142d85dba3766b28d28ae195b26f7242230fe3646e9590a7aee2dc2e0dfa --format json Feb 2 07:59:21 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:21 np0005604725 python3[46282]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:21 np0005604725 python3[46282]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 --format json Feb 2 07:59:21 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:21 np0005604725 python3[46282]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 -q --tls-verify=false Feb 2 07:59:23 np0005604725 podman[46295]: 2026-02-02 07:59:21.750954413 +0000 UTC m=+0.045998381 image pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Feb 2 07:59:23 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:23 np0005604725 python3[46282]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 9ac6ea63c0fb4851145e847f9ced2f20804afc8472907b63a82d5866f5cf608a --format json Feb 2 07:59:23 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:24 np0005604725 python3[46372]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:24 np0005604725 python3[46372]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 --format json Feb 2 07:59:24 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:24 np0005604725 python3[46372]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 -q --tls-verify=false Feb 2 07:59:25 np0005604725 podman[46385]: 2026-02-02 07:59:24.414303437 +0000 UTC m=+0.035103556 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 Feb 2 07:59:25 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:25 np0005604725 python3[46372]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect e358b6c9dcc9c9bba9c1005980a7d889cbb475c5a717ad5609f95241604c0212 --format json Feb 2 07:59:25 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:26 np0005604725 python3[46451]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:26 np0005604725 python3[46451]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 --format json Feb 2 07:59:26 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:26 np0005604725 python3[46451]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 -q --tls-verify=false Feb 2 07:59:28 np0005604725 podman[46465]: 2026-02-02 07:59:26.244944838 +0000 UTC m=+0.033223462 image pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Feb 2 07:59:28 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:28 np0005604725 python3[46451]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ba1a08ea1c1207b471b1f02cee16ff456b8a812662cce16906d16de330a66d63 --format json Feb 2 07:59:28 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:28 np0005604725 python3[46541]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:28 np0005604725 python3[46541]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 --format json Feb 2 07:59:28 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:28 np0005604725 python3[46541]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 -q --tls-verify=false Feb 2 07:59:34 np0005604725 podman[46554]: 2026-02-02 07:59:28.797439314 +0000 UTC m=+0.033284265 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Feb 2 07:59:34 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:34 np0005604725 python3[46541]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 44d185b8a0e1290ddc18726fe201c57f0b8af5819077ce82413d4328a03741f4 --format json Feb 2 07:59:34 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:34 np0005604725 python3[46645]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:34 np0005604725 python3[46645]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 --format json Feb 2 07:59:34 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:34 np0005604725 python3[46645]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 -q --tls-verify=false Feb 2 07:59:36 np0005604725 podman[46658]: 2026-02-02 07:59:34.788772521 +0000 UTC m=+0.026901225 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 Feb 2 07:59:36 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:36 np0005604725 python3[46645]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 33f9ee5950a23c770ff8bb08f558523a43a1f42959f0c6d06d60ca1c80f7e6e1 --format json Feb 2 07:59:36 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:37 np0005604725 python3[46736]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:37 np0005604725 python3[46736]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 --format json Feb 2 07:59:37 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:37 np0005604725 python3[46736]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 -q --tls-verify=false Feb 2 07:59:39 np0005604725 podman[46748]: 2026-02-02 07:59:37.166480505 +0000 UTC m=+0.030470895 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Feb 2 07:59:39 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:39 np0005604725 python3[46736]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 6e6a74f36f0ebb93eaefbf9e0ca557a7ed04c8e255563c82b535bb9762aa7de9 --format json Feb 2 07:59:39 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:39 np0005604725 python3[46825]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:39 np0005604725 python3[46825]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 --format json Feb 2 07:59:40 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:40 np0005604725 python3[46825]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 -q --tls-verify=false Feb 2 07:59:42 np0005604725 podman[46838]: 2026-02-02 07:59:40.11257634 +0000 UTC m=+0.065585851 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Feb 2 07:59:42 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:42 np0005604725 python3[46825]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 7fcbf63c0504494c8fcaa07583f909a06486472a0982aeac9554c6fdbeb04c9a --format json Feb 2 07:59:42 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:42 np0005604725 python3[46914]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:42 np0005604725 python3[46914]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 --format json Feb 2 07:59:42 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:42 np0005604725 python3[46914]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 -q --tls-verify=false Feb 2 07:59:45 np0005604725 podman[46927]: 2026-02-02 07:59:42.866583817 +0000 UTC m=+0.043736898 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Feb 2 07:59:45 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:45 np0005604725 python3[46914]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect bd8ee87781bd01a8bd735e4b109efbcb3a15e04ecbb371d002b2cca24b944dce --format json Feb 2 07:59:45 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:45 np0005604725 python3[47005]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:45 np0005604725 python3[47005]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 --format json Feb 2 07:59:45 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:45 np0005604725 python3[47005]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 -q --tls-verify=false Feb 2 07:59:48 np0005604725 podman[47018]: 2026-02-02 07:59:45.754214881 +0000 UTC m=+0.044942501 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Feb 2 07:59:48 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:48 np0005604725 python3[47005]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect f90aecee774881d2211e6a0f1ac9b6ea24f8b68bb72e3585faa8dc5e25263316 --format json Feb 2 07:59:48 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:48 np0005604725 python3[47095]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:48 np0005604725 python3[47095]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 --format json Feb 2 07:59:48 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:48 np0005604725 python3[47095]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 -q --tls-verify=false Feb 2 07:59:50 np0005604725 podman[47108]: 2026-02-02 07:59:48.620845486 +0000 UTC m=+0.035190548 image pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Feb 2 07:59:50 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:50 np0005604725 python3[47095]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 72ddf109f135b64d3116af7b84caaa358dc72e2e60f4c8753fa54fa65b76ba35 --format json Feb 2 07:59:50 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:51 np0005604725 python3[47185]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:51 np0005604725 python3[47185]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 --format json Feb 2 07:59:51 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:51 np0005604725 python3[47185]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 -q --tls-verify=false Feb 2 07:59:52 np0005604725 podman[47197]: 2026-02-02 07:59:51.21179142 +0000 UTC m=+0.027362649 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 Feb 2 07:59:52 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:52 np0005604725 python3[47185]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 554094236cb8aa09d6904d2e194be76db78cdfa36a1fb53db55a072c8c450b81 --format json Feb 2 07:59:53 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:53 np0005604725 python3[47274]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:53 np0005604725 python3[47274]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 --format json Feb 2 07:59:53 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:53 np0005604725 python3[47274]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 -q --tls-verify=false Feb 2 07:59:56 np0005604725 podman[47287]: 2026-02-02 07:59:53.393762494 +0000 UTC m=+0.021845003 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 Feb 2 07:59:56 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:56 np0005604725 python3[47274]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect e655efbb4ee8e7dbcc3ae6186a4633b51095ae1dc752027ac9a7476ce34fbdcc --format json Feb 2 07:59:56 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:56 np0005604725 python3[47364]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:56 np0005604725 python3[47364]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 --format json Feb 2 07:59:56 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:56 np0005604725 python3[47364]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 -q --tls-verify=false Feb 2 07:59:59 np0005604725 podman[47377]: 2026-02-02 07:59:56.831978352 +0000 UTC m=+0.048302830 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 Feb 2 07:59:59 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:59 np0005604725 python3[47364]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 4c390dd76db77eacdc01540c5ab08b3d757da136ee1bbfc299c2fa63ea13edbc --format json Feb 2 07:59:59 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 07:59:59 np0005604725 python3[47456]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 07:59:59 np0005604725 python3[47456]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 --format json Feb 2 07:59:59 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:00:00 np0005604725 python3[47456]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 -q --tls-verify=false Feb 2 08:00:20 np0005604725 podman[47470]: 2026-02-02 08:00:00.042321913 +0000 UTC m=+0.032085371 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 Feb 2 08:00:20 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:00:20 np0005604725 python3[47456]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 3ed9d22adcd049739af5eaa5020356adba272a096a6d80a2d65cd107019d0e41 --format json Feb 2 08:00:20 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:00:20 np0005604725 python3[47548]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Feb 2 08:00:20 np0005604725 python3[47548]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 --format json Feb 2 08:00:20 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:00:20 np0005604725 python3[47548]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 -q --tls-verify=false Feb 2 08:00:22 np0005604725 podman[47560]: 2026-02-02 08:00:20.960569708 +0000 UTC m=+0.035275609 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Feb 2 08:00:22 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:00:22 np0005604725 python3[47548]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 714d1cc5a475f0f8cee78580aa006b7acf3c003f1de9f7ddc03cb297d23487b7 --format json Feb 2 08:00:23 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:00:24 np0005604725 python3[47638]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 08:00:24 np0005604725 python3[47658]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 08:00:28 np0005604725 python3[47675]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 08:00:31 np0005604725 python3[47692]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:00:31 np0005604725 python3[47708]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:00:32 np0005604725 python3[47724]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:00:33 np0005604725 python3[47742]: ansible-certificate_request Invoked with name=redis dns=['np0005604725.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['redis/np0005604725.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep redis_tls_proxy)#012service_crt="/etc/pki/tls/certs/redis.crt"#012service_key="/etc/pki/tls/private/redis.key"#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec "$container_name" chown memcached:memcached "$service_crt"#012podman exec "$container_name" chown memcached:memcached "$service_key"#012# Trigger a reload for stunnel to read the new certificate#012podman exec pkill -o -HUP stunnel#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[47752]: 2026-02-02 08:00:33 [47752] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005604725.internalapi.ooo.test" for child. Feb 2 08:00:33 np0005604725 certmonger[47752]: 2026-02-02 08:00:33 [47752] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005604725.internalapi.ooo.test Feb 2 08:00:33 np0005604725 certmonger[47752]: overcloud.internalapi.ooo.test Feb 2 08:00:33 np0005604725 certmonger[47752]: " for child. Feb 2 08:00:33 np0005604725 certmonger[47752]: 2026-02-02 08:00:33 [47752] Setting "CERTMONGER_REQ_PRINCIPAL" to "redis/np0005604725.internalapi.ooo.test@OOO.TEST Feb 2 08:00:33 np0005604725 certmonger[47752]: " for child. Feb 2 08:00:33 np0005604725 certmonger[47752]: 2026-02-02 08:00:33 [47752] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Feb 2 08:00:33 np0005604725 certmonger[47752]: 2026-02-02 08:00:33 [47752] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Feb 2 08:00:33 np0005604725 certmonger[47752]: MIID9DCCAtwCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NjA0NzI1LmludGVybmFsYXBp Feb 2 08:00:33 np0005604725 certmonger[47752]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAs9wW+swJ Feb 2 08:00:33 np0005604725 certmonger[47752]: iVVYwe0aN+HrLwJuaCyntJEDZz6QaLx/YKgEQwSercY9zciXmyKsgYg/Wjb60yLq Feb 2 08:00:33 np0005604725 certmonger[47752]: iz0eGzBFElKkBDl2/Hw9nsllxCmw7PwahYE9/MKmaPc/cb4sacaPjWfyOcFWZZvW Feb 2 08:00:33 np0005604725 certmonger[47752]: ocpLZgMMUrEQcu/sXaIjNB2vuTyd9nx93fN4dQlt60QYKjEdxd4sE6cHXSYUPIUW Feb 2 08:00:33 np0005604725 certmonger[47752]: 84JuA3p61MAU9o/OM0c7FS4x+SdQtpP44dlVmwEMBO2n+an6GO/JkelggTC7vxzJ Feb 2 08:00:33 np0005604725 certmonger[47752]: NqDx8vtNLK98/kqTqPfRYMi0e23SMJa9jy2YnSPOLjjDHDDVFvabwwNvf5tODcjh Feb 2 08:00:33 np0005604725 certmonger[47752]: zaGKhh/jM17l9wIDAQABoIIBgTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAy Feb 2 08:00:33 np0005604725 certmonger[47752]: ADAAMgAwADgAMAAwADMAMzCCAVAGCSqGSIb3DQEJDjGCAUEwggE9MAsGA1UdDwQE Feb 2 08:00:33 np0005604725 certmonger[47752]: AwIFoDCB4QYDVR0RBIHZMIHWgiFucDAwMDU2MDQ3MjUuaW50ZXJuYWxhcGkub29v Feb 2 08:00:33 np0005604725 certmonger[47752]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBABgorBgEEAYI3 Feb 2 08:00:33 np0005604725 certmonger[47752]: FAIDoDIMMHJlZGlzL25wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBP Feb 2 08:00:33 np0005604725 certmonger[47752]: T08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNUoTUwM6ADAgEBoSwwKhsF Feb 2 08:00:33 np0005604725 certmonger[47752]: cmVkaXMbIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28udGVzdDAdBgNVHSUE Feb 2 08:00:33 np0005604725 certmonger[47752]: FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU Feb 2 08:00:33 np0005604725 certmonger[47752]: Ii6Tv0poR9w/HQvlMG5RoOtpNJAwDQYJKoZIhvcNAQELBQADggEBAFM3DgfHpYJR Feb 2 08:00:33 np0005604725 certmonger[47752]: 7uqNn8sH12b91iKZEzuCpN4WDgaVYk51wa4T/JUPAroeH3KoM54XjMtICTkh1prG Feb 2 08:00:33 np0005604725 certmonger[47752]: EWqiHkSkHd6/GFUVO3SIYOlPnOuOK1ejNmooe21WejZElllg22DOiPOT5S8H/Q8X Feb 2 08:00:33 np0005604725 certmonger[47752]: bVb/VcacaG7o/jKPQe89u5hq+ZaZuUIPb2B5tg0BK5fkzHLozStEgRJ01LEDvFIp Feb 2 08:00:33 np0005604725 certmonger[47752]: wlygZoHg5sY6d5p1Z71HB2t/zupHoYbxuRnqQ7PjP/iMQXkl2Uhh1xIgDyYesoUu Feb 2 08:00:33 np0005604725 certmonger[47752]: Ooh4Ew9b8JSDSwLjC4gsS6wGr9jk/ykPmEPwyJUe2ERaxKaA9MLKT2N7rC48D6TV Feb 2 08:00:33 np0005604725 certmonger[47752]: 23QRTyvoTL8= Feb 2 08:00:33 np0005604725 certmonger[47752]: -----END CERTIFICATE REQUEST----- Feb 2 08:00:33 np0005604725 certmonger[47752]: " for child. Feb 2 08:00:33 np0005604725 certmonger[47752]: 2026-02-02 08:00:33 [47752] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCz3Bb6zAmJVVjB7Ro34esvAm5oLKe0kQNnPpBovH9gqARDBJ6txj3NyJebIqyBiD9aNvrTIuqLPR4bMEUSUqQEOXb8fD2eyWXEKbDs/BqFgT38wqZo9z9xvixpxo+NZ/I5wVZlm9ahyktmAwxSsRBy7+xdoiM0Ha+5PJ32fH3d83h1CW3rRBgqMR3F3iwTpwddJhQ8hRbzgm4DenrUwBT2j84zRzsVLjH5J1C2k/jh2VWbAQwE7af5qfoY78mR6WCBMLu/HMk2oPHy+00sr3z+SpOo99FgyLR7bdIwlr2PLZidI84uOMMcMNUW9pvDA29/m04NyOHNoYqGH+MzXuX3AgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAp0E2Zx5Ok5Y+eqdNvQ843RGCzC2ov4/0oN6PJCKLqCgeVsTr1emltgNoG5e7NtVto6vatgZOBz4dVueZAPVbYZi37+hy1Rdexj4r7CoYxTJ2j8wfdZx1E8loY6MbeLRTGpZf9Srw3+GmspntfrNbXK3wU40tbwzrHN6JjEaz+rza3pWQhfwe0PCRdeKnXCwhKE25/MA10t72KzNqU3B6/3D/CAo+eWM/DqmsGgq7IsBCZgdzBBJz/vJNS/qzd/xfXtnkv8B1Ux4RPOY8t2sd3krmL5Aj6DHDStuaoE6xShNKUYyqW6X3ozWMNyEMoJDrqXkoZZhFTsuw8X9lX77mTQ==" for child. Feb 2 08:00:33 np0005604725 certmonger[47752]: 2026-02-02 08:00:33 [47752] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAs9wW+swJiVVYwe0aN+HrLwJuaCyntJEDZz6QaLx/YKgEQwSercY9zciXmyKsgYg/Wjb60yLqiz0eGzBFElKkBDl2/Hw9nsllxCmw7PwahYE9/MKmaPc/cb4sacaPjWfyOcFWZZvWocpLZgMMUrEQcu/sXaIjNB2vuTyd9nx93fN4dQlt60QYKjEdxd4sE6cHXSYUPIUW84JuA3p61MAU9o/OM0c7FS4x+SdQtpP44dlVmwEMBO2n+an6GO/JkelggTC7vxzJNqDx8vtNLK98/kqTqPfRYMi0e23SMJa9jy2YnSPOLjjDHDDVFvabwwNvf5tODcjhzaGKhh/jM17l9wIDAQAB" for child. Feb 2 08:00:33 np0005604725 certmonger[47752]: 2026-02-02 08:00:33 [47752] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Feb 2 08:00:33 np0005604725 certmonger[47752]: 2026-02-02 08:00:33 [47752] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Feb 2 08:00:33 np0005604725 certmonger[47752]: 2026-02-02 08:00:33 [47752] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Feb 2 08:00:33 np0005604725 certmonger[47752]: 2026-02-02 08:00:33 [47752] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Feb 2 08:00:33 np0005604725 certmonger[47752]: 2026-02-02 08:00:33 [47752] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Feb 2 08:00:33 np0005604725 certmonger[39011]: 2026-02-02 08:00:33 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:33 np0005604725 certmonger[47752]: Submitting request to "https://ipa.ooo.test/ipa/json". Feb 2 08:00:34 np0005604725 certmonger[47752]: Certificate: "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" Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Certificate submission still ongoing. Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Certificate submission attempt complete. Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Child status = 0. Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Child output: Feb 2 08:00:34 np0005604725 certmonger[39011]: "-----BEGIN CERTIFICATE----- Feb 2 08:00:34 np0005604725 certmonger[39011]: MIIFhjCCA+6gAwIBAgIQHkRIgMXeVDmrWHWmHjbcVzANBgkqhkiG9w0BAQsFADAz Feb 2 08:00:34 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 08:00:34 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA4MDAzNFoXDTI4MDIwMzA4MDAzNFowPzERMA8GA1UECgwI Feb 2 08:00:34 np0005604725 certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 08:00:34 np0005604725 certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALPcFvrMCYlVWMHt Feb 2 08:00:34 np0005604725 certmonger[39011]: Gjfh6y8Cbmgsp7SRA2c+kGi8f2CoBEMEnq3GPc3Il5sirIGIP1o2+tMi6os9Hhsw Feb 2 08:00:34 np0005604725 certmonger[39011]: RRJSpAQ5dvx8PZ7JZcQpsOz8GoWBPfzCpmj3P3G+LGnGj41n8jnBVmWb1qHKS2YD Feb 2 08:00:34 np0005604725 certmonger[39011]: DFKxEHLv7F2iIzQdr7k8nfZ8fd3zeHUJbetEGCoxHcXeLBOnB10mFDyFFvOCbgN6 Feb 2 08:00:34 np0005604725 certmonger[39011]: etTAFPaPzjNHOxUuMfknULaT+OHZVZsBDATtp/mp+hjvyZHpYIEwu78cyTag8fL7 Feb 2 08:00:34 np0005604725 certmonger[39011]: TSyvfP5Kk6j30WDItHtt0jCWvY8tmJ0jzi44wxww1Rb2m8MDb3+bTg3I4c2hioYf Feb 2 08:00:34 np0005604725 certmonger[39011]: 4zNe5fcCAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 08:00:34 np0005604725 certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 08:00:34 np0005604725 certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 08:00:34 np0005604725 certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 08:00:34 np0005604725 certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 08:00:34 np0005604725 certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFHHq Feb 2 08:00:34 np0005604725 certmonger[39011]: cYfKNssMTL31qJB2zp/kdywOMIHhBgNVHREEgdkwgdaCIW5wMDAwNTYwNDcyNS5p Feb 2 08:00:34 np0005604725 certmonger[39011]: bnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50 Feb 2 08:00:34 np0005604725 certmonger[39011]: ZXN0oEAGCisGAQQBgjcUAgOgMgwwcmVkaXMvbnAwMDA1NjA0NzI1LmludGVybmFs Feb 2 08:00:34 np0005604725 certmonger[39011]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1Sh Feb 2 08:00:34 np0005604725 certmonger[39011]: NTAzoAMCAQGhLDAqGwVyZWRpcxshbnAwMDA1NjA0NzI1LmludGVybmFsYXBpLm9v Feb 2 08:00:34 np0005604725 certmonger[39011]: by50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQB4s+nsrVUh5tsBy14m8/1JVWFNEGpP Feb 2 08:00:34 np0005604725 certmonger[39011]: 26jPZEuSLYKJbgbhFsbcrovPRV6qTLzLQnY/l8/bu+H9REwu2neaQzgxFl5BvcyY Feb 2 08:00:34 np0005604725 certmonger[39011]: XdgmGgSd0ryAJY5borv0wA5mY7Ma+rX+HCVnWWNHTfiTjRNrm3xK5izA8MBnSAky Feb 2 08:00:34 np0005604725 certmonger[39011]: ORPLt8D/yTmYfBdaMBD7HD34X1MPPEJuoAlT75wGzXeRBVSGmQXludvXbKjRsDUG Feb 2 08:00:34 np0005604725 certmonger[39011]: xBACJjzdwFoyHsRCAg4Bf79T8P8RjHVlZpHXz24yQVyI5vYvEo8zxSuJMdm6K3Of Feb 2 08:00:34 np0005604725 certmonger[39011]: FBQkULAvMrd9DBzA6NhIet5VT4HKNMfJZ6A5of4p84g00F+qZJ1n+Zemf+uXwba4 Feb 2 08:00:34 np0005604725 certmonger[39011]: Oaz2fJDM/hk18HlcOM8iBwyAMlUdLGdKGMeg8WShBN1uYBT+OYv7D696xiS0t53V Feb 2 08:00:34 np0005604725 certmonger[39011]: jqM5vQtUVE91IV/hHw04yX0tRZPHHWmOg1mEEzZ9frCubeJtF9Zgb2QRZCvRS+on Feb 2 08:00:34 np0005604725 certmonger[39011]: dAf7ABIYl20xFMbjWMsPLa1PYbTPGVbSBvI= Feb 2 08:00:34 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 08:00:34 np0005604725 certmonger[39011]: " Feb 2 08:00:34 np0005604725 certmonger[47754]: 2026-02-02 08:00:34 [47754] Postprocessing output "-----BEGIN CERTIFICATE----- Feb 2 08:00:34 np0005604725 certmonger[47754]: MIIFhjCCA+6gAwIBAgIQHkRIgMXeVDmrWHWmHjbcVzANBgkqhkiG9w0BAQsFADAz Feb 2 08:00:34 np0005604725 certmonger[47754]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 08:00:34 np0005604725 certmonger[47754]: aXR5MB4XDTI2MDIwMjA4MDAzNFoXDTI4MDIwMzA4MDAzNFowPzERMA8GA1UECgwI Feb 2 08:00:34 np0005604725 certmonger[47754]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 08:00:34 np0005604725 certmonger[47754]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALPcFvrMCYlVWMHt Feb 2 08:00:34 np0005604725 certmonger[47754]: Gjfh6y8Cbmgsp7SRA2c+kGi8f2CoBEMEnq3GPc3Il5sirIGIP1o2+tMi6os9Hhsw Feb 2 08:00:34 np0005604725 certmonger[47754]: RRJSpAQ5dvx8PZ7JZcQpsOz8GoWBPfzCpmj3P3G+LGnGj41n8jnBVmWb1qHKS2YD Feb 2 08:00:34 np0005604725 certmonger[47754]: DFKxEHLv7F2iIzQdr7k8nfZ8fd3zeHUJbetEGCoxHcXeLBOnB10mFDyFFvOCbgN6 Feb 2 08:00:34 np0005604725 certmonger[47754]: etTAFPaPzjNHOxUuMfknULaT+OHZVZsBDATtp/mp+hjvyZHpYIEwu78cyTag8fL7 Feb 2 08:00:34 np0005604725 certmonger[47754]: TSyvfP5Kk6j30WDItHtt0jCWvY8tmJ0jzi44wxww1Rb2m8MDb3+bTg3I4c2hioYf Feb 2 08:00:34 np0005604725 certmonger[47754]: 4zNe5fcCAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 08:00:34 np0005604725 certmonger[47754]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 08:00:34 np0005604725 certmonger[47754]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 08:00:34 np0005604725 certmonger[47754]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 08:00:34 np0005604725 certmonger[47754]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 08:00:34 np0005604725 certmonger[47754]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFHHq Feb 2 08:00:34 np0005604725 certmonger[47754]: cYfKNssMTL31qJB2zp/kdywOMIHhBgNVHREEgdkwgdaCIW5wMDAwNTYwNDcyNS5p Feb 2 08:00:34 np0005604725 certmonger[47754]: bnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50 Feb 2 08:00:34 np0005604725 certmonger[47754]: ZXN0oEAGCisGAQQBgjcUAgOgMgwwcmVkaXMvbnAwMDA1NjA0NzI1LmludGVybmFs Feb 2 08:00:34 np0005604725 certmonger[47754]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1Sh Feb 2 08:00:34 np0005604725 certmonger[47754]: NTAzoAMCAQGhLDAqGwVyZWRpcxshbnAwMDA1NjA0NzI1LmludGVybmFsYXBpLm9v Feb 2 08:00:34 np0005604725 certmonger[47754]: by50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQB4s+nsrVUh5tsBy14m8/1JVWFNEGpP Feb 2 08:00:34 np0005604725 certmonger[47754]: 26jPZEuSLYKJbgbhFsbcrovPRV6qTLzLQnY/l8/bu+H9REwu2neaQzgxFl5BvcyY Feb 2 08:00:34 np0005604725 certmonger[47754]: XdgmGgSd0ryAJY5borv0wA5mY7Ma+rX+HCVnWWNHTfiTjRNrm3xK5izA8MBnSAky Feb 2 08:00:34 np0005604725 certmonger[47754]: ORPLt8D/yTmYfBdaMBD7HD34X1MPPEJuoAlT75wGzXeRBVSGmQXludvXbKjRsDUG Feb 2 08:00:34 np0005604725 certmonger[47754]: xBACJjzdwFoyHsRCAg4Bf79T8P8RjHVlZpHXz24yQVyI5vYvEo8zxSuJMdm6K3Of Feb 2 08:00:34 np0005604725 certmonger[47754]: FBQkULAvMrd9DBzA6NhIet5VT4HKNMfJZ6A5of4p84g00F+qZJ1n+Zemf+uXwba4 Feb 2 08:00:34 np0005604725 certmonger[47754]: Oaz2fJDM/hk18HlcOM8iBwyAMlUdLGdKGMeg8WShBN1uYBT+OYv7D696xiS0t53V Feb 2 08:00:34 np0005604725 certmonger[47754]: jqM5vQtUVE91IV/hHw04yX0tRZPHHWmOg1mEEzZ9frCubeJtF9Zgb2QRZCvRS+on Feb 2 08:00:34 np0005604725 certmonger[47754]: dAf7ABIYl20xFMbjWMsPLa1PYbTPGVbSBvI= Feb 2 08:00:34 np0005604725 certmonger[47754]: -----END CERTIFICATE----- Feb 2 08:00:34 np0005604725 certmonger[47754]: ". Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Certificate submission still ongoing. Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Certificate submission postprocessing complete. Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Child status = 0. Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Child output: Feb 2 08:00:34 np0005604725 certmonger[39011]: "{"certificate":"-----BEGIN CERTIFICATE-----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\ndAf7ABIYl20xFMbjWMsPLa1PYbTPGVbSBvI=\n-----END CERTIFICATE-----\n","key_checked":true} Feb 2 08:00:34 np0005604725 certmonger[39011]: " Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Issued certificate is "-----BEGIN CERTIFICATE----- Feb 2 08:00:34 np0005604725 certmonger[39011]: MIIFhjCCA+6gAwIBAgIQHkRIgMXeVDmrWHWmHjbcVzANBgkqhkiG9w0BAQsFADAz Feb 2 08:00:34 np0005604725 certmonger[39011]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Feb 2 08:00:34 np0005604725 certmonger[39011]: aXR5MB4XDTI2MDIwMjA4MDAzNFoXDTI4MDIwMzA4MDAzNFowPzERMA8GA1UECgwI Feb 2 08:00:34 np0005604725 certmonger[39011]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTYwNDcyNS5pbnRlcm5hbGFwaS5vb28u Feb 2 08:00:34 np0005604725 certmonger[39011]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALPcFvrMCYlVWMHt Feb 2 08:00:34 np0005604725 certmonger[39011]: Gjfh6y8Cbmgsp7SRA2c+kGi8f2CoBEMEnq3GPc3Il5sirIGIP1o2+tMi6os9Hhsw Feb 2 08:00:34 np0005604725 certmonger[39011]: RRJSpAQ5dvx8PZ7JZcQpsOz8GoWBPfzCpmj3P3G+LGnGj41n8jnBVmWb1qHKS2YD Feb 2 08:00:34 np0005604725 certmonger[39011]: DFKxEHLv7F2iIzQdr7k8nfZ8fd3zeHUJbetEGCoxHcXeLBOnB10mFDyFFvOCbgN6 Feb 2 08:00:34 np0005604725 certmonger[39011]: etTAFPaPzjNHOxUuMfknULaT+OHZVZsBDATtp/mp+hjvyZHpYIEwu78cyTag8fL7 Feb 2 08:00:34 np0005604725 certmonger[39011]: TSyvfP5Kk6j30WDItHtt0jCWvY8tmJ0jzi44wxww1Rb2m8MDb3+bTg3I4c2hioYf Feb 2 08:00:34 np0005604725 certmonger[39011]: 4zNe5fcCAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFDJK+ImTh+jjod5Bq/v1Dkes Feb 2 08:00:34 np0005604725 certmonger[39011]: A+ppMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Feb 2 08:00:34 np0005604725 certmonger[39011]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Feb 2 08:00:34 np0005604725 certmonger[39011]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Feb 2 08:00:34 np0005604725 certmonger[39011]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Feb 2 08:00:34 np0005604725 certmonger[39011]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFHHq Feb 2 08:00:34 np0005604725 certmonger[39011]: cYfKNssMTL31qJB2zp/kdywOMIHhBgNVHREEgdkwgdaCIW5wMDAwNTYwNDcyNS5p Feb 2 08:00:34 np0005604725 certmonger[39011]: bnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50 Feb 2 08:00:34 np0005604725 certmonger[39011]: ZXN0oEAGCisGAQQBgjcUAgOgMgwwcmVkaXMvbnAwMDA1NjA0NzI1LmludGVybmFs Feb 2 08:00:34 np0005604725 certmonger[39011]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1Sh Feb 2 08:00:34 np0005604725 certmonger[39011]: NTAzoAMCAQGhLDAqGwVyZWRpcxshbnAwMDA1NjA0NzI1LmludGVybmFsYXBpLm9v Feb 2 08:00:34 np0005604725 certmonger[39011]: by50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQB4s+nsrVUh5tsBy14m8/1JVWFNEGpP Feb 2 08:00:34 np0005604725 certmonger[39011]: 26jPZEuSLYKJbgbhFsbcrovPRV6qTLzLQnY/l8/bu+H9REwu2neaQzgxFl5BvcyY Feb 2 08:00:34 np0005604725 certmonger[39011]: XdgmGgSd0ryAJY5borv0wA5mY7Ma+rX+HCVnWWNHTfiTjRNrm3xK5izA8MBnSAky Feb 2 08:00:34 np0005604725 certmonger[39011]: ORPLt8D/yTmYfBdaMBD7HD34X1MPPEJuoAlT75wGzXeRBVSGmQXludvXbKjRsDUG Feb 2 08:00:34 np0005604725 certmonger[39011]: xBACJjzdwFoyHsRCAg4Bf79T8P8RjHVlZpHXz24yQVyI5vYvEo8zxSuJMdm6K3Of Feb 2 08:00:34 np0005604725 certmonger[39011]: FBQkULAvMrd9DBzA6NhIet5VT4HKNMfJZ6A5of4p84g00F+qZJ1n+Zemf+uXwba4 Feb 2 08:00:34 np0005604725 certmonger[39011]: Oaz2fJDM/hk18HlcOM8iBwyAMlUdLGdKGMeg8WShBN1uYBT+OYv7D696xiS0t53V Feb 2 08:00:34 np0005604725 certmonger[39011]: jqM5vQtUVE91IV/hHw04yX0tRZPHHWmOg1mEEzZ9frCubeJtF9Zgb2QRZCvRS+on Feb 2 08:00:34 np0005604725 certmonger[39011]: dAf7ABIYl20xFMbjWMsPLa1PYbTPGVbSBvI= Feb 2 08:00:34 np0005604725 certmonger[39011]: -----END CERTIFICATE----- Feb 2 08:00:34 np0005604725 certmonger[39011]: ". Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Certificate issued (0 chain certificates, 0 roots). Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] No hooks set for pre-save command. Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:34 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:00:34 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:34 np0005604725 certmonger[47830]: Certificate in file "/etc/pki/tls/certs/redis.crt" issued by CA and saved. Feb 2 08:00:34 np0005604725 certmonger[39011]: 2026-02-02 08:00:34 [39011] Wrote to /var/lib/certmonger/requests/20260202080033 Feb 2 08:00:35 np0005604725 python3[47846]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:00:36 np0005604725 podman[47847]: 2026-02-02 08:00:35.198216686 +0000 UTC m=+0.036333901 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Feb 2 08:00:36 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:00:37 np0005604725 python3[47900]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 cluster.common.tag/redis:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:00:37 np0005604725 podman[47901]: 2026-02-02 08:00:37.202180309 +0000 UTC m=+0.029426889 image tag 60b83c877ad4dbd44a2c87d0c2cae125e26bf7400e06bad13adac4464c3c00ab cluster.common.tag/redis:pcmklatest Feb 2 08:00:37 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:00:37 np0005604725 python3[47927]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active rsyslog _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:00:37 np0005604725 python3[47976]: ansible-ansible.legacy.stat Invoked with path=/etc/rsyslog.d/openstack-swift.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:00:38 np0005604725 sshd[48020]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:00:38 np0005604725 python3[48019]: ansible-ansible.legacy.copy Invoked with dest=/etc/rsyslog.d/openstack-swift.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019237.6692708-116986-39966793412933/source _original_basename=tmp63kondqu follow=False checksum=c046f7cecbacf1ea879045a0e157e300a2726c73 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:00:38 np0005604725 python3[48050]: ansible-ansible.legacy.systemd Invoked with name=rsyslog state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Feb 2 08:00:38 np0005604725 systemd[1]: Stopping System Logging Service... Feb 2 08:00:39 np0005604725 rsyslogd[40064]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="40064" x-info="https://www.rsyslog.com"] exiting on signal 15. Feb 2 08:00:39 np0005604725 systemd[1]: rsyslog.service: Deactivated successfully. Feb 2 08:00:39 np0005604725 systemd[1]: Stopped System Logging Service. Feb 2 08:00:39 np0005604725 systemd[1]: Starting System Logging Service... Feb 2 08:00:39 np0005604725 rsyslogd[48053]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="48053" x-info="https://www.rsyslog.com"] start Feb 2 08:00:39 np0005604725 systemd[1]: Started System Logging Service. Feb 2 08:00:39 np0005604725 rsyslogd[48053]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Feb 2 08:00:39 np0005604725 python3[48072]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:00:41 np0005604725 ansible-async_wrapper.py[48244]: Invoked with 547571650719 3600 /home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019240.8535879-117084-33772991943588/AnsiballZ_command.py _ Feb 2 08:00:41 np0005604725 ansible-async_wrapper.py[48247]: Starting module and watcher Feb 2 08:00:41 np0005604725 ansible-async_wrapper.py[48247]: Start watching 48248 (3600) Feb 2 08:00:41 np0005604725 ansible-async_wrapper.py[48248]: Start module (48248) Feb 2 08:00:41 np0005604725 ansible-async_wrapper.py[48244]: Return async_wrapper task started. Feb 2 08:00:41 np0005604725 python3[48268]: ansible-ansible.legacy.async_status Invoked with jid=547571650719.48244 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:00:46 np0005604725 ansible-async_wrapper.py[48247]: 48248 still running (3600) Feb 2 08:00:47 np0005604725 puppet-user[48266]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:00:47 np0005604725 puppet-user[48266]: (file: /etc/puppet/hiera.yaml) Feb 2 08:00:47 np0005604725 puppet-user[48266]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:00:47 np0005604725 puppet-user[48266]: (file & line not available) Feb 2 08:00:47 np0005604725 puppet-user[48266]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:00:47 np0005604725 puppet-user[48266]: (file & line not available) Feb 2 08:00:47 np0005604725 puppet-user[48266]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/database/mysql/client.pp, line: 89, column: 8) Feb 2 08:00:47 np0005604725 puppet-user[48266]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/packages.pp, line: 39, column: 69) Feb 2 08:00:47 np0005604725 puppet-user[48266]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.39 seconds Feb 2 08:00:47 np0005604725 sssd_nss[38712]: Enumeration requested but not enabled Feb 2 08:00:47 np0005604725 puppet-user[48266]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Exec[directory-create-etc-my.cnf.d]/returns: executed successfully Feb 2 08:00:47 np0005604725 puppet-user[48266]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Feb 2 08:00:47 np0005604725 puppet-user[48266]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Feb 2 08:00:51 np0005604725 ansible-async_wrapper.py[48247]: 48248 still running (3595) Feb 2 08:00:52 np0005604725 python3[48409]: ansible-ansible.legacy.async_status Invoked with jid=547571650719.48244 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:00:56 np0005604725 ansible-async_wrapper.py[48247]: 48248 still running (3590) Feb 2 08:00:58 np0005604725 dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Feb 2 08:00:59 np0005604725 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 2 08:00:59 np0005604725 systemd[1]: Starting man-db-cache-update.service... Feb 2 08:00:59 np0005604725 systemd[1]: Reloading. Feb 2 08:00:59 np0005604725 systemd-rc-local-generator[48601]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:00:59 np0005604725 systemd-sysv-generator[48607]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:00:59 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:00:59 np0005604725 systemd[1]: Queuing reload/restart jobs for marked units… Feb 2 08:01:01 np0005604725 ansible-async_wrapper.py[48247]: 48248 still running (3585) Feb 2 08:01:01 np0005604725 systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 2 08:01:01 np0005604725 systemd[1]: Finished man-db-cache-update.service. Feb 2 08:01:01 np0005604725 systemd[1]: man-db-cache-update.service: Consumed 1.819s CPU time. Feb 2 08:01:01 np0005604725 systemd[1]: run-rc424e9fac0454ee28ae106ddf5bbe3f3.service: Deactivated successfully. Feb 2 08:01:01 np0005604725 rhsm-service[6573]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Feb 2 08:01:01 np0005604725 puppet-user[48266]: Notice: /Stage[main]/Pacemaker::Install/Package[pacemaker]/ensure: created Feb 2 08:01:02 np0005604725 python3[50305]: ansible-ansible.legacy.async_status Invoked with jid=547571650719.48244 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:01:06 np0005604725 ansible-async_wrapper.py[48247]: 48248 still running (3580) Feb 2 08:01:07 np0005604725 systemd[1]: Reloading. Feb 2 08:01:07 np0005604725 systemd-sysv-generator[50355]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:01:07 np0005604725 systemd-rc-local-generator[50350]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:01:07 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:01:07 np0005604725 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 2 08:01:07 np0005604725 systemd[1]: Starting man-db-cache-update.service... Feb 2 08:01:07 np0005604725 systemd[1]: Reloading. Feb 2 08:01:07 np0005604725 systemd-rc-local-generator[50404]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:01:07 np0005604725 systemd-sysv-generator[50408]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:01:07 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:01:08 np0005604725 systemd[1]: Queuing reload/restart jobs for marked units… Feb 2 08:01:08 np0005604725 systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 2 08:01:08 np0005604725 systemd[1]: Finished man-db-cache-update.service. Feb 2 08:01:08 np0005604725 systemd[1]: run-r44f4002d80b34de7acd79a2b17d10c43.service: Deactivated successfully. Feb 2 08:01:09 np0005604725 puppet-user[48266]: Notice: /Stage[main]/Pacemaker::Install/Package[pcs]/ensure: created Feb 2 08:01:09 np0005604725 systemd[1]: Reloading. Feb 2 08:01:09 np0005604725 systemd-rc-local-generator[50527]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:01:09 np0005604725 systemd-sysv-generator[50532]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:01:09 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:01:09 np0005604725 systemd[1]: Reloading. Feb 2 08:01:09 np0005604725 systemd-rc-local-generator[50564]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:01:09 np0005604725 systemd-sysv-generator[50569]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:01:09 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:01:09 np0005604725 puppet-user[48266]: Notice: /Stage[main]/Pacemaker::Service/Service[corosync]/enable: enable changed 'false' to 'true' Feb 2 08:01:09 np0005604725 systemd[1]: Reloading. Feb 2 08:01:09 np0005604725 systemd-rc-local-generator[50601]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:01:09 np0005604725 systemd-sysv-generator[50606]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:01:09 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:01:10 np0005604725 systemd[1]: Reloading. Feb 2 08:01:10 np0005604725 systemd-sysv-generator[50638]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:01:10 np0005604725 systemd-rc-local-generator[50635]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:01:10 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:01:10 np0005604725 puppet-user[48266]: Notice: /Stage[main]/Pacemaker::Service/Service[pacemaker]/enable: enable changed 'false' to 'true' Feb 2 08:01:10 np0005604725 puppet-user[48266]: Notice: /Stage[main]/Pacemaker::Corosync/File_line[pcsd_bind_addr]/ensure: created Feb 2 08:01:10 np0005604725 puppet-user[48266]: Notice: /Stage[main]/Pacemaker::Corosync/User[hacluster]/password: changed [redacted] to [redacted] Feb 2 08:01:10 np0005604725 puppet-user[48266]: Notice: /Stage[main]/Pacemaker::Corosync/User[hacluster]/groups: groups changed to ['haclient'] Feb 2 08:01:10 np0005604725 systemd[1]: Reloading. Feb 2 08:01:10 np0005604725 systemd-rc-local-generator[50688]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:01:10 np0005604725 systemd-sysv-generator[50691]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:01:11 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:01:11 np0005604725 systemd[1]: Starting PCS GUI and remote configuration interface (Ruby)... Feb 2 08:01:11 np0005604725 ansible-async_wrapper.py[48247]: 48248 still running (3575) Feb 2 08:01:11 np0005604725 pcsd[50701]: 2026-02-02 08:01:11 +0000 INFO Notifying systemd we are running (socket /run/systemd/notify) Feb 2 08:01:11 np0005604725 systemd[1]: Started PCS GUI and remote configuration interface (Ruby). Feb 2 08:01:11 np0005604725 systemd[1]: Starting PCS GUI and remote configuration interface... Feb 2 08:01:12 np0005604725 python3[50746]: ansible-ansible.legacy.async_status Invoked with jid=547571650719.48244 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:01:13 np0005604725 systemd[1]: Started PCS GUI and remote configuration interface. Feb 2 08:01:13 np0005604725 systemd[1]: Reloading. Feb 2 08:01:13 np0005604725 systemd-rc-local-generator[50841]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:01:13 np0005604725 systemd-sysv-generator[50845]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:01:13 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:01:13 np0005604725 systemd[1]: Reloading. Feb 2 08:01:13 np0005604725 systemd-sysv-generator[50885]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:01:13 np0005604725 systemd-rc-local-generator[50880]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:01:13 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:01:13 np0005604725 puppet-user[48266]: Notice: /Stage[main]/Pacemaker::Service/Service[pcsd]/ensure: ensure changed 'stopped' to 'running' Feb 2 08:01:14 np0005604725 puppet-user[48266]: Notice: /Stage[main]/Pacemaker::Corosync/Exec[check-for-local-authentication]/returns: executed successfully Feb 2 08:01:15 np0005604725 puppet-user[48266]: Notice: /Stage[main]/Pacemaker::Corosync/Exec[reauthenticate-across-all-nodes]: Triggered 'refresh' from 3 events Feb 2 08:01:16 np0005604725 ansible-async_wrapper.py[48247]: 48248 still running (3570) Feb 2 08:01:21 np0005604725 ansible-async_wrapper.py[48247]: 48248 still running (3565) Feb 2 08:01:21 np0005604725 systemd[1]: Reloading. Feb 2 08:01:21 np0005604725 systemd-rc-local-generator[50972]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:01:21 np0005604725 systemd-sysv-generator[50979]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:01:21 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:01:21 np0005604725 systemd[1]: Reloading. Feb 2 08:01:21 np0005604725 systemd-sysv-generator[51011]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:01:21 np0005604725 systemd-rc-local-generator[51007]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:01:21 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:01:23 np0005604725 python3[51044]: ansible-ansible.legacy.async_status Invoked with jid=547571650719.48244 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:01:24 np0005604725 systemd[1]: Starting Corosync Cluster Engine... Feb 2 08:01:24 np0005604725 corosync[51047]: [MAIN ] Corosync Cluster Engine 3.1.7 starting up Feb 2 08:01:24 np0005604725 corosync[51047]: [MAIN ] Corosync built-in features: dbus systemd xmlconf vqsim nozzle snmp pie relro bindnow Feb 2 08:01:24 np0005604725 corosync[51047]: [TOTEM ] Initializing transport (Kronosnet). Feb 2 08:01:24 np0005604725 corosync[51047]: [TOTEM ] totemknet initialized Feb 2 08:01:24 np0005604725 corosync[51047]: [KNET ] pmtud: MTU manually set to: 0 Feb 2 08:01:24 np0005604725 corosync[51047]: [KNET ] common: crypto_nss.so has been loaded from /usr/lib64/kronosnet/crypto_nss.so Feb 2 08:01:24 np0005604725 corosync[51047]: [SERV ] Service engine loaded: corosync configuration map access [0] Feb 2 08:01:24 np0005604725 corosync[51047]: [QB ] server name: cmap Feb 2 08:01:24 np0005604725 corosync[51047]: [SERV ] Service engine loaded: corosync configuration service [1] Feb 2 08:01:24 np0005604725 corosync[51047]: [QB ] server name: cfg Feb 2 08:01:24 np0005604725 corosync[51047]: [SERV ] Service engine loaded: corosync cluster closed process group service v1.01 [2] Feb 2 08:01:24 np0005604725 corosync[51047]: [QB ] server name: cpg Feb 2 08:01:24 np0005604725 corosync[51047]: [SERV ] Service engine loaded: corosync profile loading service [4] Feb 2 08:01:24 np0005604725 corosync[51047]: [QUORUM] Using quorum provider corosync_votequorum Feb 2 08:01:24 np0005604725 corosync[51047]: [SERV ] Service engine loaded: corosync vote quorum service v1.0 [5] Feb 2 08:01:24 np0005604725 corosync[51047]: [QB ] server name: votequorum Feb 2 08:01:24 np0005604725 corosync[51047]: [SERV ] Service engine loaded: corosync cluster quorum service v0.1 [3] Feb 2 08:01:24 np0005604725 corosync[51047]: [QB ] server name: quorum Feb 2 08:01:24 np0005604725 corosync[51047]: [TOTEM ] Configuring link 0 Feb 2 08:01:24 np0005604725 corosync[51047]: [TOTEM ] Configured link number 0: local addr: 172.17.0.104, port=5405 Feb 2 08:01:24 np0005604725 corosync[51047]: [KNET ] host: host: 1 (passive) best link: 0 (pri: 1) Feb 2 08:01:24 np0005604725 corosync[51047]: [KNET ] host: host: 1 has no active links Feb 2 08:01:24 np0005604725 corosync[51047]: [KNET ] host: host: 1 (passive) best link: 0 (pri: 1) Feb 2 08:01:24 np0005604725 corosync[51047]: [KNET ] host: host: 1 has no active links Feb 2 08:01:24 np0005604725 corosync[51047]: [KNET ] host: host: 1 (passive) best link: 0 (pri: 1) Feb 2 08:01:24 np0005604725 corosync[51047]: [KNET ] host: host: 1 has no active links Feb 2 08:01:24 np0005604725 corosync[51047]: [KNET ] link: Resetting MTU for link 0 because host 2 joined Feb 2 08:01:24 np0005604725 corosync[51047]: [KNET ] host: host: 3 (passive) best link: 0 (pri: 1) Feb 2 08:01:24 np0005604725 corosync[51047]: [KNET ] host: host: 3 has no active links Feb 2 08:01:24 np0005604725 corosync[51047]: [KNET ] host: host: 3 (passive) best link: 0 (pri: 1) Feb 2 08:01:24 np0005604725 corosync[51047]: [KNET ] host: host: 3 has no active links Feb 2 08:01:24 np0005604725 corosync[51047]: [KNET ] host: host: 3 (passive) best link: 0 (pri: 1) Feb 2 08:01:24 np0005604725 corosync[51047]: [KNET ] host: host: 3 has no active links Feb 2 08:01:24 np0005604725 corosync[51047]: [QUORUM] Sync members[1]: 2 Feb 2 08:01:24 np0005604725 corosync[51047]: [QUORUM] Sync joined[1]: 2 Feb 2 08:01:24 np0005604725 corosync[51047]: [TOTEM ] A new membership (2.5) was formed. Members joined: 2 Feb 2 08:01:24 np0005604725 corosync[51047]: [QUORUM] Members[1]: 2 Feb 2 08:01:24 np0005604725 corosync[51047]: [MAIN ] Completed service synchronization, ready to provide service. Feb 2 08:01:24 np0005604725 systemd[1]: Started Corosync Cluster Engine. Feb 2 08:01:24 np0005604725 systemd[1]: Reached target resource-agents dependencies. Feb 2 08:01:24 np0005604725 systemd[1]: Started Pacemaker High Availability Cluster Manager. Feb 2 08:01:24 np0005604725 pacemakerd[51059]: notice: Additional logging available in /var/log/pacemaker/pacemaker.log Feb 2 08:01:24 np0005604725 pacemakerd[51059]: notice: Starting Pacemaker 2.1.5-9.el9_2.4 Feb 2 08:01:24 np0005604725 pacemakerd[51059]: notice: Pacemaker daemon successfully started and accepting connections Feb 2 08:01:24 np0005604725 pacemaker-fenced[51061]: notice: Additional logging available in /var/log/pacemaker/pacemaker.log Feb 2 08:01:24 np0005604725 pacemaker-fenced[51061]: notice: Starting Pacemaker fencer Feb 2 08:01:24 np0005604725 pacemaker-fenced[51061]: notice: Connecting to corosync cluster infrastructure Feb 2 08:01:24 np0005604725 pacemaker-execd[51062]: notice: Additional logging available in /var/log/pacemaker/pacemaker.log Feb 2 08:01:24 np0005604725 pacemaker-execd[51062]: notice: Starting Pacemaker local executor Feb 2 08:01:24 np0005604725 pacemaker-execd[51062]: notice: Pacemaker local executor successfully started and accepting connections Feb 2 08:01:24 np0005604725 pacemaker-execd[51062]: notice: OCF resource agent search path is /usr/lib/ocf/resource.d Feb 2 08:01:24 np0005604725 pacemaker-based[51060]: notice: Additional logging available in /var/log/pacemaker/pacemaker.log Feb 2 08:01:24 np0005604725 pacemaker-based[51060]: notice: Starting Pacemaker CIB manager Feb 2 08:01:24 np0005604725 pacemaker-based[51060]: notice: /var/lib/pacemaker/cib/cib.xml not found: No such file or directory Feb 2 08:01:24 np0005604725 pacemaker-based[51060]: notice: /var/lib/pacemaker/cib/cib.xml.sig not found: No such file or directory Feb 2 08:01:24 np0005604725 pacemaker-attrd[51063]: notice: Additional logging available in /var/log/pacemaker/pacemaker.log Feb 2 08:01:24 np0005604725 pacemaker-based[51060]: warning: Could not verify cluster configuration file /var/lib/pacemaker/cib/cib.xml: No such file or directory (2) Feb 2 08:01:24 np0005604725 pacemaker-based[51060]: warning: Primary configuration corrupt or unusable, trying backups in /var/lib/pacemaker/cib Feb 2 08:01:24 np0005604725 pacemaker-based[51060]: warning: Continuing with an empty configuration. Feb 2 08:01:24 np0005604725 pacemaker-attrd[51063]: notice: Starting Pacemaker node attribute manager Feb 2 08:01:24 np0005604725 pacemaker-schedulerd[51064]: notice: Starting Pacemaker scheduler Feb 2 08:01:24 np0005604725 pacemaker-schedulerd[51064]: notice: Pacemaker scheduler successfully started and accepting connections Feb 2 08:01:24 np0005604725 pacemaker-controld[51065]: notice: Additional logging available in /var/log/pacemaker/pacemaker.log Feb 2 08:01:24 np0005604725 pacemaker-controld[51065]: notice: Starting Pacemaker controller Feb 2 08:01:24 np0005604725 pacemaker-fenced[51061]: notice: Node np0005604725 state is now member Feb 2 08:01:24 np0005604725 pacemaker-based[51060]: notice: Connecting to corosync cluster infrastructure Feb 2 08:01:24 np0005604725 pacemaker-based[51060]: notice: Node np0005604725 state is now member Feb 2 08:01:24 np0005604725 pacemaker-based[51060]: notice: Pacemaker CIB manager successfully started and accepting connections Feb 2 08:01:24 np0005604725 pacemaker-based[51066]: warning: Could not verify cluster configuration file /var/lib/pacemaker/cib/cib.xml: No such file or directory (2) Feb 2 08:01:25 np0005604725 pacemaker-attrd[51063]: notice: Connecting to corosync cluster infrastructure Feb 2 08:01:25 np0005604725 pacemaker-controld[51065]: notice: Connecting to corosync cluster infrastructure Feb 2 08:01:25 np0005604725 pacemaker-fenced[51061]: notice: Pacemaker fencer successfully started and accepting connections Feb 2 08:01:25 np0005604725 pacemaker-attrd[51063]: notice: Node np0005604725 state is now member Feb 2 08:01:25 np0005604725 pacemaker-attrd[51063]: notice: Pacemaker node attribute manager successfully started and accepting connections Feb 2 08:01:25 np0005604725 pacemaker-attrd[51063]: notice: Setting #attrd-protocol[np0005604725]: (unset) -> 5 Feb 2 08:01:25 np0005604725 pacemaker-attrd[51063]: notice: Recorded local node as attribute writer (was unset) Feb 2 08:01:25 np0005604725 pacemaker-controld[51065]: warning: No quorum Feb 2 08:01:25 np0005604725 pacemaker-controld[51065]: notice: Node np0005604725 state is now member Feb 2 08:01:25 np0005604725 pacemaker-controld[51065]: notice: Pacemaker controller successfully started and accepting connections Feb 2 08:01:25 np0005604725 pacemaker-controld[51065]: notice: State transition S_STARTING -> S_PENDING Feb 2 08:01:26 np0005604725 ansible-async_wrapper.py[48247]: 48248 still running (3560) Feb 2 08:01:26 np0005604725 pacemaker-controld[51065]: notice: Fencer successfully connected Feb 2 08:01:30 np0005604725 corosync[51047]: [KNET ] rx: host: 3 link: 0 is up Feb 2 08:01:30 np0005604725 corosync[51047]: [KNET ] link: Resetting MTU for link 0 because host 3 joined Feb 2 08:01:30 np0005604725 corosync[51047]: [KNET ] rx: host: 1 link: 0 is up Feb 2 08:01:30 np0005604725 corosync[51047]: [KNET ] link: Resetting MTU for link 0 because host 1 joined Feb 2 08:01:30 np0005604725 corosync[51047]: [KNET ] host: host: 3 (passive) best link: 0 (pri: 1) Feb 2 08:01:30 np0005604725 corosync[51047]: [KNET ] host: host: 1 (passive) best link: 0 (pri: 1) Feb 2 08:01:30 np0005604725 corosync[51047]: [KNET ] pmtud: PMTUD link change for host: 3 link: 0 from 469 to 1397 Feb 2 08:01:30 np0005604725 corosync[51047]: [KNET ] pmtud: PMTUD link change for host: 1 link: 0 from 469 to 1397 Feb 2 08:01:30 np0005604725 corosync[51047]: [KNET ] pmtud: Global data MTU changed to: 1397 Feb 2 08:01:30 np0005604725 corosync[51047]: [QUORUM] Sync members[3]: 1 2 3 Feb 2 08:01:30 np0005604725 corosync[51047]: [QUORUM] Sync joined[2]: 1 3 Feb 2 08:01:30 np0005604725 corosync[51047]: [TOTEM ] A new membership (1.9) was formed. Members joined: 1 3 Feb 2 08:01:30 np0005604725 pacemaker-fenced[51061]: notice: Node np0005604723 state is now member Feb 2 08:01:30 np0005604725 pacemaker-attrd[51063]: notice: Node np0005604723 state is now member Feb 2 08:01:30 np0005604725 corosync[51047]: [QUORUM] This node is within the primary component and will provide service. Feb 2 08:01:30 np0005604725 corosync[51047]: [QUORUM] Members[3]: 1 2 3 Feb 2 08:01:30 np0005604725 corosync[51047]: [MAIN ] Completed service synchronization, ready to provide service. Feb 2 08:01:30 np0005604725 pacemaker-controld[51065]: notice: Quorum acquired Feb 2 08:01:30 np0005604725 pacemaker-based[51060]: notice: Node np0005604723 state is now member Feb 2 08:01:30 np0005604725 pacemaker-controld[51065]: notice: Node np0005604723 state is now member Feb 2 08:01:30 np0005604725 pacemaker-controld[51065]: notice: Node np0005604726 state is now member Feb 2 08:01:30 np0005604725 pacemaker-attrd[51063]: notice: Node np0005604726 state is now member Feb 2 08:01:30 np0005604725 pacemaker-fenced[51061]: notice: Node np0005604726 state is now member Feb 2 08:01:30 np0005604725 pacemaker-based[51060]: notice: Node np0005604726 state is now member Feb 2 08:01:30 np0005604725 pacemaker-attrd[51063]: notice: Detected another attribute writer (np0005604726), starting new election Feb 2 08:01:30 np0005604725 pacemaker-attrd[51063]: notice: Setting #attrd-protocol[np0005604726]: (unset) -> 5 Feb 2 08:01:30 np0005604725 pacemaker-attrd[51063]: notice: Recorded new attribute writer: np0005604723 (was unset) Feb 2 08:01:30 np0005604725 pacemaker-attrd[51063]: notice: Setting #attrd-protocol[np0005604723]: (unset) -> 5 Feb 2 08:01:30 np0005604725 pacemaker-attrd[51063]: notice: Recorded local node as attribute writer (was unset) Feb 2 08:01:31 np0005604725 ansible-async_wrapper.py[48247]: 48248 still running (3555) Feb 2 08:01:33 np0005604725 python3[51100]: ansible-ansible.legacy.async_status Invoked with jid=547571650719.48244 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:01:36 np0005604725 ansible-async_wrapper.py[48247]: 48248 still running (3550) Feb 2 08:01:41 np0005604725 ansible-async_wrapper.py[48247]: 48248 still running (3545) Feb 2 08:01:43 np0005604725 python3[51133]: ansible-ansible.legacy.async_status Invoked with jid=547571650719.48244 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:01:46 np0005604725 ansible-async_wrapper.py[48247]: 48248 still running (3540) Feb 2 08:01:46 np0005604725 pacemaker-controld[51065]: notice: Cluster does not have watchdog fencing device Feb 2 08:01:46 np0005604725 pacemaker-controld[51065]: notice: Cluster does not have watchdog fencing device Feb 2 08:01:46 np0005604725 pacemaker-controld[51065]: notice: Cluster does not have watchdog fencing device Feb 2 08:01:46 np0005604725 pacemaker-controld[51065]: notice: State transition S_PENDING -> S_NOT_DC Feb 2 08:01:46 np0005604725 pacemaker-attrd[51063]: notice: Setting #feature-set[np0005604726]: (unset) -> 3.16.2 Feb 2 08:01:46 np0005604725 pacemaker-attrd[51063]: notice: Setting #feature-set[np0005604723]: (unset) -> 3.16.2 Feb 2 08:01:46 np0005604725 pacemaker-attrd[51063]: notice: Setting #feature-set[np0005604725]: (unset) -> 3.16.2 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Notice: /Stage[main]/Pacemaker::Corosync/Exec[wait-for-settle]/returns: executed successfully Feb 2 08:01:48 np0005604725 puppet-user[48266]: Notice: Applied catalog in 61.23 seconds Feb 2 08:01:48 np0005604725 puppet-user[48266]: Application: Feb 2 08:01:48 np0005604725 puppet-user[48266]: Initial environment: production Feb 2 08:01:48 np0005604725 puppet-user[48266]: Converged environment: production Feb 2 08:01:48 np0005604725 puppet-user[48266]: Run mode: user Feb 2 08:01:48 np0005604725 puppet-user[48266]: Changes: Feb 2 08:01:48 np0005604725 puppet-user[48266]: Total: 14 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Events: Feb 2 08:01:48 np0005604725 puppet-user[48266]: Success: 14 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Total: 14 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Resources: Feb 2 08:01:48 np0005604725 puppet-user[48266]: Restarted: 1 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Changed: 13 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Out of sync: 13 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Total: 23 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Time: Feb 2 08:01:48 np0005604725 puppet-user[48266]: Filebucket: 0.00 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Schedule: 0.00 Feb 2 08:01:48 np0005604725 puppet-user[48266]: File: 0.00 Feb 2 08:01:48 np0005604725 puppet-user[48266]: File line: 0.00 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Augeas: 0.02 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Config retrieval: 0.44 Feb 2 08:01:48 np0005604725 puppet-user[48266]: User: 0.56 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Last run: 1770019308 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Package: 21.63 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Service: 3.80 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Exec: 33.93 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Transaction evaluation: 61.23 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Catalog application: 61.23 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Total: 61.24 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Version: Feb 2 08:01:48 np0005604725 puppet-user[48266]: Config: 1770019247 Feb 2 08:01:48 np0005604725 puppet-user[48266]: Puppet: 7.10.0 Feb 2 08:01:48 np0005604725 ansible-async_wrapper.py[48248]: Module complete (48248) Feb 2 08:01:51 np0005604725 ansible-async_wrapper.py[48247]: Done in kid B. Feb 2 08:01:52 np0005604725 pacemaker-controld[51065]: notice: Cluster does not have watchdog fencing device Feb 2 08:01:53 np0005604725 python3[51169]: ansible-ansible.legacy.async_status Invoked with jid=547571650719.48244 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:01:54 np0005604725 python3[51185]: ansible-file Invoked with path=/var/lib/container-puppet/puppetlabs state=directory setype=svirt_sandbox_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Feb 2 08:01:54 np0005604725 python3[51201]: ansible-stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:01:55 np0005604725 python3[51249]: ansible-ansible.legacy.stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:01:56 np0005604725 python3[51292]: ansible-ansible.legacy.copy Invoked with dest=/var/lib/container-puppet/puppetlabs/facter.conf setype=svirt_sandbox_file_t selevel=s0 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019315.1933546-118303-51297624245030/source _original_basename=tmpvpmx9v1g follow=False checksum=53908622cb869db5e2e2a68e737aa2ab1a872111 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None attributes=None Feb 2 08:01:56 np0005604725 python3[51322]: ansible-file Invoked with path=/opt/puppetlabs/facter state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:01:57 np0005604725 python3[51425]: ansible-ansible.posix.synchronize Invoked with src=/opt/puppetlabs/ dest=/var/lib/container-puppet/puppetlabs/ _local_rsync_path=rsync _local_rsync_password=NOT_LOGGING_PARAMETER rsync_path=None delete=False _substitute_controller=False archive=True checksum=False compress=True existing_only=False dirs=False copy_links=False set_remote_user=True rsync_timeout=0 rsync_opts=[] ssh_connection_multiplexing=False partial=False verify_host=False mode=push dest_port=None private_key=None recursive=None links=None perms=None times=None owner=None group=None ssh_args=None link_dest=None Feb 2 08:01:58 np0005604725 python3[51444]: ansible-file Invoked with path=/var/lib/tripleo-config/container-puppet-config mode=448 recurse=True setype=container_file_t force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False state=None _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Feb 2 08:01:58 np0005604725 python3[51460]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=False puppet_config=/var/lib/container-puppet/container-puppet.json short_hostname=np0005604725 step=1 update_config_hash_only=False Feb 2 08:01:59 np0005604725 python3[51476]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:01:59 np0005604725 python3[51492]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_1 config_pattern=container-puppet-*.json config_overrides={} debug=True Feb 2 08:02:00 np0005604725 python3[51508]: ansible-containers.podman.podman_container_info Invoked with executable=podman name=None Feb 2 08:02:00 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:02:01 np0005604725 python3[51535]: ansible-tripleo_container_manage Invoked with config_id=tripleo_puppet_step1 config_dir=/var/lib/tripleo-config/container-puppet-config/step_1 config_patterns=container-puppet-*.json config_overrides={} concurrency=6 log_base_path=/var/log/containers/stdouts debug=False Feb 2 08:02:01 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:02:01 np0005604725 podman[51710]: 2026-02-02 08:02:01.348984888 +0000 UTC m=+0.074002563 container create f1267aa62f1e87b1360b6d6bd82f119b51bcf95a61a5ffa2571394882d084a3a (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, container_name=container-puppet-clustercheck, com.redhat.component=openstack-mariadb-container, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:18Z, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.buildah.version=1.41.5, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20260112.1, architecture=x86_64, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., vcs-type=git, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:02:01 np0005604725 podman[51757]: 2026-02-02 08:02:01.380931046 +0000 UTC m=+0.066563240 container create 9d358baf14d9745005b55ead401bfbeb8ef8d4790807169a59b7445164ac9850 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:34:42Z, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., io.buildah.version=1.41.5, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, version=17.1.13, container_name=container-puppet-glance_api, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-glance-api, com.redhat.component=openstack-glance-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, architecture=x86_64, batch=17.1_20260112.1, io.openshift.expose-services=, config_id=tripleo_puppet_step1) Feb 2 08:02:01 np0005604725 systemd[1]: Created slice Slice /machine. Feb 2 08:02:01 np0005604725 systemd[1]: Started libpod-conmon-f1267aa62f1e87b1360b6d6bd82f119b51bcf95a61a5ffa2571394882d084a3a.scope. Feb 2 08:02:01 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:01 np0005604725 podman[51710]: 2026-02-02 08:02:01.309465903 +0000 UTC m=+0.034483588 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Feb 2 08:02:01 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6a5556c0a8e9917296b86a294ecb5a79e531f39a07b3c5078babb7c5394805ee/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:01 np0005604725 podman[51732]: 2026-02-02 08:02:01.411418617 +0000 UTC m=+0.128696678 container create 64b76da43ee7d614703bb4984b0c16b3e75f98e53eb8540a3137b7f77023568a (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, io.buildah.version=1.41.5, release=1766032510, container_name=container-puppet-cinder, maintainer=OpenStack TripleO Team, tcib_managed=true, config_id=tripleo_puppet_step1, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, distribution-scope=public, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:58:44Z, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-cinder-api, vcs-type=git, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 cinder-api, batch=17.1_20260112.1, com.redhat.component=openstack-cinder-api-container, build-date=2026-01-12T22:58:44Z, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:02:01 np0005604725 podman[51732]: 2026-02-02 08:02:01.323155754 +0000 UTC m=+0.040433815 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Feb 2 08:02:01 np0005604725 systemd[1]: Started libpod-conmon-9d358baf14d9745005b55ead401bfbeb8ef8d4790807169a59b7445164ac9850.scope. Feb 2 08:02:01 np0005604725 podman[51710]: 2026-02-02 08:02:01.437687895 +0000 UTC m=+0.162705570 container init f1267aa62f1e87b1360b6d6bd82f119b51bcf95a61a5ffa2571394882d084a3a (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, architecture=x86_64, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-mariadb-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, name=rhosp-rhel9/openstack-mariadb, batch=17.1_20260112.1, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:18Z, description=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:18Z, container_name=container-puppet-clustercheck) Feb 2 08:02:01 np0005604725 podman[51747]: 2026-02-02 08:02:01.340598024 +0000 UTC m=+0.040373723 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:02:01 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:01 np0005604725 systemd[1]: Started libpod-conmon-64b76da43ee7d614703bb4984b0c16b3e75f98e53eb8540a3137b7f77023568a.scope. Feb 2 08:02:01 np0005604725 podman[51757]: 2026-02-02 08:02:01.341080519 +0000 UTC m=+0.026712733 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:02:01 np0005604725 podman[51760]: 2026-02-02 08:02:01.444450218 +0000 UTC m=+0.125241529 container create 5c64bf47f5a600fef19e6ace0673195b7b19663e9a896931433d27e84a6c1394 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, vendor=Red Hat, Inc., url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, release=1766032510, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:15Z, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:15Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, tcib_managed=true, com.redhat.component=openstack-collectd-container, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, container_name=container-puppet-collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp-rhel9/openstack-collectd, summary=Red Hat OpenStack Platform 17.1 collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:02:01 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/fdc8681b4904b43de5be680c65312743baa04dbf89a1d99d8561cb544923f5ec/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:01 np0005604725 podman[51760]: 2026-02-02 08:02:01.348207354 +0000 UTC m=+0.028998665 image pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Feb 2 08:02:01 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:01 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/16805547cbfa33f9b7fe16353a9e10ff753ec00bf4347ea3e3af6bdfc1b4a963/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:01 np0005604725 podman[51757]: 2026-02-02 08:02:01.452367878 +0000 UTC m=+0.138000082 container init 9d358baf14d9745005b55ead401bfbeb8ef8d4790807169a59b7445164ac9850 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, tcib_managed=true, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, managed_by=tripleo_ansible, container_name=container-puppet-glance_api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., release=1766032510, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, com.redhat.component=openstack-glance-api-container, build-date=2026-01-12T22:34:42Z, name=rhosp-rhel9/openstack-glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Feb 2 08:02:01 np0005604725 podman[51772]: 2026-02-02 08:02:01.465786991 +0000 UTC m=+0.129888655 container create e9144651b3b8404825bd3cd23f9cc8c53edf7c7dd919da828070f0cdc7029095 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.5, url=https://www.redhat.com, architecture=x86_64, name=rhosp-rhel9/openstack-ceilometer-central, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vcs-type=git, com.redhat.component=openstack-ceilometer-central-container, tcib_managed=true, managed_by=tripleo_ansible, release=1766032510, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, build-date=2026-01-12T23:07:24Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 ceilometer-central, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, org.opencontainers.image.created=2026-01-12T23:07:24Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, config_id=tripleo_puppet_step1, container_name=container-puppet-ceilometer, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., version=17.1.13, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:02:01 np0005604725 systemd[1]: Started libpod-conmon-5c64bf47f5a600fef19e6ace0673195b7b19663e9a896931433d27e84a6c1394.scope. Feb 2 08:02:01 np0005604725 systemd[1]: Started libpod-conmon-e9144651b3b8404825bd3cd23f9cc8c53edf7c7dd919da828070f0cdc7029095.scope. Feb 2 08:02:01 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:01 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:01 np0005604725 podman[51710]: 2026-02-02 08:02:01.49808969 +0000 UTC m=+0.223107385 container start f1267aa62f1e87b1360b6d6bd82f119b51bcf95a61a5ffa2571394882d084a3a (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:18Z, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, maintainer=OpenStack TripleO Team, tcib_managed=true, container_name=container-puppet-clustercheck, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, com.redhat.component=openstack-mariadb-container, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, url=https://www.redhat.com, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., distribution-scope=public, version=17.1.13, description=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:02:01 np0005604725 podman[51710]: 2026-02-02 08:02:01.498272276 +0000 UTC m=+0.223289971 container attach f1267aa62f1e87b1360b6d6bd82f119b51bcf95a61a5ffa2571394882d084a3a (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, release=1766032510, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, build-date=2026-01-12T22:10:18Z, name=rhosp-rhel9/openstack-mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, url=https://www.redhat.com, version=17.1.13, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., vcs-type=git, container_name=container-puppet-clustercheck, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:18Z, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:02:01 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/de8c170a424e6cdd130287e6dbb4dfd6121c2ff245d0bcfe980fa154a44fadd9/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:01 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/63a5bf8195bc53acb7a879b91e71e41d799ad1d1d4f1557b1eaad41698f8d934/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:01 np0005604725 podman[51760]: 2026-02-02 08:02:01.506290448 +0000 UTC m=+0.187081769 container init 5c64bf47f5a600fef19e6ace0673195b7b19663e9a896931433d27e84a6c1394 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, io.openshift.expose-services=, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.buildah.version=1.41.5, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, build-date=2026-01-12T22:10:15Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, name=rhosp-rhel9/openstack-collectd, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 collectd, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 collectd, version=17.1.13, managed_by=tripleo_ansible, tcib_managed=true, com.redhat.component=openstack-collectd-container, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, release=1766032510, vcs-type=git, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:15Z, url=https://www.redhat.com, config_id=tripleo_puppet_step1) Feb 2 08:02:01 np0005604725 podman[51732]: 2026-02-02 08:02:01.511566234 +0000 UTC m=+0.228844295 container init 64b76da43ee7d614703bb4984b0c16b3e75f98e53eb8540a3137b7f77023568a (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, vcs-type=git, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, architecture=x86_64, version=17.1.13, managed_by=tripleo_ansible, build-date=2026-01-12T22:58:44Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 cinder-api, container_name=container-puppet-cinder, batch=17.1_20260112.1, distribution-scope=public, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-cinder-api-container, name=rhosp-rhel9/openstack-cinder-api, vendor=Red Hat, Inc., tcib_managed=true) Feb 2 08:02:01 np0005604725 podman[51732]: 2026-02-02 08:02:01.520187336 +0000 UTC m=+0.237465407 container start 64b76da43ee7d614703bb4984b0c16b3e75f98e53eb8540a3137b7f77023568a (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, com.redhat.component=openstack-cinder-api-container, org.opencontainers.image.created=2026-01-12T22:58:44Z, maintainer=OpenStack TripleO Team, release=1766032510, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, distribution-scope=public, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, vcs-type=git, container_name=container-puppet-cinder, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, build-date=2026-01-12T22:58:44Z, batch=17.1_20260112.1, io.openshift.expose-services=, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc.) Feb 2 08:02:01 np0005604725 podman[51732]: 2026-02-02 08:02:01.520425433 +0000 UTC m=+0.237703584 container attach 64b76da43ee7d614703bb4984b0c16b3e75f98e53eb8540a3137b7f77023568a (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, io.openshift.expose-services=, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:58:44Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.13, com.redhat.component=openstack-cinder-api-container, build-date=2026-01-12T22:58:44Z, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 cinder-api, release=1766032510, io.buildah.version=1.41.5, vcs-type=git, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 cinder-api, container_name=container-puppet-cinder, tcib_managed=true, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:02:01 np0005604725 podman[51772]: 2026-02-02 08:02:01.429482546 +0000 UTC m=+0.093584270 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Feb 2 08:02:02 np0005604725 podman[51772]: 2026-02-02 08:02:02.065031143 +0000 UTC m=+0.729132847 container init e9144651b3b8404825bd3cd23f9cc8c53edf7c7dd919da828070f0cdc7029095 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T23:07:24Z, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, com.redhat.component=openstack-ceilometer-central-container, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, build-date=2026-01-12T23:07:24Z, release=1766032510, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, tcib_managed=true, version=17.1.13, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-ceilometer, io.buildah.version=1.41.5, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, distribution-scope=public, name=rhosp-rhel9/openstack-ceilometer-central) Feb 2 08:02:02 np0005604725 podman[51760]: 2026-02-02 08:02:02.067293235 +0000 UTC m=+0.748084556 container start 5c64bf47f5a600fef19e6ace0673195b7b19663e9a896931433d27e84a6c1394 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, io.buildah.version=1.41.5, url=https://www.redhat.com, batch=17.1_20260112.1, config_id=tripleo_puppet_step1, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:15Z, build-date=2026-01-12T22:10:15Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vendor=Red Hat, Inc., container_name=container-puppet-collectd, description=Red Hat OpenStack Platform 17.1 collectd, release=1766032510, vcs-type=git, version=17.1.13, name=rhosp-rhel9/openstack-collectd, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, com.redhat.component=openstack-collectd-container, maintainer=OpenStack TripleO Team, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:02:02 np0005604725 podman[51760]: 2026-02-02 08:02:02.067933565 +0000 UTC m=+0.748724896 container attach 5c64bf47f5a600fef19e6ace0673195b7b19663e9a896931433d27e84a6c1394 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, name=rhosp-rhel9/openstack-collectd, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:15Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, description=Red Hat OpenStack Platform 17.1 collectd, release=1766032510, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 collectd, url=https://www.redhat.com, container_name=container-puppet-collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_puppet_step1, architecture=x86_64, tcib_managed=true, build-date=2026-01-12T22:10:15Z, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, com.redhat.component=openstack-collectd-container, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:02:02 np0005604725 podman[51747]: 2026-02-02 08:02:02.072947703 +0000 UTC m=+0.772723362 container create 427fd529f7f7f4cdd8b8704d4cc749bdcd15adbd595fc083766d9eb53ea28598 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, vcs-type=git, container_name=container-puppet-glance_api_internal, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, com.redhat.component=openstack-glance-api-container, name=rhosp-rhel9/openstack-glance-api, build-date=2026-01-12T22:34:42Z, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:34:42Z, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, managed_by=tripleo_ansible, version=17.1.13, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5) Feb 2 08:02:02 np0005604725 systemd[1]: Started libpod-conmon-427fd529f7f7f4cdd8b8704d4cc749bdcd15adbd595fc083766d9eb53ea28598.scope. Feb 2 08:02:02 np0005604725 podman[51757]: 2026-02-02 08:02:02.117616712 +0000 UTC m=+0.803248936 container start 9d358baf14d9745005b55ead401bfbeb8ef8d4790807169a59b7445164ac9850 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, build-date=2026-01-12T22:34:42Z, vcs-type=git, managed_by=tripleo_ansible, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, name=rhosp-rhel9/openstack-glance-api, tcib_managed=true, container_name=container-puppet-glance_api, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, release=1766032510, batch=17.1_20260112.1, io.openshift.expose-services=, com.redhat.component=openstack-glance-api-container, io.buildah.version=1.41.5, config_id=tripleo_puppet_step1) Feb 2 08:02:02 np0005604725 podman[51757]: 2026-02-02 08:02:02.119524111 +0000 UTC m=+0.805156335 container attach 9d358baf14d9745005b55ead401bfbeb8ef8d4790807169a59b7445164ac9850 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, name=rhosp-rhel9/openstack-glance-api, io.buildah.version=1.41.5, url=https://www.redhat.com, build-date=2026-01-12T22:34:42Z, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, version=17.1.13, vendor=Red Hat, Inc., batch=17.1_20260112.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-glance-api-container, config_id=tripleo_puppet_step1, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=container-puppet-glance_api, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:34:42Z, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:02:02 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:02 np0005604725 podman[51772]: 2026-02-02 08:02:02.126112879 +0000 UTC m=+0.790214553 container start e9144651b3b8404825bd3cd23f9cc8c53edf7c7dd919da828070f0cdc7029095 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, tcib_managed=true, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T23:07:24Z, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, com.redhat.component=openstack-ceilometer-central-container, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, name=rhosp-rhel9/openstack-ceilometer-central, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, vendor=Red Hat, Inc., managed_by=tripleo_ansible, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, version=17.1.13, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, architecture=x86_64, container_name=container-puppet-ceilometer, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, org.opencontainers.image.created=2026-01-12T23:07:24Z, io.buildah.version=1.41.5, distribution-scope=public) Feb 2 08:02:02 np0005604725 podman[51772]: 2026-02-02 08:02:02.126539683 +0000 UTC m=+0.790641387 container attach e9144651b3b8404825bd3cd23f9cc8c53edf7c7dd919da828070f0cdc7029095 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, vendor=Red Hat, Inc., version=17.1.13, org.opencontainers.image.created=2026-01-12T23:07:24Z, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 ceilometer-central, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, tcib_managed=true, architecture=x86_64, io.buildah.version=1.41.5, release=1766032510, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=container-puppet-ceilometer, name=rhosp-rhel9/openstack-ceilometer-central, config_id=tripleo_puppet_step1, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, com.redhat.component=openstack-ceilometer-central-container, build-date=2026-01-12T23:07:24Z, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central) Feb 2 08:02:02 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e35e4e47c2208ac54d58eb84c170b606cccc00829b2c94ec73b1f56a754cd8f1/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:02 np0005604725 podman[51747]: 2026-02-02 08:02:02.142274798 +0000 UTC m=+0.842050457 container init 427fd529f7f7f4cdd8b8704d4cc749bdcd15adbd595fc083766d9eb53ea28598 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, distribution-scope=public, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, container_name=container-puppet-glance_api_internal, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, release=1766032510, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:34:42Z, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:34:42Z, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.13, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, com.redhat.component=openstack-glance-api-container, io.openshift.expose-services=, io.buildah.version=1.41.5, vcs-type=git, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:02:02 np0005604725 podman[51747]: 2026-02-02 08:02:02.152244533 +0000 UTC m=+0.852020202 container start 427fd529f7f7f4cdd8b8704d4cc749bdcd15adbd595fc083766d9eb53ea28598 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, vendor=Red Hat, Inc., architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-glance-api, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, build-date=2026-01-12T22:34:42Z, vcs-type=git, com.redhat.component=openstack-glance-api-container, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, container_name=container-puppet-glance_api_internal, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, batch=17.1_20260112.1, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api) Feb 2 08:02:02 np0005604725 podman[51747]: 2026-02-02 08:02:02.15246401 +0000 UTC m=+0.852239709 container attach 427fd529f7f7f4cdd8b8704d4cc749bdcd15adbd595fc083766d9eb53ea28598 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:34:42Z, io.buildah.version=1.41.5, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, container_name=container-puppet-glance_api_internal, managed_by=tripleo_ansible, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, summary=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_puppet_step1, release=1766032510, batch=17.1_20260112.1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, build-date=2026-01-12T22:34:42Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:02:03 np0005604725 puppet-user[51847]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:03 np0005604725 puppet-user[51847]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:03 np0005604725 puppet-user[51847]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:03 np0005604725 puppet-user[51847]: (file & line not available) Feb 2 08:02:03 np0005604725 puppet-user[51847]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:03 np0005604725 puppet-user[51847]: (file & line not available) Feb 2 08:02:03 np0005604725 puppet-user[51845]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:03 np0005604725 puppet-user[51845]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:03 np0005604725 puppet-user[51845]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:03 np0005604725 puppet-user[51845]: (file & line not available) Feb 2 08:02:03 np0005604725 puppet-user[51845]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:03 np0005604725 puppet-user[51845]: (file & line not available) Feb 2 08:02:03 np0005604725 puppet-user[51884]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:03 np0005604725 puppet-user[51884]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:03 np0005604725 puppet-user[51884]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:03 np0005604725 puppet-user[51884]: (file & line not available) Feb 2 08:02:03 np0005604725 puppet-user[51845]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.08 seconds Feb 2 08:02:03 np0005604725 puppet-user[51899]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:03 np0005604725 puppet-user[51899]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:03 np0005604725 puppet-user[51899]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:03 np0005604725 puppet-user[51899]: (file & line not available) Feb 2 08:02:03 np0005604725 puppet-user[51884]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:03 np0005604725 puppet-user[51884]: (file & line not available) Feb 2 08:02:03 np0005604725 puppet-user[51845]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Clustercheck/File[/etc/sysconfig/clustercheck]/ensure: defined content as '{sha256}2880f0627d0c425a82843fea005154a345fee58f1e61010063bbb6946369b7b9' Feb 2 08:02:03 np0005604725 puppet-user[51845]: Notice: /Stage[main]/Xinetd/File[/etc/xinetd.d]/ensure: created Feb 2 08:02:03 np0005604725 puppet-user[51845]: Notice: /Stage[main]/Xinetd/File[/etc/xinetd.conf]/ensure: defined content as '{sha256}37f48d3e5dce056a46519d144042a388bde95ea9fa161d3362eedf70e7987a91' Feb 2 08:02:03 np0005604725 puppet-user[51899]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:03 np0005604725 puppet-user[51899]: (file & line not available) Feb 2 08:02:03 np0005604725 puppet-user[51845]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Clustercheck/Xinetd::Service[galera-monitor]/File[/etc/xinetd.d/galera-monitor]/ensure: defined content as '{sha256}d8dda3bf21499091549cbc07993e45661619cb636a341c2650a15fc008cfe8a7' Feb 2 08:02:03 np0005604725 puppet-user[51845]: Notice: Applied catalog in 0.03 seconds Feb 2 08:02:03 np0005604725 puppet-user[51845]: Application: Feb 2 08:02:03 np0005604725 puppet-user[51845]: Initial environment: production Feb 2 08:02:03 np0005604725 puppet-user[51845]: Converged environment: production Feb 2 08:02:03 np0005604725 puppet-user[51845]: Run mode: user Feb 2 08:02:03 np0005604725 puppet-user[51845]: Changes: Feb 2 08:02:03 np0005604725 puppet-user[51845]: Total: 4 Feb 2 08:02:03 np0005604725 puppet-user[51845]: Events: Feb 2 08:02:03 np0005604725 puppet-user[51845]: Success: 4 Feb 2 08:02:03 np0005604725 puppet-user[51845]: Total: 4 Feb 2 08:02:03 np0005604725 puppet-user[51845]: Resources: Feb 2 08:02:03 np0005604725 puppet-user[51845]: Changed: 4 Feb 2 08:02:03 np0005604725 puppet-user[51845]: Out of sync: 4 Feb 2 08:02:03 np0005604725 puppet-user[51845]: Skipped: 9 Feb 2 08:02:03 np0005604725 puppet-user[51845]: Total: 13 Feb 2 08:02:03 np0005604725 puppet-user[51845]: Time: Feb 2 08:02:03 np0005604725 puppet-user[51845]: File: 0.01 Feb 2 08:02:03 np0005604725 puppet-user[51845]: Transaction evaluation: 0.02 Feb 2 08:02:03 np0005604725 puppet-user[51845]: Catalog application: 0.03 Feb 2 08:02:03 np0005604725 puppet-user[51845]: Config retrieval: 0.11 Feb 2 08:02:03 np0005604725 puppet-user[51845]: Last run: 1770019323 Feb 2 08:02:03 np0005604725 puppet-user[51845]: Total: 0.03 Feb 2 08:02:03 np0005604725 puppet-user[51845]: Version: Feb 2 08:02:03 np0005604725 puppet-user[51845]: Config: 1770019323 Feb 2 08:02:03 np0005604725 puppet-user[51845]: Puppet: 7.10.0 Feb 2 08:02:03 np0005604725 puppet-user[51881]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:03 np0005604725 puppet-user[51881]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:03 np0005604725 puppet-user[51881]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:03 np0005604725 puppet-user[51881]: (file & line not available) Feb 2 08:02:03 np0005604725 puppet-user[51881]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:03 np0005604725 puppet-user[51881]: (file & line not available) Feb 2 08:02:03 np0005604725 puppet-user[51881]: Warning: Scope(Class[Tripleo::Profile::Base::Cinder::Api]): The keymgr_backend parameter has been deprecated and has no effect. Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::cache_backend'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 145, column: 39) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::memcache_servers'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 146, column: 39) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::cache_tls_enabled'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 147, column: 39) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::cache_tls_cafile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 148, column: 39) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::cache_tls_certfile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 149, column: 39) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::cache_tls_keyfile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 150, column: 39) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::cache_tls_allowed_ciphers'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 151, column: 39) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::manage_backend_package'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 152, column: 39) Feb 2 08:02:04 np0005604725 puppet-user[51916]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:04 np0005604725 puppet-user[51916]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:04 np0005604725 puppet-user[51916]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:04 np0005604725 puppet-user[51916]: (file & line not available) Feb 2 08:02:04 np0005604725 puppet-user[51916]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:04 np0005604725 puppet-user[51916]: (file & line not available) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_password'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 63, column: 25) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_url'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 68, column: 25) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_region'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 69, column: 28) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_user'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 70, column: 25) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_tenant_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 71, column: 29) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_cacert'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 72, column: 23) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_endpoint_type'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 73, column: 26) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_user_domain_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 74, column: 33) Feb 2 08:02:04 np0005604725 puppet-user[51847]: Warning: Scope(Class[Glance::Api]): glance::api::os_region_name is deprecated. Use \ Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_project_domain_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 75, column: 36) Feb 2 08:02:04 np0005604725 puppet-user[51847]: glance::backend::multistore::cinder::cinder_os_region_name instead. Feb 2 08:02:04 np0005604725 puppet-user[51899]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_type'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 76, column: 26) Feb 2 08:02:04 np0005604725 puppet-user[51881]: Warning: Scope(Class[Cinder]): The database_connection parameter is deprecated and will be \ Feb 2 08:02:04 np0005604725 puppet-user[51881]: removed in a future realse. Use cinder::db::database_connection instead Feb 2 08:02:04 np0005604725 puppet-user[51881]: Warning: Unknown variable: 'cinder::api::keymgr_backend'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 455, column: 31) Feb 2 08:02:04 np0005604725 puppet-user[51881]: Warning: Unknown variable: 'cinder::api::keymgr_encryption_api_url'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 456, column: 42) Feb 2 08:02:04 np0005604725 puppet-user[51881]: Warning: Unknown variable: 'cinder::api::keymgr_encryption_auth_url'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 458, column: 43) Feb 2 08:02:04 np0005604725 systemd[1]: libpod-f1267aa62f1e87b1360b6d6bd82f119b51bcf95a61a5ffa2571394882d084a3a.scope: Deactivated successfully. Feb 2 08:02:04 np0005604725 systemd[1]: libpod-f1267aa62f1e87b1360b6d6bd82f119b51bcf95a61a5ffa2571394882d084a3a.scope: Consumed 2.675s CPU time. Feb 2 08:02:04 np0005604725 podman[51710]: 2026-02-02 08:02:04.237931999 +0000 UTC m=+2.962949674 container died f1267aa62f1e87b1360b6d6bd82f119b51bcf95a61a5ffa2571394882d084a3a (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, summary=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, batch=17.1_20260112.1, version=17.1.13, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, container_name=container-puppet-clustercheck, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:18Z, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, url=https://www.redhat.com, build-date=2026-01-12T22:10:18Z, config_id=tripleo_puppet_step1, architecture=x86_64, managed_by=tripleo_ansible, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., vcs-type=git, description=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.43 seconds Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.43 seconds Feb 2 08:02:04 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-f1267aa62f1e87b1360b6d6bd82f119b51bcf95a61a5ffa2571394882d084a3a-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:04 np0005604725 systemd[1]: var-lib-containers-storage-overlay-6a5556c0a8e9917296b86a294ecb5a79e531f39a07b3c5078babb7c5394805ee-merged.mount: Deactivated successfully. Feb 2 08:02:04 np0005604725 podman[52361]: 2026-02-02 08:02:04.342081312 +0000 UTC m=+0.096339969 container cleanup f1267aa62f1e87b1360b6d6bd82f119b51bcf95a61a5ffa2571394882d084a3a (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, name=rhosp-rhel9/openstack-mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, distribution-scope=public, tcib_managed=true, container_name=container-puppet-clustercheck, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, release=1766032510, description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, io.openshift.expose-services=, com.redhat.component=openstack-mariadb-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:18Z, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-type=git, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team) Feb 2 08:02:04 np0005604725 systemd[1]: libpod-conmon-f1267aa62f1e87b1360b6d6bd82f119b51bcf95a61a5ffa2571394882d084a3a.scope: Deactivated successfully. Feb 2 08:02:04 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-clustercheck --conmon-pidfile /run/container-puppet-clustercheck.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=clustercheck --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::pacemaker::clustercheck --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-clustercheck --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-clustercheck.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/content: content changed '{sha256}aea388a73ebafc7e07a81ddb930a91099211f660eee55fbf92c13007a77501e5' to '{sha256}2523d01ee9c3022c0e9f61d896b1474a168e18472aee141cc278e69fe13f41c1' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/owner: owner changed 'collectd' to 'root' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/group: group changed 'collectd' to 'root' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/mode: mode changed '0644' to '0640' Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[DEFAULT/http_timeout]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[DEFAULT/host]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[publisher/telemetry_secret]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[hardware/readonly_user_name]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[hardware/readonly_user_password]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/auth_url]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/region_name]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/username]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/password]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/project_name]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/interface]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/user_domain_name]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/owner: owner changed 'collectd' to 'root' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/group: group changed 'collectd' to 'root' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/mode: mode changed '0755' to '0750' Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/project_domain_name]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-cpu.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-interface.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-load.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-memory.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-syslog.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/apache.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/dns.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ipmi.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/mcelog.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/mysql.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ovs-events.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/auth_type]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ovs-stats.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ping.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/pmu.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/rdt.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/sensors.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/snmp.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/virt.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/write_prometheus.conf]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Python/File[/usr/lib/python3.9/site-packages]/mode: mode changed '0755' to '0750' Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[DEFAULT/polling_namespaces]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[polling/tenant_name_discovery]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Python/Collectd::Plugin[python]/File[python.load]/ensure: defined content as '{sha256}0163924a0099dd43fe39cb85e836df147fd2cfee8197dc6866d3c384539eb6ee' Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[coordination/backend_url]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Agent::Notification/File[event_pipeline]/ensure: defined content as '{sha256}97b000582d6be7fd4e80bc1fc15bc0358888fdea71d4447491d8c683cd09e21b' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Python/Concat[/etc/collectd.d/python-config.conf]/File[/etc/collectd.d/python-config.conf]/ensure: defined content as '{sha256}2e5fb20e60b30f84687fc456a37fc62451000d2d85f5bbc1b3fca3a5eac9deeb' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Logfile/Collectd::Plugin[logfile]/File[logfile.load]/ensure: defined content as '{sha256}07bbda08ef9b824089500bdc6ac5a86e7d1ef2ae3ed4ed423c0559fe6361e5af' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Amqp1/Collectd::Plugin[amqp1]/File[amqp1.load]/ensure: defined content as '{sha256}0772ea79ea74f54aef0a0eafbfece2741e211a8497f02ef97ed929d570027645' Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/backend]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/enabled]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Cpu/Collectd::Plugin[cpu]/File[cpu.load]/ensure: defined content as '{sha256}67d4c8bf6bf5785f4cb6b596712204d9eacbcebbf16fe289907195d4d3cb0e34' Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/memcache_servers]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Df/Collectd::Plugin[df]/File[df.load]/ensure: defined content as '{sha256}edeb4716d96fc9dca2c6adfe07bae70ba08c6af3944a3900581cba0f08f3c4ba' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Disk/Collectd::Plugin[disk]/File[disk.load]/ensure: defined content as '{sha256}1d0cb838278f3226fcd381f0fc2e0e1abaf0d590f4ba7bcb2fc6ec113d3ebde7' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Hugepages/Collectd::Plugin[hugepages]/File[hugepages.load]/ensure: defined content as '{sha256}9b9f35b65a73da8d4037e4355a23b678f2cf61997ccf7a5e1adf2a7ce6415827' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Hugepages/Collectd::Plugin[hugepages]/File[older_hugepages.load]/ensure: removed Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/tls_enabled]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Interface/Collectd::Plugin[interface]/File[interface.load]/ensure: defined content as '{sha256}b76b315dc312e398940fe029c6dbc5c18d2b974ff7527469fc7d3617b5222046' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Load/Collectd::Plugin[load]/File[load.load]/ensure: defined content as '{sha256}af2403f76aebd2f10202d66d2d55e1a8d987eed09ced5a3e3873a4093585dc31' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Memory/Collectd::Plugin[memory]/File[memory.load]/ensure: defined content as '{sha256}0f270425ee6b05fc9440ee32b9afd1010dcbddd9b04ca78ff693858f7ecb9d0e' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Unixsock/Collectd::Plugin[unixsock]/File[unixsock.load]/ensure: defined content as '{sha256}9d1ec1c51ba386baa6f62d2e019dbd6998ad924bf868b3edc2d24d3dc3c63885' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Uptime/Collectd::Plugin[uptime]/File[uptime.load]/ensure: defined content as '{sha256}f7a26c6369f904d0ca1af59627ebea15f5e72160bcacdf08d217af282b42e5c0' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: /Stage[main]/Collectd::Plugin::Memcached/Collectd::Plugin[memcached]/File[memcached.load]/ensure: defined content as '{sha256}9f94ce3e1a504156a8653946a742d9948e2a295d4a5bf0556b2253082804524e' Feb 2 08:02:04 np0005604725 puppet-user[51884]: Notice: Applied catalog in 0.24 seconds Feb 2 08:02:04 np0005604725 puppet-user[51884]: Application: Feb 2 08:02:04 np0005604725 puppet-user[51884]: Initial environment: production Feb 2 08:02:04 np0005604725 puppet-user[51884]: Converged environment: production Feb 2 08:02:04 np0005604725 puppet-user[51884]: Run mode: user Feb 2 08:02:04 np0005604725 puppet-user[51884]: Changes: Feb 2 08:02:04 np0005604725 puppet-user[51884]: Total: 42 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Events: Feb 2 08:02:04 np0005604725 puppet-user[51884]: Success: 42 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Total: 42 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Resources: Feb 2 08:02:04 np0005604725 puppet-user[51884]: Skipped: 12 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Changed: 37 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Out of sync: 37 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Total: 77 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Time: Feb 2 08:02:04 np0005604725 puppet-user[51884]: Concat file: 0.00 Feb 2 08:02:04 np0005604725 puppet-user[51884]: File: 0.08 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Transaction evaluation: 0.24 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Catalog application: 0.24 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Config retrieval: 0.50 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Last run: 1770019324 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Concat fragment: 0.00 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Total: 0.24 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Version: Feb 2 08:02:04 np0005604725 puppet-user[51884]: Config: 1770019323 Feb 2 08:02:04 np0005604725 puppet-user[51884]: Puppet: 7.10.0 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Rabbit[ceilometer_config]/Ceilometer_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Amqp[ceilometer_config]/Ceilometer_config[oslo_messaging_amqp/rpc_address_prefix]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Amqp[ceilometer_config]/Ceilometer_config[oslo_messaging_amqp/notify_address_prefix]/ensure: created Feb 2 08:02:04 np0005604725 podman[52426]: 2026-02-02 08:02:04.657296809 +0000 UTC m=+0.049890057 container create 3806b2dcf0ab40fa39f11a419658fe67bf8f1925cbb03a632f08fd10c6f7137f (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, container_name=container-puppet-haproxy, version=17.1.13, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vcs-type=git, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, release=1766032510, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, build-date=2026-01-12T22:10:12Z, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-haproxy-container, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-haproxy, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 haproxy, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:12Z) Feb 2 08:02:04 np0005604725 puppet-user[51847]: Warning: Scope(Glance::Backend::Multistore::Swift[default_backend]): The swift_store_config_file parameter is deprecated Feb 2 08:02:04 np0005604725 systemd[1]: Started libpod-conmon-3806b2dcf0ab40fa39f11a419658fe67bf8f1925cbb03a632f08fd10c6f7137f.scope. Feb 2 08:02:04 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:04 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e90dbca8dc410910298378ee755197d28a9dd75de473ae506527287bba306c8f/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:04 np0005604725 podman[52426]: 2026-02-02 08:02:04.700527997 +0000 UTC m=+0.093121245 container init 3806b2dcf0ab40fa39f11a419658fe67bf8f1925cbb03a632f08fd10c6f7137f (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-haproxy-container, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 haproxy, build-date=2026-01-12T22:10:12Z, version=17.1.13, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, vcs-type=git, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, distribution-scope=public, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-haproxy, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:10:12Z, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_puppet_step1, container_name=container-puppet-haproxy, tcib_managed=true, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510) Feb 2 08:02:04 np0005604725 puppet-user[51847]: Warning: Scope(Apache::Vhost[glance-api-proxy]): Feb 2 08:02:04 np0005604725 puppet-user[51847]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Feb 2 08:02:04 np0005604725 puppet-user[51847]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Feb 2 08:02:04 np0005604725 puppet-user[51847]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Feb 2 08:02:04 np0005604725 puppet-user[51847]: file names. Feb 2 08:02:04 np0005604725 puppet-user[51847]: Feb 2 08:02:04 np0005604725 puppet-user[51847]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Feb 2 08:02:04 np0005604725 puppet-user[51847]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Feb 2 08:02:04 np0005604725 puppet-user[51847]: sanitized $servername parameter when not explicitly defined. Feb 2 08:02:04 np0005604725 podman[52426]: 2026-02-02 08:02:04.705693736 +0000 UTC m=+0.098286984 container start 3806b2dcf0ab40fa39f11a419658fe67bf8f1925cbb03a632f08fd10c6f7137f (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, architecture=x86_64, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:12Z, container_name=container-puppet-haproxy, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-haproxy, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2026-01-12T22:10:12Z, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-haproxy-container, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 haproxy, vcs-type=git, url=https://www.redhat.com, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy) Feb 2 08:02:04 np0005604725 podman[52426]: 2026-02-02 08:02:04.708395088 +0000 UTC m=+0.100988336 container attach 3806b2dcf0ab40fa39f11a419658fe67bf8f1925cbb03a632f08fd10c6f7137f (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-haproxy, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 haproxy, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.created=2026-01-12T22:10:12Z, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-haproxy-container, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, config_id=tripleo_puppet_step1, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, batch=17.1_20260112.1, vendor=Red Hat, Inc., io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:12Z, summary=Red Hat OpenStack Platform 17.1 haproxy, url=https://www.redhat.com, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, container_name=container-puppet-haproxy) Feb 2 08:02:04 np0005604725 podman[52426]: 2026-02-02 08:02:04.629283973 +0000 UTC m=+0.021877261 image pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/driver]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/transport_url]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/topics]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Default[ceilometer_config]/Ceilometer_config[DEFAULT/transport_url]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Logging/Oslo::Log[ceilometer_config]/Ceilometer_config[DEFAULT/debug]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: /Stage[main]/Ceilometer::Logging/Oslo::Log[ceilometer_config]/Ceilometer_config[DEFAULT/log_dir]/ensure: created Feb 2 08:02:04 np0005604725 puppet-user[51881]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/cinder/manifests/backup.pp, line: 94, column: 18) Feb 2 08:02:04 np0005604725 puppet-user[51899]: Notice: Applied catalog in 0.42 seconds Feb 2 08:02:04 np0005604725 puppet-user[51899]: Application: Feb 2 08:02:04 np0005604725 puppet-user[51899]: Initial environment: production Feb 2 08:02:04 np0005604725 puppet-user[51899]: Converged environment: production Feb 2 08:02:04 np0005604725 puppet-user[51899]: Run mode: user Feb 2 08:02:04 np0005604725 puppet-user[51899]: Changes: Feb 2 08:02:04 np0005604725 puppet-user[51899]: Total: 31 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Events: Feb 2 08:02:04 np0005604725 puppet-user[51899]: Success: 31 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Total: 31 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Resources: Feb 2 08:02:04 np0005604725 puppet-user[51899]: Skipped: 24 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Changed: 31 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Out of sync: 31 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Total: 157 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Time: Feb 2 08:02:04 np0005604725 puppet-user[51899]: File: 0.00 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Ceilometer config: 0.35 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Transaction evaluation: 0.41 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Catalog application: 0.42 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Config retrieval: 0.54 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Last run: 1770019324 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Resources: 0.00 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Total: 0.42 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Version: Feb 2 08:02:04 np0005604725 puppet-user[51899]: Config: 1770019323 Feb 2 08:02:04 np0005604725 puppet-user[51899]: Puppet: 7.10.0 Feb 2 08:02:04 np0005604725 puppet-user[51916]: Warning: Scope(Class[Glance::Api]): glance::api::os_region_name is deprecated. Use \ Feb 2 08:02:04 np0005604725 puppet-user[51916]: glance::backend::multistore::cinder::cinder_os_region_name instead. Feb 2 08:02:04 np0005604725 puppet-user[51916]: Warning: Scope(Class[Glance::Api]): The show_multiple_locations parameter is deprecated, and will be removed in a future release Feb 2 08:02:04 np0005604725 puppet-user[51881]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/cinder/manifests/volume.pp, line: 69, column: 18) Feb 2 08:02:04 np0005604725 puppet-user[51847]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 1.59 seconds Feb 2 08:02:04 np0005604725 systemd[1]: libpod-5c64bf47f5a600fef19e6ace0673195b7b19663e9a896931433d27e84a6c1394.scope: Deactivated successfully. Feb 2 08:02:04 np0005604725 systemd[1]: libpod-5c64bf47f5a600fef19e6ace0673195b7b19663e9a896931433d27e84a6c1394.scope: Consumed 2.688s CPU time. Feb 2 08:02:04 np0005604725 podman[52490]: 2026-02-02 08:02:04.980574356 +0000 UTC m=+0.029735764 container died 5c64bf47f5a600fef19e6ace0673195b7b19663e9a896931433d27e84a6c1394 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:10:15Z, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, tcib_managed=true, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, version=17.1.13, com.redhat.component=openstack-collectd-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, summary=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, container_name=container-puppet-collectd, batch=17.1_20260112.1, config_id=tripleo_puppet_step1, name=rhosp-rhel9/openstack-collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:15Z, description=Red Hat OpenStack Platform 17.1 collectd, vendor=Red Hat, Inc.) Feb 2 08:02:05 np0005604725 podman[52490]: 2026-02-02 08:02:05.013034281 +0000 UTC m=+0.062195649 container cleanup 5c64bf47f5a600fef19e6ace0673195b7b19663e9a896931433d27e84a6c1394 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, vendor=Red Hat, Inc., com.redhat.component=openstack-collectd-container, description=Red Hat OpenStack Platform 17.1 collectd, io.openshift.expose-services=, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, release=1766032510, build-date=2026-01-12T22:10:15Z, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, maintainer=OpenStack TripleO Team, tcib_managed=true, managed_by=tripleo_ansible, container_name=container-puppet-collectd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, summary=Red Hat OpenStack Platform 17.1 collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:15Z, url=https://www.redhat.com, version=17.1.13, name=rhosp-rhel9/openstack-collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git) Feb 2 08:02:05 np0005604725 systemd[1]: libpod-conmon-5c64bf47f5a600fef19e6ace0673195b7b19663e9a896931433d27e84a6c1394.scope: Deactivated successfully. Feb 2 08:02:05 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-collectd --conmon-pidfile /run/container-puppet-collectd.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,collectd_client_config,exec --env NAME=collectd --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::metrics::collectd --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-collectd --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-collectd.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Feb 2 08:02:05 np0005604725 systemd[1]: libpod-e9144651b3b8404825bd3cd23f9cc8c53edf7c7dd919da828070f0cdc7029095.scope: Deactivated successfully. Feb 2 08:02:05 np0005604725 systemd[1]: libpod-e9144651b3b8404825bd3cd23f9cc8c53edf7c7dd919da828070f0cdc7029095.scope: Consumed 2.951s CPU time. Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}0475d2feb3947b0991da660883a91a5e41f0023e50de2b9486bb889a74cdbacb' Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}224e1913534a5aab220e4f36b9f9b1513fe7e3b433c6daefef7dba0ff5103b42' Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Feb 2 08:02:05 np0005604725 podman[52577]: 2026-02-02 08:02:05.255724522 +0000 UTC m=+0.041790449 container died e9144651b3b8404825bd3cd23f9cc8c53edf7c7dd919da828070f0cdc7029095 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, name=rhosp-rhel9/openstack-ceilometer-central, version=17.1.13, com.redhat.component=openstack-ceilometer-central-container, batch=17.1_20260112.1, url=https://www.redhat.com, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, build-date=2026-01-12T23:07:24Z, release=1766032510, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=container-puppet-ceilometer, org.opencontainers.image.created=2026-01-12T23:07:24Z, io.openshift.expose-services=, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, managed_by=tripleo_ansible) Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Feb 2 08:02:05 np0005604725 podman[52577]: 2026-02-02 08:02:05.291451446 +0000 UTC m=+0.077517353 container cleanup e9144651b3b8404825bd3cd23f9cc8c53edf7c7dd919da828070f0cdc7029095 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, version=17.1.13, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T23:07:24Z, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, name=rhosp-rhel9/openstack-ceilometer-central, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, build-date=2026-01-12T23:07:24Z, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, managed_by=tripleo_ansible, distribution-scope=public, vendor=Red Hat, Inc., container_name=container-puppet-ceilometer, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, batch=17.1_20260112.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-ceilometer-central-container, tcib_managed=true, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central) Feb 2 08:02:05 np0005604725 systemd[1]: libpod-conmon-e9144651b3b8404825bd3cd23f9cc8c53edf7c7dd919da828070f0cdc7029095.scope: Deactivated successfully. Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Feb 2 08:02:05 np0005604725 systemd[1]: var-lib-containers-storage-overlay-63a5bf8195bc53acb7a879b91e71e41d799ad1d1d4f1557b1eaad41698f8d934-merged.mount: Deactivated successfully. Feb 2 08:02:05 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-e9144651b3b8404825bd3cd23f9cc8c53edf7c7dd919da828070f0cdc7029095-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:05 np0005604725 systemd[1]: var-lib-containers-storage-overlay-de8c170a424e6cdd130287e6dbb4dfd6121c2ff245d0bcfe980fa154a44fadd9-merged.mount: Deactivated successfully. Feb 2 08:02:05 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-5c64bf47f5a600fef19e6ace0673195b7b19663e9a896931433d27e84a6c1394-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Feb 2 08:02:05 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-ceilometer --conmon-pidfile /run/container-puppet-ceilometer.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config --env NAME=ceilometer --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::ceilometer::agent::polling#012#012include tripleo::profile::base::ceilometer::agent::notification#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-ceilometer --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-ceilometer.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Cron::Db_purge/Cron[glance-manage db purge]/ensure: created Feb 2 08:02:05 np0005604725 podman[52602]: 2026-02-02 08:02:05.350736666 +0000 UTC m=+0.079365843 container create 7b1b9effc51701b001245b56aadacab924cfa296c82bad7e845aa840b5498615 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, tcib_managed=true, vcs-ref=755001522886c265e88561b4997cab642504a845, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, com.redhat.component=openstack-heat-api-container, build-date=2026-01-12T22:53:19Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, name=rhosp-rhel9/openstack-heat-api, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.buildah.version=1.41.5, release=1766032510, description=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:53:19Z, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=container-puppet-heat_api, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, vcs-type=git, version=17.1.13, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/www_authenticate_uri]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51916]: Warning: Scope(Glance::Backend::Multistore::Swift[default_backend]): The swift_store_config_file parameter is deprecated Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_type]/ensure: created Feb 2 08:02:05 np0005604725 podman[52602]: 2026-02-02 08:02:05.3071776 +0000 UTC m=+0.035806797 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Feb 2 08:02:05 np0005604725 puppet-user[51881]: Warning: Scope(Apache::Vhost[cinder_wsgi]): Feb 2 08:02:05 np0005604725 puppet-user[51881]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Feb 2 08:02:05 np0005604725 puppet-user[51881]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Feb 2 08:02:05 np0005604725 puppet-user[51881]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Feb 2 08:02:05 np0005604725 puppet-user[51881]: file names. Feb 2 08:02:05 np0005604725 puppet-user[51881]: Feb 2 08:02:05 np0005604725 puppet-user[51881]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Feb 2 08:02:05 np0005604725 puppet-user[51881]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Feb 2 08:02:05 np0005604725 puppet-user[51881]: sanitized $servername parameter when not explicitly defined. Feb 2 08:02:05 np0005604725 puppet-user[51916]: Warning: Scope(Apache::Vhost[glance-api-proxy]): Feb 2 08:02:05 np0005604725 puppet-user[51916]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Feb 2 08:02:05 np0005604725 puppet-user[51916]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Feb 2 08:02:05 np0005604725 puppet-user[51916]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Feb 2 08:02:05 np0005604725 puppet-user[51916]: file names. Feb 2 08:02:05 np0005604725 puppet-user[51916]: Feb 2 08:02:05 np0005604725 puppet-user[51916]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Feb 2 08:02:05 np0005604725 puppet-user[51916]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Feb 2 08:02:05 np0005604725 puppet-user[51916]: sanitized $servername parameter when not explicitly defined. Feb 2 08:02:05 np0005604725 systemd[1]: Started libpod-conmon-7b1b9effc51701b001245b56aadacab924cfa296c82bad7e845aa840b5498615.scope. Feb 2 08:02:05 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:05 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/2a133a034e197f59c49807afaba95bc6ce317937dbf98bb19833aae0e4a07158/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:05 np0005604725 podman[52602]: 2026-02-02 08:02:05.451944198 +0000 UTC m=+0.180573385 container init 7b1b9effc51701b001245b56aadacab924cfa296c82bad7e845aa840b5498615 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, com.redhat.component=openstack-heat-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=755001522886c265e88561b4997cab642504a845, distribution-scope=public, build-date=2026-01-12T22:53:19Z, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, container_name=container-puppet-heat_api, release=1766032510, architecture=x86_64, vcs-type=git, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:53:19Z, tcib_managed=true, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, name=rhosp-rhel9/openstack-heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 heat-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, version=17.1.13, io.openshift.expose-services=) Feb 2 08:02:05 np0005604725 podman[52602]: 2026-02-02 08:02:05.4649618 +0000 UTC m=+0.193591007 container start 7b1b9effc51701b001245b56aadacab924cfa296c82bad7e845aa840b5498615 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, maintainer=OpenStack TripleO Team, container_name=container-puppet-heat_api, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-heat-api, org.opencontainers.image.created=2026-01-12T22:53:19Z, architecture=x86_64, version=17.1.13, build-date=2026-01-12T22:53:19Z, release=1766032510, vcs-type=git, description=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_puppet_step1, tcib_managed=true, com.redhat.component=openstack-heat-api-container, vcs-ref=755001522886c265e88561b4997cab642504a845, distribution-scope=public, io.openshift.expose-services=, batch=17.1_20260112.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:02:05 np0005604725 podman[52602]: 2026-02-02 08:02:05.468530866 +0000 UTC m=+0.197160093 container attach 7b1b9effc51701b001245b56aadacab924cfa296c82bad7e845aa840b5498615 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, vcs-type=git, description=Red Hat OpenStack Platform 17.1 heat-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, release=1766032510, container_name=container-puppet-heat_api, org.opencontainers.image.created=2026-01-12T22:53:19Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, io.openshift.expose-services=, batch=17.1_20260112.1, io.buildah.version=1.41.5, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, name=rhosp-rhel9/openstack-heat-api, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, vcs-ref=755001522886c265e88561b4997cab642504a845, distribution-scope=public, tcib_managed=true, com.redhat.component=openstack-heat-api-container) Feb 2 08:02:05 np0005604725 puppet-user[51881]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 1.65 seconds Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcached_servers]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/region_name]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 1.60 seconds Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_url]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/username]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/password]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/user_domain_name]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_name]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_domain_name]/ensure: created Feb 2 08:02:05 np0005604725 podman[52689]: 2026-02-02 08:02:05.696126789 +0000 UTC m=+0.059391954 container create b23bf49f3d2b6ca6e4d9257b575feb3095a8b6fa02a19354005c48f2ddefc730 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, io.openshift.expose-services=, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-heat-api-cfn-container, name=rhosp-rhel9/openstack-heat-api-cfn, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, architecture=x86_64, vcs-type=git, build-date=2026-01-12T22:54:02Z, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, container_name=container-puppet-heat_api_cfn, vendor=Red Hat, Inc., distribution-scope=public, tcib_managed=true, url=https://www.redhat.com, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.5, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, managed_by=tripleo_ansible, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.created=2026-01-12T22:54:02Z) Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/interface]/ensure: created Feb 2 08:02:05 np0005604725 systemd[1]: Started libpod-conmon-b23bf49f3d2b6ca6e4d9257b575feb3095a8b6fa02a19354005c48f2ddefc730.scope. Feb 2 08:02:05 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:05 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/597736f33a66f8fc8bb7a21e63f306c2b486ccd2274bc71911ad18f1c1353843/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:05 np0005604725 podman[52689]: 2026-02-02 08:02:05.746061277 +0000 UTC m=+0.109326452 container init b23bf49f3d2b6ca6e4d9257b575feb3095a8b6fa02a19354005c48f2ddefc730 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, org.opencontainers.image.created=2026-01-12T22:54:02Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-ref=755001522886c265e88561b4997cab642504a845, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, container_name=container-puppet-heat_api_cfn, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, config_id=tripleo_puppet_step1, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-type=git, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, build-date=2026-01-12T22:54:02Z, io.buildah.version=1.41.5, version=17.1.13, name=rhosp-rhel9/openstack-heat-api-cfn, architecture=x86_64, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, com.redhat.component=openstack-heat-api-cfn-container, tcib_managed=true) Feb 2 08:02:05 np0005604725 podman[52689]: 2026-02-02 08:02:05.751878203 +0000 UTC m=+0.115143368 container start b23bf49f3d2b6ca6e4d9257b575feb3095a8b6fa02a19354005c48f2ddefc730 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, managed_by=tripleo_ansible, architecture=x86_64, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-heat-api-cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-ref=755001522886c265e88561b4997cab642504a845, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-heat-api-cfn-container, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, container_name=container-puppet-heat_api_cfn, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:54:02Z, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, release=1766032510, vcs-type=git, build-date=2026-01-12T22:54:02Z, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, batch=17.1_20260112.1) Feb 2 08:02:05 np0005604725 podman[52689]: 2026-02-02 08:02:05.75213373 +0000 UTC m=+0.115398895 container attach b23bf49f3d2b6ca6e4d9257b575feb3095a8b6fa02a19354005c48f2ddefc730 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, com.redhat.component=openstack-heat-api-cfn-container, architecture=x86_64, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:54:02Z, vcs-ref=755001522886c265e88561b4997cab642504a845, release=1766032510, url=https://www.redhat.com, vcs-type=git, vendor=Red Hat, Inc., io.openshift.expose-services=, build-date=2026-01-12T22:54:02Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, tcib_managed=true, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_id=tripleo_puppet_step1, name=rhosp-rhel9/openstack-heat-api-cfn, managed_by=tripleo_ansible, container_name=container-puppet-heat_api_cfn) Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/debug]/ensure: created Feb 2 08:02:05 np0005604725 podman[52689]: 2026-02-02 08:02:05.663429866 +0000 UTC m=+0.026695061 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_file]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_dir]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Feb 2 08:02:05 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Feb 2 08:02:05 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Feb 2 08:02:05 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}1c145f21502fe3c074cab31daf474ab0f7292e7c029a3a78d4f5c19d6d857ba5' Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Policy/Oslo::Policy[glance_api_config]/Glance_api_config[oslo_policy/policy_file]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}224e1913534a5aab220e4f36b9f9b1513fe7e3b433c6daefef7dba0ff5103b42' Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Feb 2 08:02:05 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api::Db/Oslo::Db[glance_api_config]/Glance_api_config[database/connection]/ensure: created Feb 2 08:02:05 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Cron::Db_purge/Cron[glance-manage db purge]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_create_container_on_put]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/www_authenticate_uri]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_type]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_endpoint_type]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_config_file]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/default_swift_reference]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/store_description]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/key]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_address]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_version]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user_domain_id]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/project_domain_id]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Rabbit[glance_api_config]/Glance_api_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Feb 2 08:02:06 np0005604725 systemd[1]: tmp-crun.VM4PFo.mount: Deactivated successfully. Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcached_servers]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Default[glance_api_config]/Glance_api_config[DEFAULT/transport_url]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/region_name]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/driver]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_url]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/transport_url]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/username]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/password]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/user_domain_name]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_name]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_domain_name]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Api/Tripleo::Tls_proxy[glance-api]/Apache::Vhost[glance-api-proxy]/Concat[25-glance-api-proxy.conf]/File[/etc/httpd/conf.d/25-glance-api-proxy.conf]/ensure: defined content as '{sha256}eb5ea3d6269635c8c251c03ca3079b4b78b935826843bd4b47c55636edb4632b' Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/interface]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_host]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[52462]: Error: Facter: error while resolving custom fact "haproxy_version": undefined method `strip' for nil:NilClass Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/debug]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_port]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Tripleo::Profile::Base::Lvm/Augeas[udev options in lvm.conf]/returns: executed successfully Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/workers]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_file]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_image_direct_url]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_dir]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}1636035a0aa63815c7a05bf2da88228e0ae457d031c278f358bfed64fa8d22c2' Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}224e1913534a5aab220e4f36b9f9b1513fe7e3b433c6daefef7dba0ff5103b42' Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_cache_dir]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_import_methods]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/node_staging_uri]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_member_quota]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Policy/Oslo::Policy[glance_api_config]/Glance_api_config[oslo_policy/policy_file]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/api_paste_config]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api::Db/Oslo::Db[glance_api_config]/Glance_api_config[database/connection]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/storage_availability_zone]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/default_availability_zone]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_multiple_locations]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_backends]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_api_config[glance_store/default_backend]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/enable_v3_api]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Glance/Cinder_config[DEFAULT/glance_api_servers]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_cache_config[DEFAULT/image_cache_dir]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_create_container_on_put]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_import_opts/image_import_plugins]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_conversion/output_format]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[inject_metadata_properties/ignore_user_roles]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Glance_api_config[paste_deploy/flavor]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_endpoint_type]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_config_file]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/default_swift_reference]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Oslo::Concurrency[glance_api_config]/Glance_api_config[oslo_concurrency/lock_path]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/store_description]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/key]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_address]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_version]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user_domain_id]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/project_domain_id]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: /Stage[main]/Glance::Api/Oslo::Middleware[glance_api_config]/Glance_api_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/region_name]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/interface]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51847]: Notice: Applied catalog in 1.81 seconds Feb 2 08:02:06 np0005604725 puppet-user[51847]: Application: Feb 2 08:02:06 np0005604725 puppet-user[51847]: Initial environment: production Feb 2 08:02:06 np0005604725 puppet-user[51847]: Converged environment: production Feb 2 08:02:06 np0005604725 puppet-user[51847]: Run mode: user Feb 2 08:02:06 np0005604725 puppet-user[51847]: Changes: Feb 2 08:02:06 np0005604725 puppet-user[51847]: Total: 92 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Events: Feb 2 08:02:06 np0005604725 puppet-user[51847]: Success: 92 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Total: 92 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Resources: Feb 2 08:02:06 np0005604725 puppet-user[51847]: Skipped: 36 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Changed: 92 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Out of sync: 92 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Total: 305 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Time: Feb 2 08:02:06 np0005604725 puppet-user[51847]: Concat file: 0.00 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Anchor: 0.00 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Concat fragment: 0.00 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Glance swift config: 0.01 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Glance image import config: 0.01 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Glance cache config: 0.01 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Cron: 0.01 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Augeas: 0.02 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Package: 0.02 Feb 2 08:02:06 np0005604725 puppet-user[51847]: File: 0.11 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Glance api config: 1.39 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Config retrieval: 1.75 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Transaction evaluation: 1.80 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Catalog application: 1.81 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Last run: 1770019326 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Resources: 0.00 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Total: 1.81 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Version: Feb 2 08:02:06 np0005604725 puppet-user[51847]: Config: 1770019323 Feb 2 08:02:06 np0005604725 puppet-user[51847]: Puppet: 7.10.0 Feb 2 08:02:06 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Rabbit[glance_api_config]/Glance_api_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/auth_type]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/auth_url]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/username]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/user_domain_name]/ensure: created Feb 2 08:02:06 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/password]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/project_name]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/project_domain_name]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Default[glance_api_config]/Glance_api_config[DEFAULT/transport_url]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/driver]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/transport_url]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Cron::Db_purge/Cron[cinder-manage db purge]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/osapi_volume_listen]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Api/Tripleo::Tls_proxy[glance-api]/Apache::Vhost[glance-api-proxy]/Concat[25-glance-api-proxy.conf]/File[/etc/httpd/conf.d/25-glance-api-proxy.conf]/ensure: defined content as '{sha256}b3b7358e067fd10b50f0d7d35fc51aa2c61fa896bfa993216b6785bdfe608660' Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/osapi_volume_workers]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[52462]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:07 np0005604725 puppet-user[52462]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:07 np0005604725 puppet-user[52462]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:07 np0005604725 puppet-user[52462]: (file & line not available) Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_host]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/default_volume_type]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_port]/ensure: created Feb 2 08:02:07 np0005604725 ovs-vsctl[52823]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/workers]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_image_direct_url]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/auth_strategy]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_cache_dir]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Backup/Cinder_config[DEFAULT/backup_workers]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[52462]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:07 np0005604725 puppet-user[52462]: (file & line not available) Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_import_methods]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Backup/Cinder_config[DEFAULT/backup_max_operations]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/node_staging_uri]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_driver]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[52656]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:07 np0005604725 puppet-user[52656]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:07 np0005604725 puppet-user[52656]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:07 np0005604725 puppet-user[52656]: (file & line not available) Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/swift_catalog_info]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[52656]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:07 np0005604725 puppet-user[52656]: (file & line not available) Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_swift_container]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_member_quota]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_compression_algorithm]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Scheduler/Cinder_config[DEFAULT/scheduler_driver]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_multiple_locations]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Backends/Cinder_config[DEFAULT/enabled_backends]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Backends/Cinder_config[tripleo_iscsi/backend_host]/ensure: created Feb 2 08:02:07 np0005604725 systemd[1]: libpod-9d358baf14d9745005b55ead401bfbeb8ef8d4790807169a59b7445164ac9850.scope: Deactivated successfully. Feb 2 08:02:07 np0005604725 systemd[1]: libpod-9d358baf14d9745005b55ead401bfbeb8ef8d4790807169a59b7445164ac9850.scope: Consumed 5.802s CPU time. Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/connection]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_backends]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_api_config[glance_store/default_backend]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/max_retries]/ensure: created Feb 2 08:02:07 np0005604725 podman[52911]: 2026-02-02 08:02:07.52050659 +0000 UTC m=+0.027104602 container died 9d358baf14d9745005b55ead401bfbeb8ef8d4790807169a59b7445164ac9850 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-glance-api, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, container_name=container-puppet-glance_api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_puppet_step1, com.redhat.component=openstack-glance-api-container, architecture=x86_64, vendor=Red Hat, Inc., url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:34:42Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 glance-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2026-01-12T22:34:42Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, io.openshift.expose-services=, tcib_managed=true, vcs-type=git, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:02:07 np0005604725 systemd[1]: tmp-crun.sXDRMu.mount: Deactivated successfully. Feb 2 08:02:07 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-9d358baf14d9745005b55ead401bfbeb8ef8d4790807169a59b7445164ac9850-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:07 np0005604725 systemd[1]: var-lib-containers-storage-overlay-fdc8681b4904b43de5be680c65312743baa04dbf89a1d99d8561cb544923f5ec-merged.mount: Deactivated successfully. Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_cache_config[DEFAULT/image_cache_dir]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_import_opts/image_import_plugins]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_conversion/output_format]/ensure: created Feb 2 08:02:07 np0005604725 ovs-vsctl[52929]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[inject_metadata_properties/ignore_user_roles]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[52656]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Feb 2 08:02:07 np0005604725 puppet-user[52656]: removed in a future realse. Use heat::db::database_connection instead Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Glance_api_config[paste_deploy/flavor]/ensure: created Feb 2 08:02:07 np0005604725 podman[52911]: 2026-02-02 08:02:07.595064093 +0000 UTC m=+0.101662115 container cleanup 9d358baf14d9745005b55ead401bfbeb8ef8d4790807169a59b7445164ac9850 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, distribution-scope=public, architecture=x86_64, version=17.1.13, managed_by=tripleo_ansible, com.redhat.component=openstack-glance-api-container, maintainer=OpenStack TripleO Team, tcib_managed=true, name=rhosp-rhel9/openstack-glance-api, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-glance_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., io.openshift.expose-services=, io.buildah.version=1.41.5, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, build-date=2026-01-12T22:34:42Z, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:02:07 np0005604725 systemd[1]: libpod-conmon-9d358baf14d9745005b55ead401bfbeb8ef8d4790807169a59b7445164ac9850.scope: Deactivated successfully. Feb 2 08:02:07 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-glance_api --conmon-pidfile /run/container-puppet-glance_api.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config --env NAME=glance_api --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::glance::api#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-glance_api --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-glance_api.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/db_max_retries]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Oslo::Concurrency[glance_api_config]/Glance_api_config[oslo_concurrency/lock_path]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: /Stage[main]/Glance::Api/Oslo::Middleware[glance_api_config]/Glance_api_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Rabbit[cinder_config]/Cinder_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Rabbit[cinder_config]/Cinder_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Feb 2 08:02:07 np0005604725 puppet-user[51916]: Notice: Applied catalog in 1.89 seconds Feb 2 08:02:07 np0005604725 puppet-user[51916]: Application: Feb 2 08:02:07 np0005604725 puppet-user[51916]: Initial environment: production Feb 2 08:02:07 np0005604725 puppet-user[51916]: Converged environment: production Feb 2 08:02:07 np0005604725 puppet-user[51916]: Run mode: user Feb 2 08:02:07 np0005604725 puppet-user[51916]: Changes: Feb 2 08:02:07 np0005604725 puppet-user[51916]: Total: 92 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Events: Feb 2 08:02:07 np0005604725 puppet-user[51916]: Success: 92 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Total: 92 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Resources: Feb 2 08:02:07 np0005604725 puppet-user[51916]: Skipped: 36 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Changed: 92 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Out of sync: 92 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Total: 305 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Time: Feb 2 08:02:07 np0005604725 puppet-user[51916]: Concat file: 0.00 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Anchor: 0.00 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Concat fragment: 0.00 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Glance swift config: 0.00 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Cron: 0.01 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Augeas: 0.02 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Glance image import config: 0.02 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Glance cache config: 0.02 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Package: 0.02 Feb 2 08:02:07 np0005604725 puppet-user[51916]: File: 0.12 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Glance api config: 1.43 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Config retrieval: 1.74 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Transaction evaluation: 1.88 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Catalog application: 1.89 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Last run: 1770019327 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Resources: 0.00 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Total: 1.89 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Version: Feb 2 08:02:07 np0005604725 puppet-user[51916]: Config: 1770019324 Feb 2 08:02:07 np0005604725 puppet-user[51916]: Puppet: 7.10.0 Feb 2 08:02:07 np0005604725 puppet-user[52462]: Warning: Scope(Haproxy::Config[haproxy]): haproxy: The $merge_options parameter will default to true in the next major release. Please review the documentation regarding the implications. Feb 2 08:02:07 np0005604725 puppet-user[52718]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:07 np0005604725 puppet-user[52718]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:07 np0005604725 puppet-user[52718]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:07 np0005604725 puppet-user[52718]: (file & line not available) Feb 2 08:02:07 np0005604725 puppet-user[52718]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:07 np0005604725 puppet-user[52718]: (file & line not available) Feb 2 08:02:07 np0005604725 puppet-user[52462]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.75 seconds Feb 2 08:02:07 np0005604725 podman[53038]: 2026-02-02 08:02:07.939181251 +0000 UTC m=+0.072549819 container create 9d6a4b6e74081f4aa9bb70a90c8ed20bf3bb37049716dabb5af751336d864365 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, url=https://www.redhat.com, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=, com.redhat.component=openstack-heat-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, tcib_managed=true, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp-rhel9/openstack-heat-api, build-date=2026-01-12T22:53:19Z, io.buildah.version=1.41.5, config_id=tripleo_puppet_step1, org.opencontainers.image.created=2026-01-12T22:53:19Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, container_name=container-puppet-heat, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, architecture=x86_64) Feb 2 08:02:07 np0005604725 systemd[1]: Started libpod-conmon-9d6a4b6e74081f4aa9bb70a90c8ed20bf3bb37049716dabb5af751336d864365.scope. Feb 2 08:02:07 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:07 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/8ac413a77ff42173bd9da91518b62611e4ce2a6ad3091340ef7528f90342dc6f/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:07 np0005604725 podman[53038]: 2026-02-02 08:02:07.991210835 +0000 UTC m=+0.124579403 container init 9d6a4b6e74081f4aa9bb70a90c8ed20bf3bb37049716dabb5af751336d864365 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, release=1766032510, vendor=Red Hat, Inc., io.buildah.version=1.41.5, vcs-ref=755001522886c265e88561b4997cab642504a845, name=rhosp-rhel9/openstack-heat-api, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:53:19Z, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, distribution-scope=public, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, com.redhat.component=openstack-heat-api-container, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, config_id=tripleo_puppet_step1, url=https://www.redhat.com, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 heat-api, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=container-puppet-heat, build-date=2026-01-12T22:53:19Z) Feb 2 08:02:07 np0005604725 podman[53038]: 2026-02-02 08:02:07.998355208 +0000 UTC m=+0.131723776 container start 9d6a4b6e74081f4aa9bb70a90c8ed20bf3bb37049716dabb5af751336d864365 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, org.opencontainers.image.created=2026-01-12T22:53:19Z, tcib_managed=true, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-heat, vcs-ref=755001522886c265e88561b4997cab642504a845, description=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:53:19Z, version=17.1.13, architecture=x86_64, io.openshift.expose-services=, vcs-type=git, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, distribution-scope=public, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-heat-api-container, name=rhosp-rhel9/openstack-heat-api, batch=17.1_20260112.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com) Feb 2 08:02:07 np0005604725 podman[53038]: 2026-02-02 08:02:07.998728088 +0000 UTC m=+0.132096656 container attach 9d6a4b6e74081f4aa9bb70a90c8ed20bf3bb37049716dabb5af751336d864365 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, distribution-scope=public, managed_by=tripleo_ansible, batch=17.1_20260112.1, url=https://www.redhat.com, tcib_managed=true, build-date=2026-01-12T22:53:19Z, config_id=tripleo_puppet_step1, vcs-ref=755001522886c265e88561b4997cab642504a845, description=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp-rhel9/openstack-heat-api, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.buildah.version=1.41.5, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, org.opencontainers.image.created=2026-01-12T22:53:19Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, com.redhat.component=openstack-heat-api-container, version=17.1.13, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, container_name=container-puppet-heat, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:02:08 np0005604725 podman[53038]: 2026-02-02 08:02:07.901634547 +0000 UTC m=+0.035003165 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Feb 2 08:02:08 np0005604725 puppet-user[52718]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Feb 2 08:02:08 np0005604725 puppet-user[52718]: removed in a future realse. Use heat::db::database_connection instead Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/rpc_response_timeout]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[52462]: Notice: /Stage[main]/Haproxy/Haproxy::Instance[haproxy]/Haproxy::Config[haproxy]/Concat[/etc/haproxy/haproxy.cfg]/File[/etc/haproxy/haproxy.cfg]/content: content changed '{sha256}8afc9a0bcc462f08af54b6ac1cbfc3b8343b1feee00b4ab07d7a8c7b47065f0b' to '{sha256}8a2c162f485c3f78d4f897f75d648caec939158538fad57876ff2ef46853fec6' Feb 2 08:02:08 np0005604725 puppet-user[52462]: Notice: /Stage[main]/Haproxy/Haproxy::Instance[haproxy]/Haproxy::Config[haproxy]/Concat[/etc/haproxy/haproxy.cfg]/File[/etc/haproxy/haproxy.cfg]/mode: mode changed '0644' to '0640' Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/transport_url]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/control_exchange]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[52462]: Notice: Applied catalog in 0.20 seconds Feb 2 08:02:08 np0005604725 puppet-user[52462]: Application: Feb 2 08:02:08 np0005604725 puppet-user[52462]: Initial environment: production Feb 2 08:02:08 np0005604725 puppet-user[52462]: Converged environment: production Feb 2 08:02:08 np0005604725 puppet-user[52462]: Run mode: user Feb 2 08:02:08 np0005604725 puppet-user[52462]: Changes: Feb 2 08:02:08 np0005604725 puppet-user[52462]: Total: 2 Feb 2 08:02:08 np0005604725 puppet-user[52462]: Events: Feb 2 08:02:08 np0005604725 puppet-user[52462]: Success: 2 Feb 2 08:02:08 np0005604725 puppet-user[52462]: Total: 2 Feb 2 08:02:08 np0005604725 puppet-user[52462]: Resources: Feb 2 08:02:08 np0005604725 puppet-user[52462]: Changed: 1 Feb 2 08:02:08 np0005604725 puppet-user[52462]: Out of sync: 1 Feb 2 08:02:08 np0005604725 puppet-user[52462]: Skipped: 12 Feb 2 08:02:08 np0005604725 puppet-user[52462]: Total: 54 Feb 2 08:02:08 np0005604725 puppet-user[52462]: Time: Feb 2 08:02:08 np0005604725 puppet-user[52462]: Concat file: 0.00 Feb 2 08:02:08 np0005604725 puppet-user[52462]: Concat fragment: 0.00 Feb 2 08:02:08 np0005604725 puppet-user[52462]: File: 0.07 Feb 2 08:02:08 np0005604725 puppet-user[52462]: Transaction evaluation: 0.19 Feb 2 08:02:08 np0005604725 puppet-user[52462]: Catalog application: 0.20 Feb 2 08:02:08 np0005604725 puppet-user[52462]: Config retrieval: 0.84 Feb 2 08:02:08 np0005604725 puppet-user[52462]: Last run: 1770019328 Feb 2 08:02:08 np0005604725 puppet-user[52462]: Total: 0.20 Feb 2 08:02:08 np0005604725 puppet-user[52462]: Version: Feb 2 08:02:08 np0005604725 puppet-user[52462]: Config: 1770019327 Feb 2 08:02:08 np0005604725 puppet-user[52462]: Puppet: 7.10.0 Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Notifications[cinder_config]/Cinder_config[oslo_messaging_notifications/driver]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Notifications[cinder_config]/Cinder_config[oslo_messaging_notifications/transport_url]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder/Oslo::Concurrency[cinder_config]/Cinder_config[oslo_concurrency/lock_path]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Logging/Oslo::Log[cinder_config]/Cinder_config[DEFAULT/debug]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Logging/Oslo::Log[cinder_config]/Cinder_config[DEFAULT/log_dir]/ensure: created Feb 2 08:02:08 np0005604725 systemd[1]: libpod-427fd529f7f7f4cdd8b8704d4cc749bdcd15adbd595fc083766d9eb53ea28598.scope: Deactivated successfully. Feb 2 08:02:08 np0005604725 systemd[1]: libpod-427fd529f7f7f4cdd8b8704d4cc749bdcd15adbd595fc083766d9eb53ea28598.scope: Consumed 5.825s CPU time. Feb 2 08:02:08 np0005604725 podman[51747]: 2026-02-02 08:02:08.296197137 +0000 UTC m=+6.995972836 container died 427fd529f7f7f4cdd8b8704d4cc749bdcd15adbd595fc083766d9eb53ea28598 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, distribution-scope=public, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, managed_by=tripleo_ansible, io.buildah.version=1.41.5, release=1766032510, vcs-type=git, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, container_name=container-puppet-glance_api_internal, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, vendor=Red Hat, Inc., com.redhat.component=openstack-glance-api-container, url=https://www.redhat.com, build-date=2026-01-12T22:34:42Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.13) Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/auth_type]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/region_name]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/auth_url]/ensure: created Feb 2 08:02:08 np0005604725 podman[53113]: 2026-02-02 08:02:08.427596623 +0000 UTC m=+0.113693119 container cleanup 427fd529f7f7f4cdd8b8704d4cc749bdcd15adbd595fc083766d9eb53ea28598 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, com.redhat.component=openstack-glance-api-container, tcib_managed=true, name=rhosp-rhel9/openstack-glance-api, container_name=container-puppet-glance_api_internal, version=17.1.13, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, build-date=2026-01-12T22:34:42Z, org.opencontainers.image.created=2026-01-12T22:34:42Z, config_id=tripleo_puppet_step1, architecture=x86_64, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20260112.1, distribution-scope=public, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team) Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/username]/ensure: created Feb 2 08:02:08 np0005604725 systemd[1]: libpod-conmon-427fd529f7f7f4cdd8b8704d4cc749bdcd15adbd595fc083766d9eb53ea28598.scope: Deactivated successfully. Feb 2 08:02:08 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-glance_api_internal --conmon-pidfile /run/container-puppet-glance_api_internal.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config --env NAME=glance_api_internal --env STEP_CONFIG=include ::tripleo::packages#012class { 'tripleo::profile::base::glance::api':#012 bind_port => 9293,#012 tls_proxy_port => 9293,#012 log_file => '/var/log/glance/api_internal.log',#012 show_image_direct_url => true,#012 show_multiple_locations => true,#012}#012#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-glance_api_internal --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-glance_api_internal.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/password]/ensure: created Feb 2 08:02:08 np0005604725 systemd[1]: libpod-3806b2dcf0ab40fa39f11a419658fe67bf8f1925cbb03a632f08fd10c6f7137f.scope: Deactivated successfully. Feb 2 08:02:08 np0005604725 systemd[1]: libpod-3806b2dcf0ab40fa39f11a419658fe67bf8f1925cbb03a632f08fd10c6f7137f.scope: Consumed 3.645s CPU time. Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/user_domain_name]/ensure: created Feb 2 08:02:08 np0005604725 podman[52426]: 2026-02-02 08:02:08.461503959 +0000 UTC m=+3.854097217 container died 3806b2dcf0ab40fa39f11a419658fe67bf8f1925cbb03a632f08fd10c6f7137f (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, vendor=Red Hat, Inc., container_name=container-puppet-haproxy, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, managed_by=tripleo_ansible, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 haproxy, name=rhosp-rhel9/openstack-haproxy, io.openshift.expose-services=, build-date=2026-01-12T22:10:12Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, architecture=x86_64, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, config_id=tripleo_puppet_step1) Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/project_name]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/project_domain_name]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/send_service_user_token]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/www_authenticate_uri]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/auth_type]/ensure: created Feb 2 08:02:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay-e90dbca8dc410910298378ee755197d28a9dd75de473ae506527287bba306c8f-merged.mount: Deactivated successfully. Feb 2 08:02:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-3806b2dcf0ab40fa39f11a419658fe67bf8f1925cbb03a632f08fd10c6f7137f-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay-e35e4e47c2208ac54d58eb84c170b606cccc00829b2c94ec73b1f56a754cd8f1-merged.mount: Deactivated successfully. Feb 2 08:02:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-427fd529f7f7f4cdd8b8704d4cc749bdcd15adbd595fc083766d9eb53ea28598-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:08 np0005604725 podman[53161]: 2026-02-02 08:02:08.548473966 +0000 UTC m=+0.078477779 container cleanup 3806b2dcf0ab40fa39f11a419658fe67bf8f1925cbb03a632f08fd10c6f7137f (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, io.openshift.expose-services=, url=https://www.redhat.com, version=17.1.13, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, container_name=container-puppet-haproxy, com.redhat.component=openstack-haproxy-container, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, build-date=2026-01-12T22:10:12Z, architecture=x86_64, release=1766032510, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy) Feb 2 08:02:08 np0005604725 systemd[1]: libpod-conmon-3806b2dcf0ab40fa39f11a419658fe67bf8f1925cbb03a632f08fd10c6f7137f.scope: Deactivated successfully. Feb 2 08:02:08 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-haproxy --conmon-pidfile /run/container-puppet-haproxy.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,haproxy_config --env NAME=haproxy --env STEP_CONFIG=include ::tripleo::packages#012exec {'wait-for-settle': command => '/bin/true' }#012class tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}#012['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }#012include tripleo::profile::pacemaker::haproxy_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-haproxy --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-haproxy.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro --volume /etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro --volume /etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Feb 2 08:02:08 np0005604725 puppet-user[52656]: Warning: Scope(Apache::Vhost[heat_api_wsgi]): Feb 2 08:02:08 np0005604725 puppet-user[52656]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Feb 2 08:02:08 np0005604725 puppet-user[52656]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Feb 2 08:02:08 np0005604725 puppet-user[52656]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Feb 2 08:02:08 np0005604725 puppet-user[52656]: file names. Feb 2 08:02:08 np0005604725 puppet-user[52656]: Feb 2 08:02:08 np0005604725 puppet-user[52656]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Feb 2 08:02:08 np0005604725 puppet-user[52656]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Feb 2 08:02:08 np0005604725 puppet-user[52656]: sanitized $servername parameter when not explicitly defined. Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/memcached_servers]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/region_name]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/auth_url]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/username]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/password]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/user_domain_name]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[52656]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 1.48 seconds Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/project_name]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/project_domain_name]/ensure: created Feb 2 08:02:08 np0005604725 podman[53234]: 2026-02-02 08:02:08.802679887 +0000 UTC m=+0.070081362 container create 80e93408834b09f88fb9a25fc96c58d9ce2668b51cb3fa3c9ae300bfcd9f0900 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, architecture=x86_64, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 horizon, io.buildah.version=1.41.5, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, com.redhat.component=openstack-horizon-container, container_name=container-puppet-horizon, config_id=tripleo_puppet_step1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:41Z, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, name=rhosp-rhel9/openstack-horizon, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 horizon, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:41Z, version=17.1.13) Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/interface]/ensure: created Feb 2 08:02:08 np0005604725 systemd[1]: Started libpod-conmon-80e93408834b09f88fb9a25fc96c58d9ce2668b51cb3fa3c9ae300bfcd9f0900.scope. Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Policy/Oslo::Policy[cinder_config]/Cinder_config[oslo_policy/policy_file]/ensure: created Feb 2 08:02:08 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:08 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/21f04f46c09dfa30cd1678ec1503c83b85aeb449a62b5f26fcd34304b9b4b638/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:08 np0005604725 podman[53234]: 2026-02-02 08:02:08.851381412 +0000 UTC m=+0.118782887 container init 80e93408834b09f88fb9a25fc96c58d9ce2668b51cb3fa3c9ae300bfcd9f0900 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2026-01-12T22:34:41Z, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, container_name=container-puppet-horizon, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, vcs-type=git, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 horizon, distribution-scope=public, version=17.1.13, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 horizon, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, com.redhat.component=openstack-horizon-container, name=rhosp-rhel9/openstack-horizon) Feb 2 08:02:08 np0005604725 podman[53234]: 2026-02-02 08:02:08.765669369 +0000 UTC m=+0.033070854 image pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Feb 2 08:02:08 np0005604725 podman[53234]: 2026-02-02 08:02:08.868956857 +0000 UTC m=+0.136358322 container start 80e93408834b09f88fb9a25fc96c58d9ce2668b51cb3fa3c9ae300bfcd9f0900 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:41Z, summary=Red Hat OpenStack Platform 17.1 horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, release=1766032510, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, io.openshift.expose-services=, batch=17.1_20260112.1, vendor=Red Hat, Inc., vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 horizon, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-horizon, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, com.redhat.component=openstack-horizon-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, container_name=container-puppet-horizon, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:41Z) Feb 2 08:02:08 np0005604725 podman[53234]: 2026-02-02 08:02:08.869233134 +0000 UTC m=+0.136634649 container attach 80e93408834b09f88fb9a25fc96c58d9ce2668b51cb3fa3c9ae300bfcd9f0900 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, batch=17.1_20260112.1, io.buildah.version=1.41.5, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 horizon, distribution-scope=public, version=17.1.13, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-horizon-container, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-horizon, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, release=1766032510, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, vendor=Red Hat, Inc., architecture=x86_64, config_id=tripleo_puppet_step1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, build-date=2026-01-12T22:34:41Z, container_name=container-puppet-horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:34:41Z) Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Api/Oslo::Middleware[cinder_config]/Cinder_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/File[/var/www/cgi-bin/cinder]/group: group changed 'root' to 'cinder' Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/File[cinder_wsgi]/ensure: defined content as '{sha256}4edb31cc3eee33c28f8a9c6c47aaad65265bca7f5a84782e4481666691daacea' Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volume_backend_name]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volume_driver]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_ip_address]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_helper]/ensure: created Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volumes_dir]/ensure: created Feb 2 08:02:08 np0005604725 podman[53292]: 2026-02-02 08:02:08.979198552 +0000 UTC m=+0.075863789 container create c8fbedfa20fce777ba4e90f4183f0cfb54ae9c554f04288e29aa3e8f6b588798 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:43Z, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, version=17.1.13, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:43Z, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-iscsid-container, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, distribution-scope=public, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 iscsid, tcib_managed=true, release=1766032510, container_name=container-puppet-iscsid, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 iscsid, name=rhosp-rhel9/openstack-iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:02:08 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_protocol]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Feb 2 08:02:09 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Feb 2 08:02:09 np0005604725 systemd[1]: Started libpod-conmon-c8fbedfa20fce777ba4e90f4183f0cfb54ae9c554f04288e29aa3e8f6b588798.scope. Feb 2 08:02:09 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:09 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/3134ccc544e696830a46ea9f9e89a843718d026c1554c89a68e15025566ee104/merged/tmp/iscsi.host supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:09 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/3134ccc544e696830a46ea9f9e89a843718d026c1554c89a68e15025566ee104/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:09 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Feb 2 08:02:09 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Feb 2 08:02:09 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Feb 2 08:02:09 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Feb 2 08:02:09 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Feb 2 08:02:09 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Feb 2 08:02:09 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Feb 2 08:02:09 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Feb 2 08:02:09 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Feb 2 08:02:09 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Feb 2 08:02:09 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Feb 2 08:02:09 np0005604725 podman[53292]: 2026-02-02 08:02:09.028283387 +0000 UTC m=+0.124948624 container init c8fbedfa20fce777ba4e90f4183f0cfb54ae9c554f04288e29aa3e8f6b588798 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, name=rhosp-rhel9/openstack-iscsid, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:43Z, container_name=container-puppet-iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, vcs-type=git, version=17.1.13, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-iscsid-container, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, vendor=Red Hat, Inc., release=1766032510, org.opencontainers.image.created=2026-01-12T22:34:43Z, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, batch=17.1_20260112.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, architecture=x86_64, io.buildah.version=1.41.5) Feb 2 08:02:09 np0005604725 puppet-user[51881]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/Apache::Vhost[cinder_wsgi]/Concat[10-cinder_wsgi.conf]/File[/etc/httpd/conf.d/10-cinder_wsgi.conf]/ensure: defined content as '{sha256}f11d224667c48cae8762e66e9a8a3dee0442c0c9815306ed19d0230c49397235' Feb 2 08:02:09 np0005604725 podman[53292]: 2026-02-02 08:02:09.035431839 +0000 UTC m=+0.132097066 container start c8fbedfa20fce777ba4e90f4183f0cfb54ae9c554f04288e29aa3e8f6b588798 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, name=rhosp-rhel9/openstack-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, container_name=container-puppet-iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 iscsid, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, release=1766032510, architecture=x86_64, tcib_managed=true, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., build-date=2026-01-12T22:34:43Z, com.redhat.component=openstack-iscsid-container, org.opencontainers.image.created=2026-01-12T22:34:43Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.expose-services=, config_id=tripleo_puppet_step1, io.buildah.version=1.41.5) Feb 2 08:02:09 np0005604725 podman[53292]: 2026-02-02 08:02:09.035747118 +0000 UTC m=+0.132412385 container attach c8fbedfa20fce777ba4e90f4183f0cfb54ae9c554f04288e29aa3e8f6b588798 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, vendor=Red Hat, Inc., org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, name=rhosp-rhel9/openstack-iscsid, version=17.1.13, container_name=container-puppet-iscsid, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_puppet_step1, release=1766032510, url=https://www.redhat.com, architecture=x86_64, build-date=2026-01-12T22:34:43Z, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:43Z, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 iscsid, tcib_managed=true, com.redhat.component=openstack-iscsid-container, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:02:09 np0005604725 podman[53292]: 2026-02-02 08:02:08.941555956 +0000 UTC m=+0.038221203 image pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Notice: Applied catalog in 3.34 seconds Feb 2 08:02:09 np0005604725 puppet-user[51881]: Application: Feb 2 08:02:09 np0005604725 puppet-user[51881]: Initial environment: production Feb 2 08:02:09 np0005604725 puppet-user[51881]: Converged environment: production Feb 2 08:02:09 np0005604725 puppet-user[51881]: Run mode: user Feb 2 08:02:09 np0005604725 puppet-user[51881]: Changes: Feb 2 08:02:09 np0005604725 puppet-user[51881]: Total: 114 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Events: Feb 2 08:02:09 np0005604725 puppet-user[51881]: Success: 114 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Total: 114 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Resources: Feb 2 08:02:09 np0005604725 puppet-user[51881]: Changed: 114 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Out of sync: 114 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Skipped: 34 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Total: 372 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Time: Feb 2 08:02:09 np0005604725 puppet-user[51881]: Resources: 0.00 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Concat file: 0.00 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Anchor: 0.00 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Concat fragment: 0.00 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Cron: 0.01 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Package: 0.03 Feb 2 08:02:09 np0005604725 puppet-user[51881]: File: 0.11 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Augeas: 0.63 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Config retrieval: 1.81 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Last run: 1770019329 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Cinder config: 2.27 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Transaction evaluation: 3.33 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Catalog application: 3.34 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Total: 3.34 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Version: Feb 2 08:02:09 np0005604725 puppet-user[51881]: Config: 1770019323 Feb 2 08:02:09 np0005604725 puppet-user[51881]: Puppet: 7.10.0 Feb 2 08:02:09 np0005604725 puppet-user[52718]: Warning: Scope(Apache::Vhost[heat_api_cfn_wsgi]): Feb 2 08:02:09 np0005604725 puppet-user[52718]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Feb 2 08:02:09 np0005604725 puppet-user[52718]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Feb 2 08:02:09 np0005604725 puppet-user[52718]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Feb 2 08:02:09 np0005604725 puppet-user[52718]: file names. Feb 2 08:02:09 np0005604725 puppet-user[52718]: Feb 2 08:02:09 np0005604725 puppet-user[52718]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Feb 2 08:02:09 np0005604725 puppet-user[52718]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Feb 2 08:02:09 np0005604725 puppet-user[52718]: sanitized $servername parameter when not explicitly defined. Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 1.51 seconds Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Api/Heat_config[heat_api/bind_host]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Feb 2 08:02:09 np0005604725 systemd[1]: libpod-64b76da43ee7d614703bb4984b0c16b3e75f98e53eb8540a3137b7f77023568a.scope: Deactivated successfully. Feb 2 08:02:09 np0005604725 systemd[1]: libpod-64b76da43ee7d614703bb4984b0c16b3e75f98e53eb8540a3137b7f77023568a.scope: Consumed 7.409s CPU time. Feb 2 08:02:09 np0005604725 podman[51732]: 2026-02-02 08:02:09.745488245 +0000 UTC m=+8.462766316 container died 64b76da43ee7d614703bb4984b0c16b3e75f98e53eb8540a3137b7f77023568a (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, vendor=Red Hat, Inc., batch=17.1_20260112.1, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:58:44Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true, version=17.1.13, build-date=2026-01-12T22:58:44Z, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=container-puppet-cinder, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-cinder-api-container, name=rhosp-rhel9/openstack-cinder-api, release=1766032510, vcs-type=git, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, architecture=x86_64, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 cinder-api) Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Api_cfn/Heat_config[heat_api_cfn/bind_host]/ensure: created Feb 2 08:02:09 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-64b76da43ee7d614703bb4984b0c16b3e75f98e53eb8540a3137b7f77023568a-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:09 np0005604725 systemd[1]: var-lib-containers-storage-overlay-16805547cbfa33f9b7fe16353a9e10ff753ec00bf4347ea3e3af6bdfc1b4a963-merged.mount: Deactivated successfully. Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Feb 2 08:02:09 np0005604725 ovs-vsctl[53395]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Feb 2 08:02:09 np0005604725 podman[53372]: 2026-02-02 08:02:09.890874428 +0000 UTC m=+0.134565183 container cleanup 64b76da43ee7d614703bb4984b0c16b3e75f98e53eb8540a3137b7f77023568a (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, tcib_managed=true, name=rhosp-rhel9/openstack-cinder-api, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-cinder-api-container, summary=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vcs-type=git, version=17.1.13, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, build-date=2026-01-12T22:58:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., architecture=x86_64, config_id=tripleo_puppet_step1, io.buildah.version=1.41.5, container_name=container-puppet-cinder, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e) Feb 2 08:02:09 np0005604725 systemd[1]: libpod-conmon-64b76da43ee7d614703bb4984b0c16b3e75f98e53eb8540a3137b7f77023568a.scope: Deactivated successfully. Feb 2 08:02:09 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-cinder --conmon-pidfile /run/container-puppet-cinder.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line --env NAME=cinder --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::cinder::api#012include tripleo::profile::base::database::mysql::client#012#012include tripleo::profile::base::cinder::backup::swift#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::pacemaker::cinder::backup_bundle#012include tripleo::profile::base::cinder::scheduler#012#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::lvm#012include tripleo::profile::pacemaker::cinder::volume_bundle#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-cinder --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-cinder.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Feb 2 08:02:09 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[53076]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:10 np0005604725 puppet-user[53076]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:10 np0005604725 puppet-user[53076]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:10 np0005604725 puppet-user[53076]: (file & line not available) Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[53076]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:10 np0005604725 puppet-user[53076]: (file & line not available) Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}76bf11d9a4971a40c66431123edee355f4c9e0c51b976b973748505d674a2e62' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}224e1913534a5aab220e4f36b9f9b1513fe7e3b433c6daefef7dba0ff5103b42' Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/File[/var/www/cgi-bin/heat]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/File[heat_api_wsgi]/ensure: defined content as '{sha256}63c23a972f142aef4c001999d58b5cb122b43aa3aebf0785080bcc6e56385a66' Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/Apache::Vhost[heat_api_wsgi]/Concat[10-heat_api_wsgi.conf]/File[/etc/httpd/conf.d/10-heat_api_wsgi.conf]/ensure: defined content as '{sha256}6679594a38dbb491e5d97fdff15627f9feecb6b99a4a5082c7d3d511342341ff' Feb 2 08:02:10 np0005604725 puppet-user[53076]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Feb 2 08:02:10 np0005604725 puppet-user[53076]: removed in a future realse. Use heat::db::database_connection instead Feb 2 08:02:10 np0005604725 puppet-user[52656]: Notice: Applied catalog in 1.30 seconds Feb 2 08:02:10 np0005604725 podman[53513]: 2026-02-02 08:02:10.282770586 +0000 UTC m=+0.075232261 container create e1a02c9fff0bcca444629d77e1cb43140adea2bf69e882dd2d83822ff16049d3 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_puppet_step1, batch=17.1_20260112.1, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, version=17.1.13, com.redhat.component=openstack-keystone-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, managed_by=tripleo_ansible, container_name=container-puppet-keystone, build-date=2026-01-12T22:33:53Z, name=rhosp-rhel9/openstack-keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, release=1766032510, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, summary=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:02:10 np0005604725 puppet-user[52656]: Application: Feb 2 08:02:10 np0005604725 puppet-user[52656]: Initial environment: production Feb 2 08:02:10 np0005604725 puppet-user[52656]: Converged environment: production Feb 2 08:02:10 np0005604725 puppet-user[52656]: Run mode: user Feb 2 08:02:10 np0005604725 puppet-user[52656]: Changes: Feb 2 08:02:10 np0005604725 puppet-user[52656]: Total: 89 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Events: Feb 2 08:02:10 np0005604725 puppet-user[52656]: Success: 89 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Total: 89 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Resources: Feb 2 08:02:10 np0005604725 puppet-user[52656]: Skipped: 31 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Changed: 89 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Out of sync: 89 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Total: 331 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Time: Feb 2 08:02:10 np0005604725 puppet-user[52656]: Anchor: 0.00 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Concat file: 0.00 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Concat fragment: 0.00 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Cron: 0.01 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Package: 0.02 Feb 2 08:02:10 np0005604725 puppet-user[52656]: File: 0.13 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Heat config: 0.79 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Transaction evaluation: 1.28 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Catalog application: 1.30 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Config retrieval: 1.71 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Last run: 1770019330 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Resources: 0.00 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Total: 1.30 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Version: Feb 2 08:02:10 np0005604725 puppet-user[52656]: Config: 1770019327 Feb 2 08:02:10 np0005604725 puppet-user[52656]: Puppet: 7.10.0 Feb 2 08:02:10 np0005604725 systemd[1]: Started libpod-conmon-e1a02c9fff0bcca444629d77e1cb43140adea2bf69e882dd2d83822ff16049d3.scope. Feb 2 08:02:10 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:10 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/81ebe59a2c856f90a654d1846b5509ca69f0d303b4cdc469680de66c5bfc7199/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:10 np0005604725 podman[53513]: 2026-02-02 08:02:10.32181047 +0000 UTC m=+0.114272135 container init e1a02c9fff0bcca444629d77e1cb43140adea2bf69e882dd2d83822ff16049d3 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, distribution-scope=public, build-date=2026-01-12T22:33:53Z, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, com.redhat.component=openstack-keystone-container, release=1766032510, io.openshift.expose-services=, url=https://www.redhat.com, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, container_name=container-puppet-keystone, name=rhosp-rhel9/openstack-keystone, tcib_managed=true, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, vcs-type=git, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:02:10 np0005604725 podman[53513]: 2026-02-02 08:02:10.33071457 +0000 UTC m=+0.123176235 container start e1a02c9fff0bcca444629d77e1cb43140adea2bf69e882dd2d83822ff16049d3 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:33:53Z, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp-rhel9/openstack-keystone, version=17.1.13, vendor=Red Hat, Inc., container_name=container-puppet-keystone, com.redhat.component=openstack-keystone-container, release=1766032510, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, build-date=2026-01-12T22:33:53Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:02:10 np0005604725 podman[53513]: 2026-02-02 08:02:10.331548413 +0000 UTC m=+0.124010078 container attach e1a02c9fff0bcca444629d77e1cb43140adea2bf69e882dd2d83822ff16049d3 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, io.openshift.expose-services=, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp-rhel9/openstack-keystone, summary=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, container_name=container-puppet-keystone, vcs-type=git, architecture=x86_64, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_puppet_step1, build-date=2026-01-12T22:33:53Z, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:33:53Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, vendor=Red Hat, Inc., tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, com.redhat.component=openstack-keystone-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team) Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Feb 2 08:02:10 np0005604725 podman[53513]: 2026-02-02 08:02:10.241894803 +0000 UTC m=+0.034356478 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}c4d4447f5bfd230068384d9e237a5b783acac9b687531ddce306f823adb26931' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}224e1913534a5aab220e4f36b9f9b1513fe7e3b433c6daefef7dba0ff5103b42' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Feb 2 08:02:10 np0005604725 puppet-user[53076]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.76 seconds Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[53302]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:10 np0005604725 puppet-user[53302]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:10 np0005604725 puppet-user[53302]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:10 np0005604725 puppet-user[53302]: (file & line not available) Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/File[/var/www/cgi-bin/heat]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/File[heat_api_cfn_wsgi]/ensure: defined content as '{sha256}00dfd79a2e891b11ddd21cb5ce9d8c56f440a274b42eb9e7e9616c7c7e326582' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Feb 2 08:02:10 np0005604725 puppet-user[53302]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:10 np0005604725 puppet-user[53302]: (file & line not available) Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/Apache::Vhost[heat_api_cfn_wsgi]/Concat[10-heat_api_cfn_wsgi.conf]/File[/etc/httpd/conf.d/10-heat_api_cfn_wsgi.conf]/ensure: defined content as '{sha256}e0b80ea51020220c235410293d652a29c25ea94f724f960ea9ad37863bf2a8a3' Feb 2 08:02:10 np0005604725 puppet-user[52718]: Notice: Applied catalog in 1.41 seconds Feb 2 08:02:10 np0005604725 puppet-user[52718]: Application: Feb 2 08:02:10 np0005604725 puppet-user[52718]: Initial environment: production Feb 2 08:02:10 np0005604725 puppet-user[52718]: Converged environment: production Feb 2 08:02:10 np0005604725 puppet-user[52718]: Run mode: user Feb 2 08:02:10 np0005604725 puppet-user[52718]: Changes: Feb 2 08:02:10 np0005604725 puppet-user[52718]: Total: 90 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Events: Feb 2 08:02:10 np0005604725 puppet-user[52718]: Success: 90 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Total: 90 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Resources: Feb 2 08:02:10 np0005604725 puppet-user[52718]: Skipped: 32 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Changed: 90 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Out of sync: 90 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Total: 333 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Time: Feb 2 08:02:10 np0005604725 puppet-user[52718]: Concat file: 0.00 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Anchor: 0.00 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Concat fragment: 0.00 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Cron: 0.01 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Package: 0.02 Feb 2 08:02:10 np0005604725 puppet-user[52718]: File: 0.18 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Heat config: 0.86 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Transaction evaluation: 1.39 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Catalog application: 1.41 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Config retrieval: 1.73 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Last run: 1770019330 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Resources: 0.00 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Total: 1.41 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Version: Feb 2 08:02:10 np0005604725 puppet-user[52718]: Config: 1770019327 Feb 2 08:02:10 np0005604725 puppet-user[52718]: Puppet: 7.10.0 Feb 2 08:02:10 np0005604725 systemd[1]: libpod-7b1b9effc51701b001245b56aadacab924cfa296c82bad7e845aa840b5498615.scope: Deactivated successfully. Feb 2 08:02:10 np0005604725 systemd[1]: libpod-7b1b9effc51701b001245b56aadacab924cfa296c82bad7e845aa840b5498615.scope: Consumed 5.174s CPU time. Feb 2 08:02:10 np0005604725 podman[52602]: 2026-02-02 08:02:10.876570863 +0000 UTC m=+5.605200050 container died 7b1b9effc51701b001245b56aadacab924cfa296c82bad7e845aa840b5498615 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-heat-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.created=2026-01-12T22:53:19Z, architecture=x86_64, vcs-type=git, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, batch=17.1_20260112.1, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, vcs-ref=755001522886c265e88561b4997cab642504a845, tcib_managed=true, io.buildah.version=1.41.5, container_name=container-puppet-heat_api, release=1766032510, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:02:10 np0005604725 puppet-user[53325]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:10 np0005604725 puppet-user[53325]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:10 np0005604725 puppet-user[53325]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:10 np0005604725 puppet-user[53325]: (file & line not available) Feb 2 08:02:10 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[53325]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:10 np0005604725 puppet-user[53325]: (file & line not available) Feb 2 08:02:10 np0005604725 systemd[1]: tmp-crun.Qa0EuI.mount: Deactivated successfully. Feb 2 08:02:10 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Feb 2 08:02:10 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-7b1b9effc51701b001245b56aadacab924cfa296c82bad7e845aa840b5498615-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:10 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Feb 2 08:02:10 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53325]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.10 seconds Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Feb 2 08:02:11 np0005604725 podman[53704]: 2026-02-02 08:02:11.038205046 +0000 UTC m=+0.154808569 container cleanup 7b1b9effc51701b001245b56aadacab924cfa296c82bad7e845aa840b5498615 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_puppet_step1, name=rhosp-rhel9/openstack-heat-api, vcs-type=git, release=1766032510, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 heat-api, container_name=container-puppet-heat_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-ref=755001522886c265e88561b4997cab642504a845, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, io.openshift.expose-services=, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:53:19Z, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, batch=17.1_20260112.1, com.redhat.component=openstack-heat-api-container, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:53:19Z) Feb 2 08:02:11 np0005604725 systemd[1]: libpod-conmon-7b1b9effc51701b001245b56aadacab924cfa296c82bad7e845aa840b5498615.scope: Deactivated successfully. Feb 2 08:02:11 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat_api --conmon-pidfile /run/container-puppet-heat_api.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini --env NAME=heat_api --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::api#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat_api --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat_api.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53325]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Exec[reset-iscsi-initiator-name]/returns: executed successfully Feb 2 08:02:11 np0005604725 puppet-user[53325]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/File[/etc/iscsi/.initiator_reset]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53325]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Exec[sync-iqn-to-host]/returns: executed successfully Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/auth_encryption_key]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/heat_metadata_server_url]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/heat_waitcondition_server_url]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/trusts_delegated_roles]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/max_resources_per_stack]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/num_engine_workers]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/convergence_engine]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/reauthentication_auth_method]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53302]: Warning: This parameter is deprecated, please use `internal_proxy`. at ["/etc/puppet/modules/apache/manifests/mod/remoteip.pp", 77]:["/etc/puppet/modules/tripleo/manifests/profile/base/horizon.pp", 103] Feb 2 08:02:11 np0005604725 puppet-user[53302]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/max_nested_stack_depth]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/client_retry_limit]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Feb 2 08:02:11 np0005604725 podman[53792]: 2026-02-02 08:02:11.344846642 +0000 UTC m=+0.073540855 container create df2070e50b609189517cb12059df0e71cd81b6b1c8819912bef74af2409c051d (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, url=https://www.redhat.com, release=1766032510, build-date=2026-01-12T22:52:22Z, io.buildah.version=1.41.5, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, io.openshift.expose-services=, vcs-type=git, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, org.opencontainers.image.created=2026-01-12T22:52:22Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, architecture=x86_64, container_name=container-puppet-manila, distribution-scope=public, name=rhosp-rhel9/openstack-manila-api, version=17.1.13, com.redhat.component=openstack-manila-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Feb 2 08:02:11 np0005604725 systemd[1]: Started libpod-conmon-df2070e50b609189517cb12059df0e71cd81b6b1c8819912bef74af2409c051d.scope. Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Feb 2 08:02:11 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Feb 2 08:02:11 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/bf883c3e62399ab93a2e85f82c9a42f2077ee7acd44ef1ce5251173d7a73cfa8/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Feb 2 08:02:11 np0005604725 podman[53792]: 2026-02-02 08:02:11.385274504 +0000 UTC m=+0.113968727 container init df2070e50b609189517cb12059df0e71cd81b6b1c8819912bef74af2409c051d (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, release=1766032510, url=https://www.redhat.com, version=17.1.13, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=container-puppet-manila, build-date=2026-01-12T22:52:22Z, com.redhat.component=openstack-manila-api-container, config_id=tripleo_puppet_step1, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, batch=17.1_20260112.1, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:52:22Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.expose-services=, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 manila-api, name=rhosp-rhel9/openstack-manila-api, architecture=x86_64) Feb 2 08:02:11 np0005604725 podman[53792]: 2026-02-02 08:02:11.393084185 +0000 UTC m=+0.121778408 container start df2070e50b609189517cb12059df0e71cd81b6b1c8819912bef74af2409c051d (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, name=rhosp-rhel9/openstack-manila-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, release=1766032510, build-date=2026-01-12T22:52:22Z, summary=Red Hat OpenStack Platform 17.1 manila-api, tcib_managed=true, batch=17.1_20260112.1, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:52:22Z, container_name=container-puppet-manila, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, com.redhat.component=openstack-manila-api-container, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, version=17.1.13, vcs-type=git, url=https://www.redhat.com, architecture=x86_64, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5) Feb 2 08:02:11 np0005604725 podman[53792]: 2026-02-02 08:02:11.393302911 +0000 UTC m=+0.121997134 container attach df2070e50b609189517cb12059df0e71cd81b6b1c8819912bef74af2409c051d (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, build-date=2026-01-12T22:52:22Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, name=rhosp-rhel9/openstack-manila-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-manila-api-container, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, distribution-scope=public, version=17.1.13, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, config_id=tripleo_puppet_step1, io.buildah.version=1.41.5, container_name=container-puppet-manila, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, vcs-type=git, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:52:22Z, architecture=x86_64, release=1766032510) Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Feb 2 08:02:11 np0005604725 podman[53792]: 2026-02-02 08:02:11.300296981 +0000 UTC m=+0.028991194 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Feb 2 08:02:11 np0005604725 systemd[1]: libpod-b23bf49f3d2b6ca6e4d9257b575feb3095a8b6fa02a19354005c48f2ddefc730.scope: Deactivated successfully. Feb 2 08:02:11 np0005604725 systemd[1]: libpod-b23bf49f3d2b6ca6e4d9257b575feb3095a8b6fa02a19354005c48f2ddefc730.scope: Consumed 5.333s CPU time. Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Feb 2 08:02:11 np0005604725 podman[52689]: 2026-02-02 08:02:11.529116416 +0000 UTC m=+5.892381591 container died b23bf49f3d2b6ca6e4d9257b575feb3095a8b6fa02a19354005c48f2ddefc730 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, managed_by=tripleo_ansible, vcs-ref=755001522886c265e88561b4997cab642504a845, config_id=tripleo_puppet_step1, build-date=2026-01-12T22:54:02Z, org.opencontainers.image.created=2026-01-12T22:54:02Z, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=container-puppet-heat_api_cfn, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, com.redhat.component=openstack-heat-api-cfn-container, version=17.1.13, tcib_managed=true, architecture=x86_64, distribution-scope=public, vcs-type=git, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-heat-api-cfn, release=1766032510, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team) Feb 2 08:02:11 np0005604725 systemd[1]: var-lib-containers-storage-overlay-2a133a034e197f59c49807afaba95bc6ce317937dbf98bb19833aae0e4a07158-merged.mount: Deactivated successfully. Feb 2 08:02:11 np0005604725 puppet-user[53325]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Augeas[chap_algs in /etc/iscsi/iscsid.conf]/returns: executed successfully Feb 2 08:02:11 np0005604725 puppet-user[53302]: Warning: Scope(Apache::Vhost[horizon_vhost]): Feb 2 08:02:11 np0005604725 puppet-user[53302]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Feb 2 08:02:11 np0005604725 puppet-user[53302]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Feb 2 08:02:11 np0005604725 puppet-user[53302]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Feb 2 08:02:11 np0005604725 puppet-user[53302]: file names. Feb 2 08:02:11 np0005604725 puppet-user[53302]: Feb 2 08:02:11 np0005604725 puppet-user[53302]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Feb 2 08:02:11 np0005604725 puppet-user[53302]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Feb 2 08:02:11 np0005604725 puppet-user[53302]: sanitized $servername parameter when not explicitly defined. Feb 2 08:02:11 np0005604725 puppet-user[53325]: Notice: Applied catalog in 0.55 seconds Feb 2 08:02:11 np0005604725 puppet-user[53325]: Application: Feb 2 08:02:11 np0005604725 puppet-user[53325]: Initial environment: production Feb 2 08:02:11 np0005604725 puppet-user[53325]: Converged environment: production Feb 2 08:02:11 np0005604725 puppet-user[53325]: Run mode: user Feb 2 08:02:11 np0005604725 puppet-user[53325]: Changes: Feb 2 08:02:11 np0005604725 puppet-user[53325]: Total: 4 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Events: Feb 2 08:02:11 np0005604725 puppet-user[53325]: Success: 4 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Total: 4 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Resources: Feb 2 08:02:11 np0005604725 puppet-user[53325]: Changed: 4 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Out of sync: 4 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Skipped: 8 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Total: 13 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Time: Feb 2 08:02:11 np0005604725 puppet-user[53325]: File: 0.00 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Exec: 0.05 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Config retrieval: 0.13 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Augeas: 0.48 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Transaction evaluation: 0.55 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Catalog application: 0.55 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Last run: 1770019331 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Total: 0.55 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Version: Feb 2 08:02:11 np0005604725 puppet-user[53325]: Config: 1770019330 Feb 2 08:02:11 np0005604725 puppet-user[53325]: Puppet: 7.10.0 Feb 2 08:02:11 np0005604725 systemd[1]: tmp-crun.EPGpxb.mount: Deactivated successfully. Feb 2 08:02:11 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-b23bf49f3d2b6ca6e4d9257b575feb3095a8b6fa02a19354005c48f2ddefc730-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:11 np0005604725 puppet-user[53302]: Warning: Scope(Apache::Vhost[horizon_ssl_vhost]): Feb 2 08:02:11 np0005604725 puppet-user[53302]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Feb 2 08:02:11 np0005604725 puppet-user[53302]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Feb 2 08:02:11 np0005604725 puppet-user[53302]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Feb 2 08:02:11 np0005604725 puppet-user[53302]: file names. Feb 2 08:02:11 np0005604725 puppet-user[53302]: Feb 2 08:02:11 np0005604725 puppet-user[53302]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Feb 2 08:02:11 np0005604725 puppet-user[53302]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Feb 2 08:02:11 np0005604725 puppet-user[53302]: sanitized $servername parameter when not explicitly defined. Feb 2 08:02:11 np0005604725 podman[53850]: 2026-02-02 08:02:11.6185486 +0000 UTC m=+0.075740175 container cleanup b23bf49f3d2b6ca6e4d9257b575feb3095a8b6fa02a19354005c48f2ddefc730 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, distribution-scope=public, url=https://www.redhat.com, architecture=x86_64, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, config_id=tripleo_puppet_step1, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:54:02Z, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=container-puppet-heat_api_cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-heat-api-cfn-container, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-heat-api-cfn, release=1766032510, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-ref=755001522886c265e88561b4997cab642504a845, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, build-date=2026-01-12T22:54:02Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn) Feb 2 08:02:11 np0005604725 systemd[1]: libpod-conmon-b23bf49f3d2b6ca6e4d9257b575feb3095a8b6fa02a19354005c48f2ddefc730.scope: Deactivated successfully. Feb 2 08:02:11 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat_api_cfn --conmon-pidfile /run/container-puppet-heat_api_cfn.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line --env NAME=heat_api_cfn --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::api_cfn#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat_api_cfn --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat_api_cfn.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.98 seconds Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Feb 2 08:02:11 np0005604725 systemd[1]: libpod-c8fbedfa20fce777ba4e90f4183f0cfb54ae9c554f04288e29aa3e8f6b588798.scope: Deactivated successfully. Feb 2 08:02:11 np0005604725 systemd[1]: libpod-c8fbedfa20fce777ba4e90f4183f0cfb54ae9c554f04288e29aa3e8f6b588798.scope: Consumed 2.732s CPU time. Feb 2 08:02:11 np0005604725 podman[53292]: 2026-02-02 08:02:11.86045335 +0000 UTC m=+2.957118587 container died c8fbedfa20fce777ba4e90f4183f0cfb54ae9c554f04288e29aa3e8f6b588798 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-iscsid-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:34:43Z, description=Red Hat OpenStack Platform 17.1 iscsid, vendor=Red Hat, Inc., managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, container_name=container-puppet-iscsid, vcs-type=git, tcib_managed=true, batch=17.1_20260112.1, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_puppet_step1, build-date=2026-01-12T22:34:43Z, architecture=x86_64) Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Remoteip/File[remoteip.conf]/ensure: defined content as '{sha256}9c8d4355af8c0547dc87c380e06a19f272a0bd3fac83afce5f8eb116cf574c2e' Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Horizon/File[/etc/openstack-dashboard/local_settings.d]/mode: mode changed '0750' to '0755' Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/var/log/horizon]/mode: mode changed '0750' to '0751' Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/var/log/horizon/horizon.log]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}2e1c062760262de640de7fb32f6a3595b97b0478924337d552b4cd7903d72fe0' Feb 2 08:02:11 np0005604725 podman[53924]: 2026-02-02 08:02:11.952279058 +0000 UTC m=+0.085448607 container cleanup c8fbedfa20fce777ba4e90f4183f0cfb54ae9c554f04288e29aa3e8f6b588798 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, io.openshift.expose-services=, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, description=Red Hat OpenStack Platform 17.1 iscsid, build-date=2026-01-12T22:34:43Z, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-iscsid, distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:43Z, container_name=container-puppet-iscsid, io.buildah.version=1.41.5, com.redhat.component=openstack-iscsid-container, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 iscsid) Feb 2 08:02:11 np0005604725 systemd[1]: libpod-conmon-c8fbedfa20fce777ba4e90f4183f0cfb54ae9c554f04288e29aa3e8f6b588798.scope: Deactivated successfully. Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}224e1913534a5aab220e4f36b9f9b1513fe7e3b433c6daefef7dba0ff5103b42' Feb 2 08:02:11 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-iscsid --conmon-pidfile /run/container-puppet-iscsid.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,iscsid_config --env NAME=iscsid --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::iscsid#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-iscsid --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-iscsid.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/iscsi:/tmp/iscsi.host:z --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Feb 2 08:02:11 np0005604725 puppet-user[53076]: Notice: Applied catalog in 1.14 seconds Feb 2 08:02:11 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Feb 2 08:02:11 np0005604725 puppet-user[53076]: Application: Feb 2 08:02:11 np0005604725 puppet-user[53076]: Initial environment: production Feb 2 08:02:11 np0005604725 puppet-user[53076]: Converged environment: production Feb 2 08:02:11 np0005604725 puppet-user[53076]: Run mode: user Feb 2 08:02:11 np0005604725 puppet-user[53076]: Changes: Feb 2 08:02:11 np0005604725 puppet-user[53076]: Total: 61 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Events: Feb 2 08:02:11 np0005604725 puppet-user[53076]: Success: 61 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Total: 61 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Resources: Feb 2 08:02:11 np0005604725 puppet-user[53076]: Skipped: 21 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Changed: 61 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Out of sync: 61 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Total: 259 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Time: Feb 2 08:02:11 np0005604725 puppet-user[53076]: Anchor: 0.00 Feb 2 08:02:11 np0005604725 puppet-user[53076]: File: 0.00 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Cron: 0.01 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Augeas: 0.02 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Package: 0.03 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Config retrieval: 0.87 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Heat config: 0.96 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Transaction evaluation: 1.12 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Catalog application: 1.14 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Last run: 1770019331 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Resources: 0.00 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Total: 1.14 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Version: Feb 2 08:02:11 np0005604725 puppet-user[53076]: Config: 1770019329 Feb 2 08:02:11 np0005604725 puppet-user[53076]: Puppet: 7.10.0 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Remoteip/Apache::Mod[remoteip]/File[remoteip.load]/ensure: defined content as '{sha256}3977211787f6c6bf5629e4156b32d1dc95c37bc640452d0027b2bc9b1ec9f2d7' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Horizon/Concat[/etc/openstack-dashboard/local_settings]/File[/etc/openstack-dashboard/local_settings]/content: content changed '{sha256}600160a42cc6df505d4a1d6a0ff9cfc6a1f6541d7f483d85717f484afac19f9d' to '{sha256}940361419a0a2fa7885e6d42e56b23ee11f0cca728e1d4ae5a10c3c6ba1f7290' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/etc/httpd/conf.d/openstack-dashboard.conf]/content: content changed '{sha256}2674ec0a2b4f3412930e918216e5698d5bc877be4364105136866cad3f2ae4bb' to '{sha256}5c3c01834d94a99528a118d4a02978297ac0bf0250e0729c7e4bbd47d4865680' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Alias/File[alias.conf]/ensure: defined content as '{sha256}8c17a7de4a27d92b2aca6b156dca9e26b9e0bf31b8cc43f63c971aeed09d4e54' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Horizon::Dashboards::Heat/Concat[/etc/openstack-dashboard/local_settings.d/_1699_orchestration_settings.py]/File[/etc/openstack-dashboard/local_settings.d/_1699_orchestration_settings.py]/ensure: defined content as '{sha256}dd44da5c856beb5e53df88fc72180a79669b73c9c04d487b5033290279692113' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/content: content changed '{sha256}30de7bbf440460cde78da0e2cf1cab2404921ef0b0e926f5ebaaf973dc4252c5' to '{sha256}838e0d57b7536ffc538afd2e4d916f26ccb29380c13563d0f1ef51d676112c34' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/group: group changed 'root' to 'apache' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/mode: mode changed '0644' to '0640' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache::Mod::Alias/Apache::Mod[alias]/File[alias.load]/ensure: defined content as '{sha256}824016275330b45fd8bd04b07792de5f9aaa337f8272bfc01c5b57bb515fc9b4' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Horizon::Wsgi::Apache/Apache::Vhost[horizon_vhost]/Concat[10-horizon_vhost.conf]/File[/etc/httpd/conf.d/10-horizon_vhost.conf]/ensure: defined content as '{sha256}90aa9958f2749b4f6239a8bdf7b51b32b5878a6370692e9ea6edac111a8f0503' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: /Stage[main]/Horizon::Wsgi::Apache/Apache::Vhost[horizon_ssl_vhost]/Concat[15-horizon_ssl_vhost.conf]/File[/etc/httpd/conf.d/15-horizon_ssl_vhost.conf]/ensure: defined content as '{sha256}f48e27d0bdd47c99d780c6f704b55e86c6b9f1f1e51c5663acda8cc7b797eead' Feb 2 08:02:12 np0005604725 puppet-user[53302]: Notice: Applied catalog in 0.36 seconds Feb 2 08:02:12 np0005604725 puppet-user[53302]: Application: Feb 2 08:02:12 np0005604725 puppet-user[53302]: Initial environment: production Feb 2 08:02:12 np0005604725 puppet-user[53302]: Converged environment: production Feb 2 08:02:12 np0005604725 puppet-user[53302]: Run mode: user Feb 2 08:02:12 np0005604725 puppet-user[53302]: Changes: Feb 2 08:02:12 np0005604725 puppet-user[53302]: Total: 50 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Events: Feb 2 08:02:12 np0005604725 puppet-user[53302]: Success: 50 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Total: 50 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Resources: Feb 2 08:02:12 np0005604725 puppet-user[53302]: Skipped: 33 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Changed: 48 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Out of sync: 48 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Total: 140 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Time: Feb 2 08:02:12 np0005604725 puppet-user[53302]: Concat file: 0.00 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Concat fragment: 0.01 Feb 2 08:02:12 np0005604725 puppet-user[53302]: File: 0.17 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Transaction evaluation: 0.35 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Catalog application: 0.36 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Config retrieval: 1.07 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Last run: 1770019332 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Total: 0.36 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Version: Feb 2 08:02:12 np0005604725 puppet-user[53302]: Config: 1770019330 Feb 2 08:02:12 np0005604725 puppet-user[53302]: Puppet: 7.10.0 Feb 2 08:02:12 np0005604725 puppet-user[53545]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:12 np0005604725 puppet-user[53545]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:12 np0005604725 puppet-user[53545]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:12 np0005604725 puppet-user[53545]: (file & line not available) Feb 2 08:02:12 np0005604725 podman[54046]: 2026-02-02 08:02:12.34954297 +0000 UTC m=+0.095580710 container create 2afdbe034e3d462128557ab684c69b3147fb9458a21759c9e85eeb5504278e33 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, release=1766032510, managed_by=tripleo_ansible, container_name=container-puppet-metrics_qdr, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, architecture=x86_64, build-date=2026-01-12T22:10:14Z, com.redhat.component=openstack-qdrouterd-container, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-type=git, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, name=rhosp-rhel9/openstack-qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5) Feb 2 08:02:12 np0005604725 systemd[1]: Started libpod-conmon-2afdbe034e3d462128557ab684c69b3147fb9458a21759c9e85eeb5504278e33.scope. Feb 2 08:02:12 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:12 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/90d44b36b7bc40a7f532a48d40c6bb34d1f9beec43e89ca9d4d736d91b157bfc/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:12 np0005604725 podman[54046]: 2026-02-02 08:02:12.293479977 +0000 UTC m=+0.039517737 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Feb 2 08:02:12 np0005604725 podman[54046]: 2026-02-02 08:02:12.398989375 +0000 UTC m=+0.145027105 container init 2afdbe034e3d462128557ab684c69b3147fb9458a21759c9e85eeb5504278e33 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, vcs-type=git, container_name=container-puppet-metrics_qdr, name=rhosp-rhel9/openstack-qdrouterd, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, version=17.1.13, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, architecture=x86_64, build-date=2026-01-12T22:10:14Z, com.redhat.component=openstack-qdrouterd-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:14Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, vendor=Red Hat, Inc.) Feb 2 08:02:12 np0005604725 podman[54046]: 2026-02-02 08:02:12.408252525 +0000 UTC m=+0.154290275 container start 2afdbe034e3d462128557ab684c69b3147fb9458a21759c9e85eeb5504278e33 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=container-puppet-metrics_qdr, name=rhosp-rhel9/openstack-qdrouterd, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, distribution-scope=public, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:14Z, build-date=2026-01-12T22:10:14Z, managed_by=tripleo_ansible, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, architecture=x86_64, version=17.1.13) Feb 2 08:02:12 np0005604725 podman[54046]: 2026-02-02 08:02:12.408779359 +0000 UTC m=+0.154817109 container attach 2afdbe034e3d462128557ab684c69b3147fb9458a21759c9e85eeb5504278e33 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, description=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., architecture=x86_64, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, config_id=tripleo_puppet_step1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-qdrouterd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.5, batch=17.1_20260112.1, container_name=container-puppet-metrics_qdr, io.openshift.expose-services=, vcs-type=git, distribution-scope=public, build-date=2026-01-12T22:10:14Z, summary=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:02:12 np0005604725 puppet-user[53545]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:12 np0005604725 puppet-user[53545]: (file & line not available) Feb 2 08:02:12 np0005604725 systemd[1]: libpod-9d6a4b6e74081f4aa9bb70a90c8ed20bf3bb37049716dabb5af751336d864365.scope: Deactivated successfully. Feb 2 08:02:12 np0005604725 systemd[1]: libpod-9d6a4b6e74081f4aa9bb70a90c8ed20bf3bb37049716dabb5af751336d864365.scope: Consumed 4.266s CPU time. Feb 2 08:02:12 np0005604725 podman[53038]: 2026-02-02 08:02:12.521239344 +0000 UTC m=+4.654607972 container died 9d6a4b6e74081f4aa9bb70a90c8ed20bf3bb37049716dabb5af751336d864365 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, batch=17.1_20260112.1, build-date=2026-01-12T22:53:19Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible, io.buildah.version=1.41.5, vendor=Red Hat, Inc., version=17.1.13, url=https://www.redhat.com, container_name=container-puppet-heat, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, architecture=x86_64, release=1766032510, org.opencontainers.image.created=2026-01-12T22:53:19Z, com.redhat.component=openstack-heat-api-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, config_id=tripleo_puppet_step1, vcs-ref=755001522886c265e88561b4997cab642504a845, distribution-scope=public, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp-rhel9/openstack-heat-api, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:02:12 np0005604725 systemd[1]: var-lib-containers-storage-overlay-3134ccc544e696830a46ea9f9e89a843718d026c1554c89a68e15025566ee104-merged.mount: Deactivated successfully. Feb 2 08:02:12 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-c8fbedfa20fce777ba4e90f4183f0cfb54ae9c554f04288e29aa3e8f6b588798-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:12 np0005604725 systemd[1]: var-lib-containers-storage-overlay-597736f33a66f8fc8bb7a21e63f306c2b486ccd2274bc71911ad18f1c1353843-merged.mount: Deactivated successfully. Feb 2 08:02:12 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-9d6a4b6e74081f4aa9bb70a90c8ed20bf3bb37049716dabb5af751336d864365-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:12 np0005604725 systemd[1]: var-lib-containers-storage-overlay-8ac413a77ff42173bd9da91518b62611e4ce2a6ad3091340ef7528f90342dc6f-merged.mount: Deactivated successfully. Feb 2 08:02:12 np0005604725 podman[54133]: 2026-02-02 08:02:12.602334803 +0000 UTC m=+0.075205990 container cleanup 9d6a4b6e74081f4aa9bb70a90c8ed20bf3bb37049716dabb5af751336d864365 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, com.redhat.component=openstack-heat-api-container, name=rhosp-rhel9/openstack-heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 heat-api, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, container_name=container-puppet-heat, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_puppet_step1, vcs-ref=755001522886c265e88561b4997cab642504a845, architecture=x86_64, batch=17.1_20260112.1, io.openshift.expose-services=, build-date=2026-01-12T22:53:19Z, managed_by=tripleo_ansible, io.buildah.version=1.41.5, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, description=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:53:19Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, vcs-type=git, url=https://www.redhat.com) Feb 2 08:02:12 np0005604725 systemd[1]: libpod-conmon-9d6a4b6e74081f4aa9bb70a90c8ed20bf3bb37049716dabb5af751336d864365.scope: Deactivated successfully. Feb 2 08:02:12 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat --conmon-pidfile /run/container-puppet-heat.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line --env NAME=heat --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::engine#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Feb 2 08:02:12 np0005604725 systemd[1]: libpod-80e93408834b09f88fb9a25fc96c58d9ce2668b51cb3fa3c9ae300bfcd9f0900.scope: Deactivated successfully. Feb 2 08:02:12 np0005604725 systemd[1]: libpod-80e93408834b09f88fb9a25fc96c58d9ce2668b51cb3fa3c9ae300bfcd9f0900.scope: Consumed 3.523s CPU time. Feb 2 08:02:12 np0005604725 podman[53234]: 2026-02-02 08:02:12.685353364 +0000 UTC m=+3.952754839 container died 80e93408834b09f88fb9a25fc96c58d9ce2668b51cb3fa3c9ae300bfcd9f0900 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:41Z, com.redhat.component=openstack-horizon-container, config_id=tripleo_puppet_step1, vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, version=17.1.13, container_name=container-puppet-horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, batch=17.1_20260112.1, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 horizon, io.buildah.version=1.41.5, build-date=2026-01-12T22:34:41Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, release=1766032510, io.openshift.expose-services=) Feb 2 08:02:12 np0005604725 puppet-user[53545]: Notice: Accepting previously invalid value for target type 'Enum['sql', 'template']' Feb 2 08:02:12 np0005604725 puppet-user[53545]: Warning: Scope(Class[Keystone]): The database_connection parameter is deprecated and will be \ Feb 2 08:02:12 np0005604725 puppet-user[53545]: removed in a future realse. Use keystone::db::database_connection instead Feb 2 08:02:12 np0005604725 podman[54193]: 2026-02-02 08:02:12.756374011 +0000 UTC m=+0.062643551 container cleanup 80e93408834b09f88fb9a25fc96c58d9ce2668b51cb3fa3c9ae300bfcd9f0900 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, summary=Red Hat OpenStack Platform 17.1 horizon, com.redhat.component=openstack-horizon-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, build-date=2026-01-12T22:34:41Z, url=https://www.redhat.com, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 horizon, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, io.openshift.expose-services=, release=1766032510, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.buildah.version=1.41.5, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:41Z, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, distribution-scope=public, container_name=container-puppet-horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, tcib_managed=true) Feb 2 08:02:12 np0005604725 systemd[1]: libpod-conmon-80e93408834b09f88fb9a25fc96c58d9ce2668b51cb3fa3c9ae300bfcd9f0900.scope: Deactivated successfully. Feb 2 08:02:12 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-horizon --conmon-pidfile /run/container-puppet-horizon.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,horizon_config --env NAME=horizon --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::horizon#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-horizon --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-horizon.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Feb 2 08:02:12 np0005604725 podman[54293]: 2026-02-02 08:02:12.975702322 +0000 UTC m=+0.069832596 container create 819598dd60b9d247b3640f1c78287685eda7a196cec258d524403425f3325a06 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, release=1766032510, com.redhat.component=openstack-memcached-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 memcached, name=rhosp-rhel9/openstack-memcached, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:12:26Z, container_name=container-puppet-memcached, io.openshift.expose-services=, batch=17.1_20260112.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public, build-date=2026-01-12T22:12:26Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, maintainer=OpenStack TripleO Team) Feb 2 08:02:13 np0005604725 systemd[1]: Started libpod-conmon-819598dd60b9d247b3640f1c78287685eda7a196cec258d524403425f3325a06.scope. Feb 2 08:02:13 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:13 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/2b97d7fd2eefc0c459424f00e817289585973f85694f6d25411516a4db105160/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:13 np0005604725 podman[54293]: 2026-02-02 08:02:13.034971141 +0000 UTC m=+0.129101425 container init 819598dd60b9d247b3640f1c78287685eda7a196cec258d524403425f3325a06 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, name=rhosp-rhel9/openstack-memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, build-date=2026-01-12T22:12:26Z, description=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:12:26Z, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, container_name=container-puppet-memcached, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, release=1766032510, config_id=tripleo_puppet_step1, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., batch=17.1_20260112.1, com.redhat.component=openstack-memcached-container, managed_by=tripleo_ansible, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 memcached) Feb 2 08:02:13 np0005604725 podman[54293]: 2026-02-02 08:02:13.042073242 +0000 UTC m=+0.136203516 container start 819598dd60b9d247b3640f1c78287685eda7a196cec258d524403425f3325a06 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, name=rhosp-rhel9/openstack-memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, maintainer=OpenStack TripleO Team, tcib_managed=true, com.redhat.component=openstack-memcached-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, container_name=container-puppet-memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, url=https://www.redhat.com, version=17.1.13, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 memcached, description=Red Hat OpenStack Platform 17.1 memcached, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.created=2026-01-12T22:12:26Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.openshift.expose-services=, build-date=2026-01-12T22:12:26Z) Feb 2 08:02:13 np0005604725 podman[54293]: 2026-02-02 08:02:13.042257187 +0000 UTC m=+0.136387481 container attach 819598dd60b9d247b3640f1c78287685eda7a196cec258d524403425f3325a06 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, distribution-scope=public, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, com.redhat.component=openstack-memcached-container, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, container_name=container-puppet-memcached, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-memcached, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:12:26Z, url=https://www.redhat.com, io.openshift.expose-services=, version=17.1.13, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 memcached, description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, managed_by=tripleo_ansible, build-date=2026-01-12T22:12:26Z) Feb 2 08:02:13 np0005604725 podman[54293]: 2026-02-02 08:02:12.942927227 +0000 UTC m=+0.037057511 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Feb 2 08:02:13 np0005604725 podman[54311]: 2026-02-02 08:02:13.11383466 +0000 UTC m=+0.175149879 container create 58853c66d60c12a147685e299d91cb4922661e731be714bc87da053321e24eb0 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, container_name=container-puppet-mysql, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, com.redhat.component=openstack-mariadb-container, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-type=git, io.buildah.version=1.41.5, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:18Z, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, maintainer=OpenStack TripleO Team, tcib_managed=true, url=https://www.redhat.com, architecture=x86_64, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Feb 2 08:02:13 np0005604725 podman[54365]: 2026-02-02 08:02:13.146189183 +0000 UTC m=+0.070826093 container create d8ea9fd00ae3fba14f49047dde6e3c15eb7a4ef7c6140439efca85df5d667ed3 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, io.openshift.expose-services=, batch=17.1_20260112.1, tcib_managed=true, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, build-date=2026-01-12T22:57:35Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, summary=Red Hat OpenStack Platform 17.1 neutron-server, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, version=17.1.13, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, distribution-scope=public, container_name=container-puppet-neutron, org.opencontainers.image.created=2026-01-12T22:57:35Z, description=Red Hat OpenStack Platform 17.1 neutron-server, name=rhosp-rhel9/openstack-neutron-server, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5) Feb 2 08:02:13 np0005604725 systemd[1]: Started libpod-conmon-58853c66d60c12a147685e299d91cb4922661e731be714bc87da053321e24eb0.scope. Feb 2 08:02:13 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:13 np0005604725 systemd[1]: Started libpod-conmon-d8ea9fd00ae3fba14f49047dde6e3c15eb7a4ef7c6140439efca85df5d667ed3.scope. Feb 2 08:02:13 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/392f25d06919edb8abbe78773eee2f525538c51907d1643a43f0eea009c3179f/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:13 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:13 np0005604725 podman[54311]: 2026-02-02 08:02:13.175826683 +0000 UTC m=+0.237141902 container init 58853c66d60c12a147685e299d91cb4922661e731be714bc87da053321e24eb0 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, batch=17.1_20260112.1, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.created=2026-01-12T22:10:18Z, tcib_managed=true, vcs-type=git, name=rhosp-rhel9/openstack-mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:18Z, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, container_name=container-puppet-mysql, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, managed_by=tripleo_ansible, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-mariadb-container) Feb 2 08:02:13 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/4f58c9cbe84816d7c842a9279ad8e2fd52a22f676865b63890485cf39d7ab4dd/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:13 np0005604725 podman[54311]: 2026-02-02 08:02:13.181379653 +0000 UTC m=+0.242694872 container start 58853c66d60c12a147685e299d91cb4922661e731be714bc87da053321e24eb0 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, release=1766032510, name=rhosp-rhel9/openstack-mariadb, distribution-scope=public, url=https://www.redhat.com, batch=17.1_20260112.1, tcib_managed=true, version=17.1.13, architecture=x86_64, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:18Z, com.redhat.component=openstack-mariadb-container, managed_by=tripleo_ansible, container_name=container-puppet-mysql, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, config_id=tripleo_puppet_step1) Feb 2 08:02:13 np0005604725 podman[54311]: 2026-02-02 08:02:13.181543517 +0000 UTC m=+0.242858756 container attach 58853c66d60c12a147685e299d91cb4922661e731be714bc87da053321e24eb0 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, batch=17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, architecture=x86_64, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:18Z, container_name=container-puppet-mysql, tcib_managed=true, vcs-type=git, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-mariadb, release=1766032510, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-mariadb-container, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z) Feb 2 08:02:13 np0005604725 podman[54311]: 2026-02-02 08:02:13.08457056 +0000 UTC m=+0.145885789 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Feb 2 08:02:13 np0005604725 podman[54365]: 2026-02-02 08:02:13.110201732 +0000 UTC m=+0.034838662 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Feb 2 08:02:13 np0005604725 podman[54365]: 2026-02-02 08:02:13.233646314 +0000 UTC m=+0.158283244 container init d8ea9fd00ae3fba14f49047dde6e3c15eb7a4ef7c6140439efca85df5d667ed3 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, summary=Red Hat OpenStack Platform 17.1 neutron-server, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, release=1766032510, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.buildah.version=1.41.5, distribution-scope=public, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, name=rhosp-rhel9/openstack-neutron-server, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 neutron-server, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, maintainer=OpenStack TripleO Team, version=17.1.13, com.redhat.component=openstack-neutron-server-container, container_name=container-puppet-neutron, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, build-date=2026-01-12T22:57:35Z) Feb 2 08:02:13 np0005604725 podman[54365]: 2026-02-02 08:02:13.24463396 +0000 UTC m=+0.169270870 container start d8ea9fd00ae3fba14f49047dde6e3c15eb7a4ef7c6140439efca85df5d667ed3 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, url=https://www.redhat.com, build-date=2026-01-12T22:57:35Z, tcib_managed=true, io.openshift.expose-services=, container_name=container-puppet-neutron, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, release=1766032510, com.redhat.component=openstack-neutron-server-container, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_puppet_step1, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:57:35Z, name=rhosp-rhel9/openstack-neutron-server, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 neutron-server) Feb 2 08:02:13 np0005604725 podman[54365]: 2026-02-02 08:02:13.244834256 +0000 UTC m=+0.169471166 container attach d8ea9fd00ae3fba14f49047dde6e3c15eb7a4ef7c6140439efca85df5d667ed3 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, config_id=tripleo_puppet_step1, com.redhat.component=openstack-neutron-server-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, managed_by=tripleo_ansible, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, architecture=x86_64, distribution-scope=public, container_name=container-puppet-neutron, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:57:35Z, summary=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, tcib_managed=true, vcs-type=git, release=1766032510, batch=17.1_20260112.1, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, version=17.1.13, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, org.opencontainers.image.created=2026-01-12T22:57:35Z, name=rhosp-rhel9/openstack-neutron-server, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 neutron-server) Feb 2 08:02:13 np0005604725 puppet-user[53852]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:13 np0005604725 puppet-user[53852]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:13 np0005604725 puppet-user[53852]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:13 np0005604725 puppet-user[53852]: (file & line not available) Feb 2 08:02:13 np0005604725 systemd[1]: var-lib-containers-storage-overlay-21f04f46c09dfa30cd1678ec1503c83b85aeb449a62b5f26fcd34304b9b4b638-merged.mount: Deactivated successfully. Feb 2 08:02:13 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-80e93408834b09f88fb9a25fc96c58d9ce2668b51cb3fa3c9ae300bfcd9f0900-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:13 np0005604725 puppet-user[53852]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:13 np0005604725 puppet-user[53852]: (file & line not available) Feb 2 08:02:13 np0005604725 puppet-user[53545]: Warning: Scope(Apache::Vhost[keystone_wsgi]): Feb 2 08:02:13 np0005604725 puppet-user[53545]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Feb 2 08:02:13 np0005604725 puppet-user[53545]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Feb 2 08:02:13 np0005604725 puppet-user[53545]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Feb 2 08:02:13 np0005604725 puppet-user[53545]: file names. Feb 2 08:02:13 np0005604725 puppet-user[53545]: Feb 2 08:02:13 np0005604725 puppet-user[53545]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Feb 2 08:02:13 np0005604725 puppet-user[53545]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Feb 2 08:02:13 np0005604725 puppet-user[53545]: sanitized $servername parameter when not explicitly defined. Feb 2 08:02:13 np0005604725 puppet-user[53545]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 1.44 seconds Feb 2 08:02:13 np0005604725 puppet-user[53852]: Warning: Scope(Class[Manila]): The sql_connection parameter is deprecated and will be \ Feb 2 08:02:13 np0005604725 puppet-user[53852]: removed in a future realse. Use manila::db::database_connection instead Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Keystone_config[token/expiration]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/enable]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/certfile]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/keyfile]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/ca_certs]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/ca_key]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/cert_subject]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Keystone_config[catalog/driver]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Keystone_config[catalog/template_file]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Keystone_config[token/provider]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Keystone_config[DEFAULT/notification_format]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys/0]/ensure: defined content as '{sha256}d23759aaa495432ee2291f55fd0b655923ff2be661a39911b28621ca9be12f19' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys/1]/ensure: defined content as '{sha256}593ca72c88b0e54d0e2df89407d6a49539eb3e52fb2dea0065d5d19cceb8add8' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys/0]/ensure: defined content as '{sha256}fe270305cf4e28a2bc78c7462166dda8af1043d824ce50773f535f7fc5bd97b4' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys/1]/ensure: defined content as '{sha256}ce8655f2bcf8ac8c436ccf798ff741cdf54a3225045da158c9e0d5500fe8344a' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Keystone_config[fernet_tokens/key_repository]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Keystone_config[token/revoke_by_id]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Keystone_config[fernet_tokens/max_active_keys]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Keystone_config[credential/key_repository]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone::Cron::Trust_flush/Cron[keystone-manage trust_flush]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/backend]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/backend_argument]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/enabled]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/memcache_servers]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[54125]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:14 np0005604725 puppet-user[54125]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:14 np0005604725 puppet-user[54125]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:14 np0005604725 puppet-user[54125]: (file & line not available) Feb 2 08:02:14 np0005604725 puppet-user[54125]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:14 np0005604725 puppet-user[54125]: (file & line not available) Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/tls_enabled]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[54125]: Notice: Accepting previously invalid value for target type 'Integer' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone::Logging/Oslo::Log[keystone_config]/Keystone_config[DEFAULT/debug]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone::Logging/Oslo::Log[keystone_config]/Keystone_config[DEFAULT/log_dir]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[54125]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.12 seconds Feb 2 08:02:14 np0005604725 puppet-user[54125]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/owner: owner changed 'qdrouterd' to 'root' Feb 2 08:02:14 np0005604725 puppet-user[54125]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/group: group changed 'qdrouterd' to 'root' Feb 2 08:02:14 np0005604725 puppet-user[54125]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/mode: mode changed '0700' to '0755' Feb 2 08:02:14 np0005604725 puppet-user[54125]: Notice: /Stage[main]/Qdr::Config/File[/etc/qpid-dispatch/ssl]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[54125]: Notice: /Stage[main]/Qdr::Config/File[qdrouterd.conf]/content: content changed '{sha256}89e10d8896247f992c5f0baf027c25a8ca5d0441be46d8859d9db2067ea74cd3' to '{sha256}c0b7bfb8457f5a5a9103f8466f549d649c746b7c5e0beda4666ecae130fd0633' Feb 2 08:02:14 np0005604725 puppet-user[54125]: Notice: /Stage[main]/Qdr::Config/File[/var/log/qdrouterd]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[54125]: Notice: /Stage[main]/Qdr::Config/File[/var/log/qdrouterd/metrics_qdr.log]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[54125]: Notice: Applied catalog in 0.03 seconds Feb 2 08:02:14 np0005604725 puppet-user[54125]: Application: Feb 2 08:02:14 np0005604725 puppet-user[54125]: Initial environment: production Feb 2 08:02:14 np0005604725 puppet-user[54125]: Converged environment: production Feb 2 08:02:14 np0005604725 puppet-user[54125]: Run mode: user Feb 2 08:02:14 np0005604725 puppet-user[54125]: Changes: Feb 2 08:02:14 np0005604725 puppet-user[54125]: Total: 7 Feb 2 08:02:14 np0005604725 puppet-user[54125]: Events: Feb 2 08:02:14 np0005604725 puppet-user[54125]: Success: 7 Feb 2 08:02:14 np0005604725 puppet-user[54125]: Total: 7 Feb 2 08:02:14 np0005604725 puppet-user[54125]: Resources: Feb 2 08:02:14 np0005604725 puppet-user[54125]: Skipped: 13 Feb 2 08:02:14 np0005604725 puppet-user[54125]: Changed: 5 Feb 2 08:02:14 np0005604725 puppet-user[54125]: Out of sync: 5 Feb 2 08:02:14 np0005604725 puppet-user[54125]: Total: 20 Feb 2 08:02:14 np0005604725 puppet-user[54125]: Time: Feb 2 08:02:14 np0005604725 puppet-user[54125]: File: 0.01 Feb 2 08:02:14 np0005604725 puppet-user[54125]: Transaction evaluation: 0.02 Feb 2 08:02:14 np0005604725 puppet-user[54125]: Catalog application: 0.03 Feb 2 08:02:14 np0005604725 puppet-user[54125]: Config retrieval: 0.15 Feb 2 08:02:14 np0005604725 puppet-user[54125]: Last run: 1770019334 Feb 2 08:02:14 np0005604725 puppet-user[54125]: Total: 0.03 Feb 2 08:02:14 np0005604725 puppet-user[54125]: Version: Feb 2 08:02:14 np0005604725 puppet-user[54125]: Config: 1770019334 Feb 2 08:02:14 np0005604725 puppet-user[54125]: Puppet: 7.10.0 Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone::Policy/Oslo::Policy[keystone_config]/Keystone_config[oslo_policy/policy_file]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/connection]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53852]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/manila/manifests/share.pp, line: 50, column: 18) Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/max_retries]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53852]: Warning: Unknown variable: 'manila_generic_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 292, column: 48) Feb 2 08:02:14 np0005604725 puppet-user[53852]: Warning: Unknown variable: 'manila_netapp_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 294, column: 39) Feb 2 08:02:14 np0005604725 puppet-user[53852]: Warning: Unknown variable: 'manila_vmax_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 295, column: 39) Feb 2 08:02:14 np0005604725 puppet-user[53852]: Warning: Unknown variable: 'manila_powermax_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 296, column: 39) Feb 2 08:02:14 np0005604725 puppet-user[53852]: Warning: Unknown variable: 'manila_isilon_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 297, column: 39) Feb 2 08:02:14 np0005604725 puppet-user[53852]: Warning: Unknown variable: 'manila_unity_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 298, column: 39) Feb 2 08:02:14 np0005604725 puppet-user[53852]: Warning: Unknown variable: 'manila_vnx_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 299, column: 39) Feb 2 08:02:14 np0005604725 puppet-user[53852]: Warning: Unknown variable: 'manila_flashblade_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 300, column: 39) Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/db_max_retries]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Oslo::Middleware[keystone_config]/Keystone_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Default[keystone_config]/Keystone_config[DEFAULT/transport_url]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/driver]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/transport_url]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/topics]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Rabbit[keystone_config]/Keystone_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Rabbit[keystone_config]/Keystone_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Feb 2 08:02:14 np0005604725 systemd[1]: libpod-2afdbe034e3d462128557ab684c69b3147fb9458a21759c9e85eeb5504278e33.scope: Deactivated successfully. Feb 2 08:02:14 np0005604725 systemd[1]: libpod-2afdbe034e3d462128557ab684c69b3147fb9458a21759c9e85eeb5504278e33.scope: Consumed 2.235s CPU time. Feb 2 08:02:14 np0005604725 podman[54046]: 2026-02-02 08:02:14.792315533 +0000 UTC m=+2.538353283 container died 2afdbe034e3d462128557ab684c69b3147fb9458a21759c9e85eeb5504278e33 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, release=1766032510, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-qdrouterd, distribution-scope=public, com.redhat.component=openstack-qdrouterd-container, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=container-puppet-metrics_qdr, version=17.1.13, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_puppet_step1, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, build-date=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5) Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}ec43d02c49dc525a4886d89314c16acacf6345a98726a4b57dff49f2bed88209' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}224e1913534a5aab220e4f36b9f9b1513fe7e3b433c6daefef7dba0ff5103b42' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Feb 2 08:02:14 np0005604725 puppet-user[54367]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:14 np0005604725 puppet-user[54367]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:14 np0005604725 puppet-user[54367]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:14 np0005604725 puppet-user[54367]: (file & line not available) Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Feb 2 08:02:14 np0005604725 systemd[1]: var-lib-containers-storage-overlay-90d44b36b7bc40a7f532a48d40c6bb34d1f9beec43e89ca9d4d736d91b157bfc-merged.mount: Deactivated successfully. Feb 2 08:02:14 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-2afdbe034e3d462128557ab684c69b3147fb9458a21759c9e85eeb5504278e33-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Feb 2 08:02:14 np0005604725 podman[54608]: 2026-02-02 08:02:14.8944387 +0000 UTC m=+0.091961743 container cleanup 2afdbe034e3d462128557ab684c69b3147fb9458a21759c9e85eeb5504278e33 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-qdrouterd, build-date=2026-01-12T22:10:14Z, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=container-puppet-metrics_qdr, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, release=1766032510, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, vcs-type=git, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.created=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-qdrouterd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, io.openshift.expose-services=, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Feb 2 08:02:14 np0005604725 puppet-user[54367]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:14 np0005604725 puppet-user[54367]: (file & line not available) Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/File[/var/www/cgi-bin/keystone]/group: group changed 'root' to 'keystone' Feb 2 08:02:14 np0005604725 systemd[1]: libpod-conmon-2afdbe034e3d462128557ab684c69b3147fb9458a21759c9e85eeb5504278e33.scope: Deactivated successfully. Feb 2 08:02:14 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-metrics_qdr --conmon-pidfile /run/container-puppet-metrics_qdr.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron --env NAME=metrics_qdr --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::metrics::qdr#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-metrics_qdr --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-metrics_qdr.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/File[keystone_wsgi]/ensure: defined content as '{sha256}55e95baab868583f1b6646e2dcc61edb7f403991f97d4397478e9a9dd3e7d1f2' Feb 2 08:02:14 np0005604725 puppet-user[53852]: Warning: Scope(Apache::Vhost[manila_wsgi]): Feb 2 08:02:14 np0005604725 puppet-user[53852]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Feb 2 08:02:14 np0005604725 puppet-user[53852]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Feb 2 08:02:14 np0005604725 puppet-user[53852]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Feb 2 08:02:14 np0005604725 puppet-user[53852]: file names. Feb 2 08:02:14 np0005604725 puppet-user[53852]: Feb 2 08:02:14 np0005604725 puppet-user[53852]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Feb 2 08:02:14 np0005604725 puppet-user[53852]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Feb 2 08:02:14 np0005604725 puppet-user[53852]: sanitized $servername parameter when not explicitly defined. Feb 2 08:02:14 np0005604725 puppet-user[54367]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.10 seconds Feb 2 08:02:14 np0005604725 puppet-user[54418]: Error: Facter: error while resolving custom fact "haproxy_version": undefined method `strip' for nil:NilClass Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/auth_mellon.conf]/ensure: removed Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/auth_openidc.conf]/ensure: removed Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Feb 2 08:02:14 np0005604725 puppet-user[54367]: Notice: /Stage[main]/Memcached/File[/etc/sysconfig/memcached]/content: content changed '{sha256}31f7d20fad86bdd2bc5692619928af8785dc0e9f858863aeece67cff0e4edfd2' to '{sha256}7c2650287cf20687426421456e794d4ae5d8cee06a9adca8c03a7539178461d8' Feb 2 08:02:14 np0005604725 ovs-vsctl[54708]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Feb 2 08:02:14 np0005604725 puppet-user[54367]: Notice: Applied catalog in 0.01 seconds Feb 2 08:02:14 np0005604725 puppet-user[54367]: Application: Feb 2 08:02:14 np0005604725 puppet-user[54367]: Initial environment: production Feb 2 08:02:14 np0005604725 puppet-user[54367]: Converged environment: production Feb 2 08:02:14 np0005604725 puppet-user[54367]: Run mode: user Feb 2 08:02:14 np0005604725 puppet-user[54367]: Changes: Feb 2 08:02:14 np0005604725 puppet-user[54367]: Total: 1 Feb 2 08:02:14 np0005604725 puppet-user[54367]: Events: Feb 2 08:02:14 np0005604725 puppet-user[54367]: Success: 1 Feb 2 08:02:14 np0005604725 puppet-user[54367]: Total: 1 Feb 2 08:02:14 np0005604725 puppet-user[54367]: Resources: Feb 2 08:02:14 np0005604725 puppet-user[54367]: Changed: 1 Feb 2 08:02:14 np0005604725 puppet-user[54367]: Out of sync: 1 Feb 2 08:02:14 np0005604725 puppet-user[54367]: Skipped: 9 Feb 2 08:02:14 np0005604725 puppet-user[54367]: Total: 10 Feb 2 08:02:14 np0005604725 puppet-user[54367]: Time: Feb 2 08:02:14 np0005604725 puppet-user[54367]: File: 0.01 Feb 2 08:02:14 np0005604725 puppet-user[54367]: Transaction evaluation: 0.01 Feb 2 08:02:14 np0005604725 puppet-user[54367]: Catalog application: 0.01 Feb 2 08:02:14 np0005604725 puppet-user[54367]: Config retrieval: 0.12 Feb 2 08:02:14 np0005604725 puppet-user[54367]: Last run: 1770019334 Feb 2 08:02:14 np0005604725 puppet-user[54367]: Total: 0.01 Feb 2 08:02:14 np0005604725 puppet-user[54367]: Version: Feb 2 08:02:14 np0005604725 puppet-user[54367]: Config: 1770019334 Feb 2 08:02:14 np0005604725 puppet-user[54367]: Puppet: 7.10.0 Feb 2 08:02:14 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_gssapi.conf]/ensure: removed Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_mellon.conf]/ensure: removed Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_openidc.conf]/ensure: removed Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/Apache::Vhost[keystone_wsgi]/Concat[10-keystone_wsgi.conf]/File[/etc/httpd/conf.d/10-keystone_wsgi.conf]/ensure: defined content as '{sha256}201c8e281ba264b1883b56de11e227248c2c79035d49964e54fa711511fcbeb4' Feb 2 08:02:15 np0005604725 puppet-user[53545]: Notice: Applied catalog in 1.16 seconds Feb 2 08:02:15 np0005604725 puppet-user[53545]: Application: Feb 2 08:02:15 np0005604725 puppet-user[53545]: Initial environment: production Feb 2 08:02:15 np0005604725 puppet-user[53545]: Converged environment: production Feb 2 08:02:15 np0005604725 puppet-user[53545]: Run mode: user Feb 2 08:02:15 np0005604725 puppet-user[53545]: Changes: Feb 2 08:02:15 np0005604725 puppet-user[53545]: Total: 88 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Events: Feb 2 08:02:15 np0005604725 puppet-user[53545]: Success: 88 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Total: 88 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Resources: Feb 2 08:02:15 np0005604725 puppet-user[53545]: Skipped: 31 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Changed: 88 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Out of sync: 88 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Total: 279 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Time: Feb 2 08:02:15 np0005604725 puppet-user[53545]: Concat file: 0.00 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Concat fragment: 0.00 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Cron: 0.01 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Augeas: 0.02 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Package: 0.02 Feb 2 08:02:15 np0005604725 puppet-user[53545]: File: 0.14 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Keystone config: 0.71 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Transaction evaluation: 1.15 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Catalog application: 1.16 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Config retrieval: 1.64 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Last run: 1770019335 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Resources: 0.00 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Total: 1.16 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Version: Feb 2 08:02:15 np0005604725 puppet-user[53545]: Config: 1770019332 Feb 2 08:02:15 np0005604725 puppet-user[53545]: Puppet: 7.10.0 Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 1.58 seconds Feb 2 08:02:15 np0005604725 puppet-user[54418]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:15 np0005604725 puppet-user[54418]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:15 np0005604725 puppet-user[54418]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:15 np0005604725 puppet-user[54418]: (file & line not available) Feb 2 08:02:15 np0005604725 puppet-user[54418]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:15 np0005604725 puppet-user[54418]: (file & line not available) Feb 2 08:02:15 np0005604725 puppet-user[54418]: Warning: Unknown variable: 'dhcp_agents_per_net'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/neutron.pp, line: 154, column: 37) Feb 2 08:02:15 np0005604725 podman[54819]: 2026-02-02 08:02:15.244945961 +0000 UTC m=+0.059164238 container create 196dede859dfa5374799a52f0ef0517408765511e42e239f04c610ed542a972d (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, architecture=x86_64, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, version=17.1.13, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, url=https://www.redhat.com, release=1766032510, name=rhosp-rhel9/openstack-nova-api, container_name=container-puppet-nova, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, io.buildah.version=1.41.5, build-date=2026-01-12T23:31:50Z, maintainer=OpenStack TripleO Team) Feb 2 08:02:15 np0005604725 systemd[1]: Started libpod-conmon-196dede859dfa5374799a52f0ef0517408765511e42e239f04c610ed542a972d.scope. Feb 2 08:02:15 np0005604725 systemd[1]: libpod-819598dd60b9d247b3640f1c78287685eda7a196cec258d524403425f3325a06.scope: Deactivated successfully. Feb 2 08:02:15 np0005604725 systemd[1]: libpod-819598dd60b9d247b3640f1c78287685eda7a196cec258d524403425f3325a06.scope: Consumed 2.096s CPU time. Feb 2 08:02:15 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:15 np0005604725 podman[54293]: 2026-02-02 08:02:15.280552881 +0000 UTC m=+2.374683185 container died 819598dd60b9d247b3640f1c78287685eda7a196cec258d524403425f3325a06 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, distribution-scope=public, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-memcached, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, version=17.1.13, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:12:26Z, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, summary=Red Hat OpenStack Platform 17.1 memcached, description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, config_id=tripleo_puppet_step1, container_name=container-puppet-memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, build-date=2026-01-12T22:12:26Z, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, vcs-type=git, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:02:15 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/2998d98e19fd3d37fc5a32c52789c88de0795a44228d2ac288522c8b937a2d9d/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:15 np0005604725 podman[54819]: 2026-02-02 08:02:15.288609068 +0000 UTC m=+0.102827365 container init 196dede859dfa5374799a52f0ef0517408765511e42e239f04c610ed542a972d (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, build-date=2026-01-12T23:31:50Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, tcib_managed=true, version=17.1.13, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, com.redhat.component=openstack-nova-api-container, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp-rhel9/openstack-nova-api, architecture=x86_64, vcs-type=git, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, container_name=container-puppet-nova, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_puppet_step1, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:02:15 np0005604725 podman[54819]: 2026-02-02 08:02:15.295235638 +0000 UTC m=+0.109453925 container start 196dede859dfa5374799a52f0ef0517408765511e42e239f04c610ed542a972d (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, container_name=container-puppet-nova, tcib_managed=true, com.redhat.component=openstack-nova-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, config_id=tripleo_puppet_step1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., distribution-scope=public, name=rhosp-rhel9/openstack-nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, url=https://www.redhat.com, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, build-date=2026-01-12T23:31:50Z, io.openshift.expose-services=) Feb 2 08:02:15 np0005604725 podman[54819]: 2026-02-02 08:02:15.295415823 +0000 UTC m=+0.109634150 container attach 196dede859dfa5374799a52f0ef0517408765511e42e239f04c610ed542a972d (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, config_id=tripleo_puppet_step1, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, release=1766032510, distribution-scope=public, org.opencontainers.image.created=2026-01-12T23:31:50Z, build-date=2026-01-12T23:31:50Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-nova-api, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, com.redhat.component=openstack-nova-api-container, version=17.1.13, container_name=container-puppet-nova, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64) Feb 2 08:02:15 np0005604725 podman[54819]: 2026-02-02 08:02:15.211912539 +0000 UTC m=+0.026130836 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:02:15 np0005604725 podman[54852]: 2026-02-02 08:02:15.340263233 +0000 UTC m=+0.049590300 container cleanup 819598dd60b9d247b3640f1c78287685eda7a196cec258d524403425f3325a06 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:12:26Z, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-memcached, io.buildah.version=1.41.5, com.redhat.component=openstack-memcached-container, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, build-date=2026-01-12T22:12:26Z, container_name=container-puppet-memcached, distribution-scope=public, managed_by=tripleo_ansible, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached) Feb 2 08:02:15 np0005604725 systemd[1]: libpod-conmon-819598dd60b9d247b3640f1c78287685eda7a196cec258d524403425f3325a06.scope: Deactivated successfully. Feb 2 08:02:15 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-memcached --conmon-pidfile /run/container-puppet-memcached.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=memcached --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::memcached#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-memcached --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-memcached.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/api_paste_config]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/storage_availability_zone]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/rootwrap_config]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/state_path]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/host]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[54403]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:15 np0005604725 puppet-user[54403]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:15 np0005604725 puppet-user[54403]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:15 np0005604725 puppet-user[54403]: (file & line not available) Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/osapi_share_listen]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/enabled_share_protocols]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/default_share_type]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/osapi_share_workers]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/auth_strategy]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Cron::Db_purge/Cron[manila-manage db purge]/ensure: created Feb 2 08:02:15 np0005604725 systemd[1]: libpod-e1a02c9fff0bcca444629d77e1cb43140adea2bf69e882dd2d83822ff16049d3.scope: Deactivated successfully. Feb 2 08:02:15 np0005604725 systemd[1]: libpod-e1a02c9fff0bcca444629d77e1cb43140adea2bf69e882dd2d83822ff16049d3.scope: Consumed 4.991s CPU time. Feb 2 08:02:15 np0005604725 podman[53513]: 2026-02-02 08:02:15.674858323 +0000 UTC m=+5.467320008 container died e1a02c9fff0bcca444629d77e1cb43140adea2bf69e882dd2d83822ff16049d3 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, com.redhat.component=openstack-keystone-container, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, vcs-ref=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:33:53Z, org.opencontainers.image.created=2026-01-12T22:33:53Z, summary=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, container_name=container-puppet-keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, architecture=x86_64, release=1766032510, url=https://www.redhat.com, distribution-scope=public, version=17.1.13, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/auth_url]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/auth_type]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/region_name]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[54403]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:15 np0005604725 puppet-user[54403]: (file & line not available) Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/username]/ensure: created Feb 2 08:02:15 np0005604725 podman[55016]: 2026-02-02 08:02:15.706806386 +0000 UTC m=+0.078061748 container create 24fcc2553b2fe6883e1147e83afb746846b02e2c56d4b0b83ae8821c8acebf66 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-nova-api, config_id=tripleo_puppet_step1, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, managed_by=tripleo_ansible, tcib_managed=true, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T23:31:50Z, com.redhat.component=openstack-nova-api-container, batch=17.1_20260112.1, io.buildah.version=1.41.5, distribution-scope=public, architecture=x86_64, container_name=container-puppet-nova_metadata, build-date=2026-01-12T23:31:50Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, version=17.1.13) Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/user_domain_name]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/password]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/project_name]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/project_domain_name]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_api_class]/ensure: created Feb 2 08:02:15 np0005604725 systemd[1]: Started libpod-conmon-24fcc2553b2fe6883e1147e83afb746846b02e2c56d4b0b83ae8821c8acebf66.scope. Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/auth_url]/ensure: created Feb 2 08:02:15 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:15 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b5cc6e714ec56ed6c408692170f0a27a1f11b97ea45c188bc609c3b312a29f3d/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:15 np0005604725 podman[55016]: 2026-02-02 08:02:15.675773578 +0000 UTC m=+0.047028950 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/auth_type]/ensure: created Feb 2 08:02:15 np0005604725 podman[55016]: 2026-02-02 08:02:15.791836351 +0000 UTC m=+0.163091713 container init 24fcc2553b2fe6883e1147e83afb746846b02e2c56d4b0b83ae8821c8acebf66 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_puppet_step1, batch=17.1_20260112.1, io.openshift.expose-services=, com.redhat.component=openstack-nova-api-container, io.buildah.version=1.41.5, container_name=container-puppet-nova_metadata, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, url=https://www.redhat.com, version=17.1.13, release=1766032510, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T23:31:50Z, distribution-scope=public, tcib_managed=true) Feb 2 08:02:15 np0005604725 podman[55036]: 2026-02-02 08:02:15.795307595 +0000 UTC m=+0.109204699 container cleanup e1a02c9fff0bcca444629d77e1cb43140adea2bf69e882dd2d83822ff16049d3 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, io.openshift.expose-services=, com.redhat.component=openstack-keystone-container, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:33:53Z, release=1766032510, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-keystone, url=https://www.redhat.com, version=17.1.13, batch=17.1_20260112.1, container_name=container-puppet-keystone, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, tcib_managed=true, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_puppet_step1, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:33:53Z, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/region_name]/ensure: created Feb 2 08:02:15 np0005604725 podman[55016]: 2026-02-02 08:02:15.797240947 +0000 UTC m=+0.168496309 container start 24fcc2553b2fe6883e1147e83afb746846b02e2c56d4b0b83ae8821c8acebf66 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., container_name=container-puppet-nova_metadata, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_puppet_step1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, vcs-type=git, org.opencontainers.image.created=2026-01-12T23:31:50Z, com.redhat.component=openstack-nova-api-container, url=https://www.redhat.com, build-date=2026-01-12T23:31:50Z) Feb 2 08:02:15 np0005604725 podman[55016]: 2026-02-02 08:02:15.797460683 +0000 UTC m=+0.168716045 container attach 24fcc2553b2fe6883e1147e83afb746846b02e2c56d4b0b83ae8821c8acebf66 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-api, container_name=container-puppet-nova_metadata, version=17.1.13, maintainer=OpenStack TripleO Team, build-date=2026-01-12T23:31:50Z, distribution-scope=public, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-nova-api-container, summary=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.5, vcs-type=git, architecture=x86_64) Feb 2 08:02:15 np0005604725 systemd[1]: libpod-conmon-e1a02c9fff0bcca444629d77e1cb43140adea2bf69e882dd2d83822ff16049d3.scope: Deactivated successfully. Feb 2 08:02:15 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-keystone --conmon-pidfile /run/container-puppet-keystone.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config --env NAME=keystone --env STEP_CONFIG=include ::tripleo::packages#012['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }#012include tripleo::profile::base::keystone#012#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-keystone --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-keystone.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/username]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/user_domain_name]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/password]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/project_name]/ensure: created Feb 2 08:02:15 np0005604725 systemd[1]: var-lib-containers-storage-overlay-2b97d7fd2eefc0c459424f00e817289585973f85694f6d25411516a4db105160-merged.mount: Deactivated successfully. Feb 2 08:02:15 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-819598dd60b9d247b3640f1c78287685eda7a196cec258d524403425f3325a06-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:15 np0005604725 systemd[1]: var-lib-containers-storage-overlay-81ebe59a2c856f90a654d1846b5509ca69f0d303b4cdc469680de66c5bfc7199-merged.mount: Deactivated successfully. Feb 2 08:02:15 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-e1a02c9fff0bcca444629d77e1cb43140adea2bf69e882dd2d83822ff16049d3-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/project_domain_name]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_plugin_ipv4_enabled]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_plugin_ipv6_enabled]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Backends/Manila_config[DEFAULT/enabled_share_backends]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[54403]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.40 seconds Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/connection]/ensure: created Feb 2 08:02:15 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/max_retries]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[54403]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Mysql_bundle/File[/root/.my.cnf]/ensure: defined content as '{sha256}5eaf111f7c6cae38c695c301513dbfc96d9f13b4f49cf5f230bc407ce2e9cc7e' Feb 2 08:02:16 np0005604725 puppet-user[54403]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Mysql_bundle/File[/etc/sysconfig/clustercheck]/ensure: defined content as '{sha256}8815764e4f2a87498325b2bb6a0d98d1787a6b664fcb887fe1af37bf8e70b969' Feb 2 08:02:16 np0005604725 puppet-user[54403]: Notice: /Stage[main]/Mysql::Server::Config/File[mysql-config-file]/content: content changed '{sha256}df7b18b99470a82afb1aebff284d910b04ceb628c9ac89d8e2fe9fb4682d5fc9' to '{sha256}565a6e7a96f8869fff3f43242bef1acaebece91ba8a6ecb6ba62a57b8bcdd286' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/db_max_retries]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[54403]: Notice: /Stage[main]/Mysql::Server::Installdb/File[/var/log/mariadb/mariadb.log]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Oslo::Messaging::Rabbit[manila_config]/Manila_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[54403]: Notice: Applied catalog in 0.09 seconds Feb 2 08:02:16 np0005604725 puppet-user[54403]: Application: Feb 2 08:02:16 np0005604725 puppet-user[54403]: Initial environment: production Feb 2 08:02:16 np0005604725 puppet-user[54403]: Converged environment: production Feb 2 08:02:16 np0005604725 puppet-user[54403]: Run mode: user Feb 2 08:02:16 np0005604725 puppet-user[54403]: Changes: Feb 2 08:02:16 np0005604725 puppet-user[54403]: Total: 4 Feb 2 08:02:16 np0005604725 puppet-user[54403]: Events: Feb 2 08:02:16 np0005604725 puppet-user[54403]: Success: 4 Feb 2 08:02:16 np0005604725 puppet-user[54403]: Total: 4 Feb 2 08:02:16 np0005604725 puppet-user[54403]: Resources: Feb 2 08:02:16 np0005604725 puppet-user[54403]: Skipped: 13 Feb 2 08:02:16 np0005604725 puppet-user[54403]: Changed: 4 Feb 2 08:02:16 np0005604725 puppet-user[54403]: Out of sync: 4 Feb 2 08:02:16 np0005604725 puppet-user[54403]: Total: 18 Feb 2 08:02:16 np0005604725 puppet-user[54403]: Time: Feb 2 08:02:16 np0005604725 puppet-user[54403]: File: 0.02 Feb 2 08:02:16 np0005604725 puppet-user[54403]: Transaction evaluation: 0.05 Feb 2 08:02:16 np0005604725 puppet-user[54403]: Catalog application: 0.09 Feb 2 08:02:16 np0005604725 puppet-user[54403]: Config retrieval: 0.44 Feb 2 08:02:16 np0005604725 puppet-user[54403]: Last run: 1770019336 Feb 2 08:02:16 np0005604725 puppet-user[54403]: Total: 0.09 Feb 2 08:02:16 np0005604725 puppet-user[54403]: Version: Feb 2 08:02:16 np0005604725 puppet-user[54403]: Config: 1770019335 Feb 2 08:02:16 np0005604725 puppet-user[54403]: Puppet: 7.10.0 Feb 2 08:02:16 np0005604725 podman[55114]: 2026-02-02 08:02:16.165013614 +0000 UTC m=+0.049159648 container create dd99056388cd6ad6348895f3de53221eae0e4c2913a327b6886c218489ae4052 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, release=1766032510, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, io.buildah.version=1.41.5, distribution-scope=public, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=container-puppet-crond, build-date=2026-01-12T22:10:15Z, io.openshift.expose-services=, vcs-type=git, com.redhat.component=openstack-cron-container, managed_by=tripleo_ansible, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, name=rhosp-rhel9/openstack-cron, org.opencontainers.image.created=2026-01-12T22:10:15Z, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 cron) Feb 2 08:02:16 np0005604725 systemd[1]: Started libpod-conmon-dd99056388cd6ad6348895f3de53221eae0e4c2913a327b6886c218489ae4052.scope. Feb 2 08:02:16 np0005604725 systemd[1]: tmp-crun.h4xW00.mount: Deactivated successfully. Feb 2 08:02:16 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:16 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/9fe80a8901e3bc9a5d3668dc0fe31f83b21a43d83ae3985f34262f67b7cc659a/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:16 np0005604725 podman[55114]: 2026-02-02 08:02:16.226724699 +0000 UTC m=+0.110870733 container init dd99056388cd6ad6348895f3de53221eae0e4c2913a327b6886c218489ae4052 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 cron, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, vendor=Red Hat, Inc., container_name=container-puppet-crond, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, version=17.1.13, name=rhosp-rhel9/openstack-cron, url=https://www.redhat.com, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, com.redhat.component=openstack-cron-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_puppet_step1, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:15Z, description=Red Hat OpenStack Platform 17.1 cron, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:10:15Z, tcib_managed=true) Feb 2 08:02:16 np0005604725 podman[55114]: 2026-02-02 08:02:16.139832484 +0000 UTC m=+0.023978538 image pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Feb 2 08:02:16 np0005604725 podman[55114]: 2026-02-02 08:02:16.24008809 +0000 UTC m=+0.124234134 container start dd99056388cd6ad6348895f3de53221eae0e4c2913a327b6886c218489ae4052 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=container-puppet-crond, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-cron, distribution-scope=public, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 cron, com.redhat.component=openstack-cron-container, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, batch=17.1_20260112.1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, config_id=tripleo_puppet_step1, build-date=2026-01-12T22:10:15Z, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:15Z, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 cron) Feb 2 08:02:16 np0005604725 podman[55114]: 2026-02-02 08:02:16.240283626 +0000 UTC m=+0.124429710 container attach dd99056388cd6ad6348895f3de53221eae0e4c2913a327b6886c218489ae4052 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 cron, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:15Z, config_id=tripleo_puppet_step1, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, container_name=container-puppet-crond, distribution-scope=public, release=1766032510, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, name=rhosp-rhel9/openstack-cron, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, summary=Red Hat OpenStack Platform 17.1 cron, build-date=2026-01-12T22:10:15Z, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, version=17.1.13, com.redhat.component=openstack-cron-container) Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/server_request_prefix]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/broadcast_prefix]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/group_request_prefix]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/container_name]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/idle_timeout]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/trace]/ensure: created Feb 2 08:02:16 np0005604725 systemd[1]: libpod-58853c66d60c12a147685e299d91cb4922661e731be714bc87da053321e24eb0.scope: Deactivated successfully. Feb 2 08:02:16 np0005604725 systemd[1]: libpod-58853c66d60c12a147685e299d91cb4922661e731be714bc87da053321e24eb0.scope: Consumed 2.929s CPU time. Feb 2 08:02:16 np0005604725 podman[54311]: 2026-02-02 08:02:16.348754564 +0000 UTC m=+3.410069793 container died 58853c66d60c12a147685e299d91cb4922661e731be714bc87da053321e24eb0 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:18Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:18Z, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, tcib_managed=true, name=rhosp-rhel9/openstack-mariadb, url=https://www.redhat.com, io.openshift.expose-services=, container_name=container-puppet-mysql, com.redhat.component=openstack-mariadb-container, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vendor=Red Hat, Inc., batch=17.1_20260112.1, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git) Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Oslo::Messaging::Default[manila_config]/Manila_config[DEFAULT/transport_url]/ensure: created Feb 2 08:02:16 np0005604725 podman[55179]: 2026-02-02 08:02:16.422993757 +0000 UTC m=+0.063479554 container cleanup 58853c66d60c12a147685e299d91cb4922661e731be714bc87da053321e24eb0 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, io.openshift.expose-services=, com.redhat.component=openstack-mariadb-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, vendor=Red Hat, Inc., url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:18Z, container_name=container-puppet-mysql, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, io.buildah.version=1.41.5, architecture=x86_64, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:02:16 np0005604725 systemd[1]: libpod-conmon-58853c66d60c12a147685e299d91cb4922661e731be714bc87da053321e24eb0.scope: Deactivated successfully. Feb 2 08:02:16 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-mysql --conmon-pidfile /run/container-puppet-mysql.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=mysql --env STEP_CONFIG=include ::tripleo::packages#012['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }#012exec {'wait-for-settle': command => '/bin/true' }#012include tripleo::profile::pacemaker::database::mysql_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-mysql --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-mysql.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Oslo::Messaging::Default[manila_config]/Manila_config[DEFAULT/control_exchange]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Oslo::Messaging::Notifications[manila_config]/Manila_config[oslo_messaging_notifications/driver]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Oslo::Messaging::Notifications[manila_config]/Manila_config[oslo_messaging_notifications/transport_url]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila/Oslo::Concurrency[manila_config]/Manila_config[oslo_concurrency/lock_path]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Logging/Oslo::Log[manila_config]/Manila_config[DEFAULT/debug]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Logging/Oslo::Log[manila_config]/Manila_config[DEFAULT/log_dir]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/www_authenticate_uri]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/auth_type]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Feb 2 08:02:16 np0005604725 podman[55247]: 2026-02-02 08:02:16.69911928 +0000 UTC m=+0.057823882 container create c3581b09ce7e8c5fff838ed62fd72a03a3d5608d313f894163259b186fb3b853 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:36:40Z, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, tcib_managed=true, config_id=tripleo_puppet_step1, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 ovn-controller, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, batch=17.1_20260112.1, com.redhat.component=openstack-ovn-controller-container, container_name=container-puppet-ovn_controller, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-ovn-controller, architecture=x86_64, build-date=2026-01-12T22:36:40Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller) Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/memcached_servers]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/region_name]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/auth_url]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/username]/ensure: created Feb 2 08:02:16 np0005604725 systemd[1]: Started libpod-conmon-c3581b09ce7e8c5fff838ed62fd72a03a3d5608d313f894163259b186fb3b853.scope. Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/password]/ensure: created Feb 2 08:02:16 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/user_domain_name]/ensure: created Feb 2 08:02:16 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/05dca06fdf26886a9170c0b150e3cdd1498b37ba631e03ecda5ed497e482c57c/merged/etc/sysconfig/modules supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:16 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/05dca06fdf26886a9170c0b150e3cdd1498b37ba631e03ecda5ed497e482c57c/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/project_name]/ensure: created Feb 2 08:02:16 np0005604725 podman[55247]: 2026-02-02 08:02:16.745135252 +0000 UTC m=+0.103839864 container init c3581b09ce7e8c5fff838ed62fd72a03a3d5608d313f894163259b186fb3b853 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, name=rhosp-rhel9/openstack-ovn-controller, version=17.1.13, io.openshift.expose-services=, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, description=Red Hat OpenStack Platform 17.1 ovn-controller, container_name=container-puppet-ovn_controller, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, summary=Red Hat OpenStack Platform 17.1 ovn-controller, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:36:40Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.buildah.version=1.41.5, release=1766032510, architecture=x86_64, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, batch=17.1_20260112.1, com.redhat.component=openstack-ovn-controller-container, config_id=tripleo_puppet_step1, distribution-scope=public, build-date=2026-01-12T22:36:40Z) Feb 2 08:02:16 np0005604725 podman[55247]: 2026-02-02 08:02:16.751446642 +0000 UTC m=+0.110151234 container start c3581b09ce7e8c5fff838ed62fd72a03a3d5608d313f894163259b186fb3b853 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, container_name=container-puppet-ovn_controller, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 ovn-controller, url=https://www.redhat.com, tcib_managed=true, build-date=2026-01-12T22:36:40Z, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, com.redhat.component=openstack-ovn-controller-container, name=rhosp-rhel9/openstack-ovn-controller, architecture=x86_64, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vendor=Red Hat, Inc., release=1766032510, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 ovn-controller, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:36:40Z, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.5) Feb 2 08:02:16 np0005604725 podman[55247]: 2026-02-02 08:02:16.751611807 +0000 UTC m=+0.110316429 container attach c3581b09ce7e8c5fff838ed62fd72a03a3d5608d313f894163259b186fb3b853 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, release=1766032510, architecture=x86_64, io.openshift.expose-services=, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:36:40Z, container_name=container-puppet-ovn_controller, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 ovn-controller, build-date=2026-01-12T22:36:40Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, version=17.1.13, description=Red Hat OpenStack Platform 17.1 ovn-controller, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-ovn-controller-container, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, name=rhosp-rhel9/openstack-ovn-controller) Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/project_domain_name]/ensure: created Feb 2 08:02:16 np0005604725 podman[55247]: 2026-02-02 08:02:16.671864694 +0000 UTC m=+0.030569306 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/interface]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}a988b3b14e2767d5013472e9aadecfeaacadeab861a10a4790ad73b31f5b2049' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}224e1913534a5aab220e4f36b9f9b1513fe7e3b433c6daefef7dba0ff5103b42' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Feb 2 08:02:16 np0005604725 systemd[1]: var-lib-containers-storage-overlay-392f25d06919edb8abbe78773eee2f525538c51907d1643a43f0eea009c3179f-merged.mount: Deactivated successfully. Feb 2 08:02:16 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-58853c66d60c12a147685e299d91cb4922661e731be714bc87da053321e24eb0-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Policy/Oslo::Policy[manila_config]/Manila_config[oslo_policy/policy_file]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[54418]: Warning: Scope(Apache::Vhost[neutron-api-proxy]): Feb 2 08:02:16 np0005604725 puppet-user[54418]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Feb 2 08:02:16 np0005604725 puppet-user[54418]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Feb 2 08:02:16 np0005604725 puppet-user[54418]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Feb 2 08:02:16 np0005604725 puppet-user[54418]: file names. Feb 2 08:02:16 np0005604725 puppet-user[54418]: Feb 2 08:02:16 np0005604725 puppet-user[54418]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Feb 2 08:02:16 np0005604725 puppet-user[54418]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Feb 2 08:02:16 np0005604725 puppet-user[54418]: sanitized $servername parameter when not explicitly defined. Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Api/Oslo::Middleware[manila_config]/Manila_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/File[/var/www/cgi-bin/manila]/group: group changed 'root' to 'manila' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/File[manila_wsgi]/ensure: defined content as '{sha256}ca07199ace8325d094e754ccdfefb2b5a78a13cd657d68221b3a68b53b0dd893' Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/driver_handles_share_servers]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/share_backend_name]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/share_driver]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_conf_path]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_auth_id]/ensure: created Feb 2 08:02:16 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_cluster_name]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_ganesha_server_ip]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_ganesha_server_is_remote]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 1.89 seconds Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_volume_mode]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_protocol_helper_type]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/Apache::Vhost[manila_wsgi]/Concat[10-manila_wsgi.conf]/File[/etc/httpd/conf.d/10-manila_wsgi.conf]/ensure: defined content as '{sha256}4590cd2ceb40697250a2cbfa07f625077b3bbff0f3ca6325e583d596526dec16' Feb 2 08:02:17 np0005604725 puppet-user[53852]: Notice: Applied catalog in 1.84 seconds Feb 2 08:02:17 np0005604725 puppet-user[53852]: Application: Feb 2 08:02:17 np0005604725 puppet-user[53852]: Initial environment: production Feb 2 08:02:17 np0005604725 puppet-user[53852]: Converged environment: production Feb 2 08:02:17 np0005604725 puppet-user[53852]: Run mode: user Feb 2 08:02:17 np0005604725 puppet-user[53852]: Changes: Feb 2 08:02:17 np0005604725 puppet-user[53852]: Total: 115 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Events: Feb 2 08:02:17 np0005604725 puppet-user[53852]: Success: 115 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Total: 115 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Resources: Feb 2 08:02:17 np0005604725 puppet-user[53852]: Changed: 115 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Out of sync: 115 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Skipped: 47 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Total: 330 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Time: Feb 2 08:02:17 np0005604725 puppet-user[53852]: Resources: 0.00 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Concat file: 0.00 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Concat fragment: 0.00 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Cron: 0.01 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Package: 0.02 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Augeas: 0.02 Feb 2 08:02:17 np0005604725 puppet-user[53852]: File: 0.12 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Manila config: 1.34 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Config retrieval: 1.81 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Transaction evaluation: 1.83 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Catalog application: 1.84 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Last run: 1770019337 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Total: 1.84 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Version: Feb 2 08:02:17 np0005604725 puppet-user[53852]: Config: 1770019333 Feb 2 08:02:17 np0005604725 puppet-user[53852]: Puppet: 7.10.0 Feb 2 08:02:17 np0005604725 ovs-vsctl[55292]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54877]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:17 np0005604725 puppet-user[54877]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:17 np0005604725 puppet-user[54877]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:17 np0005604725 puppet-user[54877]: (file & line not available) Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/bind_host]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/auth_strategy]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/core_plugin]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/host]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/dns_domain]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/dhcp_agent_notification]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/allow_overlapping_ips]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54877]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:17 np0005604725 puppet-user[54877]: (file & line not available) Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/global_physnet_mtu]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/vlan_transparent]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Neutron_config[agent/root_helper]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Neutron_config[agent/report_interval]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/service_plugins]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/auth_url]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/username]/ensure: created Feb 2 08:02:17 np0005604725 ovs-vsctl[55370]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/password]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/project_domain_name]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/project_name]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/user_domain_name]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/region_name]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/endpoint_type]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/auth_type]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/auth_url]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/username]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/password]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/project_domain_name]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/project_name]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/user_domain_name]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/region_name]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[55072]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/auth_type]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[55072]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:17 np0005604725 puppet-user[55072]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:17 np0005604725 puppet-user[55072]: (file & line not available) Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/l3_ha]/ensure: created Feb 2 08:02:17 np0005604725 systemd[1]: libpod-df2070e50b609189517cb12059df0e71cd81b6b1c8819912bef74af2409c051d.scope: Deactivated successfully. Feb 2 08:02:17 np0005604725 systemd[1]: libpod-df2070e50b609189517cb12059df0e71cd81b6b1c8819912bef74af2409c051d.scope: Consumed 5.902s CPU time. Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/max_l3_agents_per_router]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/api_workers]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54877]: Warning: Scope(Class[Nova]): The os_region_name parameter is deprecated and will be removed \ Feb 2 08:02:17 np0005604725 puppet-user[54877]: in a future release. Use nova::cinder::os_region_name instead Feb 2 08:02:17 np0005604725 puppet-user[54877]: Warning: Scope(Class[Nova]): The catalog_info parameter is deprecated and will be removed \ Feb 2 08:02:17 np0005604725 puppet-user[54877]: in a future release. Use nova::cinder::catalog_info instead Feb 2 08:02:17 np0005604725 puppet-user[54877]: Warning: Scope(Class[Nova]): The database_connection parameter is deprecated and will be \ Feb 2 08:02:17 np0005604725 puppet-user[54877]: removed in a future realse. Use nova::db::database_connection instead Feb 2 08:02:17 np0005604725 puppet-user[54877]: Warning: Scope(Class[Nova]): The api_database_connection parameter is deprecated and will be \ Feb 2 08:02:17 np0005604725 puppet-user[54877]: removed in a future realse. Use nova::db::api_database_connection instead Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/rpc_workers]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/agent_down_time]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[55072]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:17 np0005604725 puppet-user[55072]: (file & line not available) Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/router_scheduler_driver]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/allow_automatic_l3agent_failover]/ensure: created Feb 2 08:02:17 np0005604725 podman[55458]: 2026-02-02 08:02:17.756694624 +0000 UTC m=+0.040049131 container died df2070e50b609189517cb12059df0e71cd81b6b1c8819912bef74af2409c051d (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, vendor=Red Hat, Inc., io.openshift.expose-services=, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, name=rhosp-rhel9/openstack-manila-api, build-date=2026-01-12T22:52:22Z, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 manila-api, container_name=container-puppet-manila, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, config_id=tripleo_puppet_step1, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.component=openstack-manila-api-container, description=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:52:22Z, distribution-scope=public, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, release=1766032510, tcib_managed=true, batch=17.1_20260112.1) Feb 2 08:02:17 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-df2070e50b609189517cb12059df0e71cd81b6b1c8819912bef74af2409c051d-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:17 np0005604725 systemd[1]: var-lib-containers-storage-overlay-bf883c3e62399ab93a2e85f82c9a42f2077ee7acd44ef1ce5251173d7a73cfa8-merged.mount: Deactivated successfully. Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server/Neutron_config[ovs/igmp_snooping_enable]/ensure: created Feb 2 08:02:17 np0005604725 podman[55458]: 2026-02-02 08:02:17.796448477 +0000 UTC m=+0.079802924 container cleanup df2070e50b609189517cb12059df0e71cd81b6b1c8819912bef74af2409c051d (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, release=1766032510, name=rhosp-rhel9/openstack-manila-api, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=container-puppet-manila, build-date=2026-01-12T22:52:22Z, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, description=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, io.buildah.version=1.41.5, architecture=x86_64, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 manila-api, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, tcib_managed=true, batch=17.1_20260112.1, com.redhat.component=openstack-manila-api-container, org.opencontainers.image.created=2026-01-12T22:52:22Z, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb) Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_port]/ensure: created Feb 2 08:02:17 np0005604725 systemd[1]: libpod-conmon-df2070e50b609189517cb12059df0e71cd81b6b1c8819912bef74af2409c051d.scope: Deactivated successfully. Feb 2 08:02:17 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-manila --conmon-pidfile /run/container-puppet-manila.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line --env NAME=manila --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::manila::api#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::manila::scheduler#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::pacemaker::manila::share_bundle#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-manila --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-manila.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Feb 2 08:02:17 np0005604725 puppet-user[54877]: Warning: Unknown variable: '::nova::compute::verify_glance_signatures'. (file: /etc/puppet/modules/nova/manifests/glance.pp, line: 62, column: 41) Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_security_group]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_network_gateway]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_packet_filter]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2/File[/etc/neutron/plugin.ini]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2/File[/etc/default/neutron-server]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/type_drivers]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/tenant_network_types]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/mechanism_drivers]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/path_mtu]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/extension_drivers]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/overlay_ip_version]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Default[neutron_config]/Neutron_config[DEFAULT/transport_url]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Default[neutron_config]/Neutron_config[DEFAULT/control_exchange]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Oslo::Concurrency[neutron_config]/Neutron_config[oslo_concurrency/lock_path]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Notifications[neutron_config]/Neutron_config[oslo_messaging_notifications/driver]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Notifications[neutron_config]/Neutron_config[oslo_messaging_notifications/transport_url]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Rabbit[neutron_config]/Neutron_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Rabbit[neutron_config]/Neutron_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Feb 2 08:02:17 np0005604725 puppet-user[55072]: Warning: Scope(Class[Nova]): The os_region_name parameter is deprecated and will be removed \ Feb 2 08:02:17 np0005604725 puppet-user[55072]: in a future release. Use nova::cinder::os_region_name instead Feb 2 08:02:17 np0005604725 puppet-user[55072]: Warning: Scope(Class[Nova]): The catalog_info parameter is deprecated and will be removed \ Feb 2 08:02:17 np0005604725 puppet-user[55072]: in a future release. Use nova::cinder::catalog_info instead Feb 2 08:02:17 np0005604725 puppet-user[55072]: Warning: Scope(Class[Nova]): The database_connection parameter is deprecated and will be \ Feb 2 08:02:17 np0005604725 puppet-user[55072]: removed in a future realse. Use nova::db::database_connection instead Feb 2 08:02:17 np0005604725 puppet-user[55072]: Warning: Scope(Class[Nova]): The api_database_connection parameter is deprecated and will be \ Feb 2 08:02:17 np0005604725 puppet-user[55072]: removed in a future realse. Use nova::db::api_database_connection instead Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Logging/Oslo::Log[neutron_config]/Neutron_config[DEFAULT/debug]/ensure: created Feb 2 08:02:18 np0005604725 podman[55520]: 2026-02-02 08:02:18.093088154 +0000 UTC m=+0.064752469 container create e5cffa002916362cf3f4c5572489f7278af364eb4faaef04f3fa7b94a3c2eb80 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, config_id=tripleo_puppet_step1, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 placement-api, tcib_managed=true, container_name=container-puppet-placement, name=rhosp-rhel9/openstack-placement-api, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:34:35Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, version=17.1.13, com.redhat.component=openstack-placement-api-container, summary=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.5, build-date=2026-01-12T22:34:35Z) Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Logging/Oslo::Log[neutron_config]/Neutron_config[DEFAULT/log_dir]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[55072]: Warning: Unknown variable: '::nova::compute::verify_glance_signatures'. (file: /etc/puppet/modules/nova/manifests/glance.pp, line: 62, column: 41) Feb 2 08:02:18 np0005604725 systemd[1]: Started libpod-conmon-e5cffa002916362cf3f4c5572489f7278af364eb4faaef04f3fa7b94a3c2eb80.scope. Feb 2 08:02:18 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:18 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/cb671736c13595c5843eeaf191ba1d6aca7188db98e42e531588282069778187/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/www_authenticate_uri]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/auth_type]/ensure: created Feb 2 08:02:18 np0005604725 podman[55520]: 2026-02-02 08:02:18.0547505 +0000 UTC m=+0.026414825 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Feb 2 08:02:18 np0005604725 podman[55520]: 2026-02-02 08:02:18.155809388 +0000 UTC m=+0.127473683 container init e5cffa002916362cf3f4c5572489f7278af364eb4faaef04f3fa7b94a3c2eb80 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, release=1766032510, version=17.1.13, description=Red Hat OpenStack Platform 17.1 placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.5, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:34:35Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., batch=17.1_20260112.1, architecture=x86_64, vcs-type=git, build-date=2026-01-12T22:34:35Z, com.redhat.component=openstack-placement-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, container_name=container-puppet-placement, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp-rhel9/openstack-placement-api, distribution-scope=public, config_id=tripleo_puppet_step1) Feb 2 08:02:18 np0005604725 podman[55520]: 2026-02-02 08:02:18.163482905 +0000 UTC m=+0.135147240 container start e5cffa002916362cf3f4c5572489f7278af364eb4faaef04f3fa7b94a3c2eb80 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, url=https://www.redhat.com, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp-rhel9/openstack-placement-api, distribution-scope=public, version=17.1.13, com.redhat.component=openstack-placement-api-container, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 placement-api, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:35Z, org.opencontainers.image.created=2026-01-12T22:34:35Z, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 placement-api, container_name=container-puppet-placement, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.expose-services=) Feb 2 08:02:18 np0005604725 podman[55520]: 2026-02-02 08:02:18.163802954 +0000 UTC m=+0.135467249 container attach e5cffa002916362cf3f4c5572489f7278af364eb4faaef04f3fa7b94a3c2eb80 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.expose-services=, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.created=2026-01-12T22:34:35Z, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-placement-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:35Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, config_id=tripleo_puppet_step1, container_name=container-puppet-placement, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 placement-api, vcs-type=git, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, com.redhat.component=openstack-placement-api-container) Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/memcached_servers]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/region_name]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/auth_url]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/username]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/password]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/user_domain_name]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/project_name]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[55160]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:18 np0005604725 puppet-user[55160]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:18 np0005604725 puppet-user[55160]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:18 np0005604725 puppet-user[55160]: (file & line not available) Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/project_domain_name]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/interface]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}477db3ce6366cc4cb2547fcddeedb8215cbfaa5f194d7e8f5798309935ba604b' Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}224e1913534a5aab220e4f36b9f9b1513fe7e3b433c6daefef7dba0ff5103b42' Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Feb 2 08:02:18 np0005604725 puppet-user[55160]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:18 np0005604725 puppet-user[55160]: (file & line not available) Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Feb 2 08:02:18 np0005604725 puppet-user[55160]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.11 seconds Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Feb 2 08:02:18 np0005604725 puppet-user[55160]: Notice: /Stage[main]/Tripleo::Profile::Base::Logging::Logrotate/File[/etc/logrotate-crond.conf]/ensure: defined content as '{sha256}1c3202f58bd2ae16cb31badcbb7f0d4e6697157b987d1887736ad96bb73d70b0' Feb 2 08:02:18 np0005604725 puppet-user[55160]: Notice: /Stage[main]/Tripleo::Profile::Base::Logging::Logrotate/Cron[logrotate-crond]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[55160]: Notice: Applied catalog in 0.04 seconds Feb 2 08:02:18 np0005604725 puppet-user[55160]: Application: Feb 2 08:02:18 np0005604725 puppet-user[55160]: Initial environment: production Feb 2 08:02:18 np0005604725 puppet-user[55160]: Converged environment: production Feb 2 08:02:18 np0005604725 puppet-user[55160]: Run mode: user Feb 2 08:02:18 np0005604725 puppet-user[55160]: Changes: Feb 2 08:02:18 np0005604725 puppet-user[55160]: Total: 2 Feb 2 08:02:18 np0005604725 puppet-user[55160]: Events: Feb 2 08:02:18 np0005604725 puppet-user[55160]: Success: 2 Feb 2 08:02:18 np0005604725 puppet-user[55160]: Total: 2 Feb 2 08:02:18 np0005604725 puppet-user[55160]: Resources: Feb 2 08:02:18 np0005604725 puppet-user[55160]: Changed: 2 Feb 2 08:02:18 np0005604725 puppet-user[55160]: Out of sync: 2 Feb 2 08:02:18 np0005604725 puppet-user[55160]: Skipped: 7 Feb 2 08:02:18 np0005604725 puppet-user[55160]: Total: 9 Feb 2 08:02:18 np0005604725 puppet-user[55160]: Time: Feb 2 08:02:18 np0005604725 puppet-user[55160]: File: 0.00 Feb 2 08:02:18 np0005604725 puppet-user[55160]: Cron: 0.01 Feb 2 08:02:18 np0005604725 puppet-user[55160]: Transaction evaluation: 0.04 Feb 2 08:02:18 np0005604725 puppet-user[55160]: Catalog application: 0.04 Feb 2 08:02:18 np0005604725 puppet-user[55160]: Config retrieval: 0.13 Feb 2 08:02:18 np0005604725 puppet-user[55160]: Last run: 1770019338 Feb 2 08:02:18 np0005604725 puppet-user[55160]: Total: 0.04 Feb 2 08:02:18 np0005604725 puppet-user[55160]: Version: Feb 2 08:02:18 np0005604725 puppet-user[55160]: Config: 1770019338 Feb 2 08:02:18 np0005604725 puppet-user[55160]: Puppet: 7.10.0 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/connection]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/max_retries]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/db_max_retries]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54877]: Warning: Unknown variable: '::nova::scheduler::filter::scheduler_max_attempts'. (file: /etc/puppet/modules/nova/manifests/scheduler.pp, line: 122, column: 29) Feb 2 08:02:18 np0005604725 puppet-user[54877]: Warning: Unknown variable: '::nova::scheduler::filter::periodic_task_interval'. (file: /etc/puppet/modules/nova/manifests/scheduler.pp, line: 123, column: 39) Feb 2 08:02:18 np0005604725 puppet-user[54877]: Warning: Scope(Class[Nova::Scheduler::Filter]): The nova::scheduler::filter::scheduler_max_attempts parameter has been deprecated and \ Feb 2 08:02:18 np0005604725 puppet-user[54877]: will be removed in a future release. Use the nova::scheduler::max_attempts parameter instead. Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Policy/Oslo::Policy[neutron_config]/Neutron_config[oslo_policy/policy_file]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Server/Oslo::Middleware[neutron_config]/Neutron_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[geneve]/Neutron_plugin_ml2[ml2_type_geneve/max_header_size]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[geneve]/Neutron_plugin_ml2[ml2_type_geneve/vni_ranges]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vxlan]/Neutron_plugin_ml2[ml2_type_vxlan/vxlan_group]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vxlan]/Neutron_plugin_ml2[ml2_type_vxlan/vni_ranges]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vlan]/Neutron_plugin_ml2[ml2_type_vlan/network_vlan_ranges]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[flat]/Neutron_plugin_ml2[ml2_type_flat/flat_networks]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_connection]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_connection]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_private_key]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_certificate]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_ca_cert]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_private_key]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_certificate]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_ca_cert]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovsdb_connection_timeout]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovsdb_probe_interval]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/neutron_sync_mode]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_metadata_enabled]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/enable_distributed_floating_ip]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/dns_servers]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_emit_need_to_frag]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[network_log/rate_limit]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[network_log/burst_limit]/ensure: created Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Feb 2 08:02:18 np0005604725 puppet-user[55277]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:18 np0005604725 puppet-user[55277]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:18 np0005604725 puppet-user[55277]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:18 np0005604725 puppet-user[55277]: (file & line not available) Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: /Stage[main]/Tripleo::Profile::Base::Neutron::Server/Tripleo::Tls_proxy[neutron-api]/Apache::Vhost[neutron-api-proxy]/Concat[25-neutron-api-proxy.conf]/File[/etc/httpd/conf.d/25-neutron-api-proxy.conf]/ensure: defined content as '{sha256}de6cec142e9eee01e1051f6a836d960b32bc6e0197987012227946c4ad81dced' Feb 2 08:02:18 np0005604725 puppet-user[55277]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:18 np0005604725 puppet-user[55277]: (file & line not available) Feb 2 08:02:18 np0005604725 systemd[1]: libpod-dd99056388cd6ad6348895f3de53221eae0e4c2913a327b6886c218489ae4052.scope: Deactivated successfully. Feb 2 08:02:18 np0005604725 systemd[1]: libpod-dd99056388cd6ad6348895f3de53221eae0e4c2913a327b6886c218489ae4052.scope: Consumed 2.267s CPU time. Feb 2 08:02:18 np0005604725 podman[55114]: 2026-02-02 08:02:18.656942424 +0000 UTC m=+2.541088478 container died dd99056388cd6ad6348895f3de53221eae0e4c2913a327b6886c218489ae4052 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-cron-container, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:15Z, description=Red Hat OpenStack Platform 17.1 cron, summary=Red Hat OpenStack Platform 17.1 cron, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, io.buildah.version=1.41.5, container_name=container-puppet-crond, batch=17.1_20260112.1, build-date=2026-01-12T22:10:15Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, name=rhosp-rhel9/openstack-cron, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, url=https://www.redhat.com, version=17.1.13, managed_by=tripleo_ansible) Feb 2 08:02:18 np0005604725 puppet-user[54418]: Notice: Applied catalog in 1.49 seconds Feb 2 08:02:18 np0005604725 puppet-user[54418]: Application: Feb 2 08:02:18 np0005604725 puppet-user[54418]: Initial environment: production Feb 2 08:02:18 np0005604725 puppet-user[54418]: Converged environment: production Feb 2 08:02:18 np0005604725 puppet-user[54418]: Run mode: user Feb 2 08:02:18 np0005604725 puppet-user[54418]: Changes: Feb 2 08:02:18 np0005604725 puppet-user[54418]: Total: 137 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Events: Feb 2 08:02:18 np0005604725 puppet-user[54418]: Success: 137 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Total: 137 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Resources: Feb 2 08:02:18 np0005604725 puppet-user[54418]: Changed: 137 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Out of sync: 137 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Skipped: 41 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Total: 385 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Time: Feb 2 08:02:18 np0005604725 puppet-user[54418]: Resources: 0.00 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Concat file: 0.00 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Concat fragment: 0.00 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Augeas: 0.02 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Package: 0.03 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Neutron plugin ml2: 0.06 Feb 2 08:02:18 np0005604725 puppet-user[54418]: File: 0.11 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Neutron config: 0.95 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Transaction evaluation: 1.45 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Catalog application: 1.49 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Last run: 1770019338 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Config retrieval: 2.07 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Total: 1.49 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Version: Feb 2 08:02:18 np0005604725 puppet-user[54418]: Config: 1770019335 Feb 2 08:02:18 np0005604725 puppet-user[54418]: Puppet: 7.10.0 Feb 2 08:02:18 np0005604725 podman[55699]: 2026-02-02 08:02:18.751555827 +0000 UTC m=+0.084587194 container cleanup dd99056388cd6ad6348895f3de53221eae0e4c2913a327b6886c218489ae4052 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-crond, distribution-scope=public, version=17.1.13, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, tcib_managed=true, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 cron, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-cron, org.opencontainers.image.created=2026-01-12T22:10:15Z, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 cron, com.redhat.component=openstack-cron-container, url=https://www.redhat.com, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, architecture=x86_64, build-date=2026-01-12T22:10:15Z, batch=17.1_20260112.1, io.buildah.version=1.41.5) Feb 2 08:02:18 np0005604725 systemd[1]: libpod-conmon-dd99056388cd6ad6348895f3de53221eae0e4c2913a327b6886c218489ae4052.scope: Deactivated successfully. Feb 2 08:02:18 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-crond --conmon-pidfile /run/container-puppet-crond.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron --env NAME=crond --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::logging::logrotate --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-crond --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-crond.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Feb 2 08:02:18 np0005604725 puppet-user[55277]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.27 seconds Feb 2 08:02:18 np0005604725 ovs-vsctl[55752]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:172.17.0.103:6642,ssl:172.17.0.104:6642,ssl:172.17.0.105:6642 Feb 2 08:02:18 np0005604725 puppet-user[55277]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-remote]/ensure: created Feb 2 08:02:18 np0005604725 ovs-vsctl[55758]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Feb 2 08:02:18 np0005604725 puppet-user[55277]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-type]/ensure: created Feb 2 08:02:19 np0005604725 ovs-vsctl[55768]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=172.19.0.104 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-ip]/ensure: created Feb 2 08:02:19 np0005604725 ovs-vsctl[55780]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005604725.ooo.test Feb 2 08:02:19 np0005604725 puppet-user[55277]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:hostname]/value: value changed 'np0005604725.novalocal' to 'np0005604725.ooo.test' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Warning: Scope(Apache::Vhost[nova_api_wsgi]): Feb 2 08:02:19 np0005604725 puppet-user[54877]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Feb 2 08:02:19 np0005604725 puppet-user[54877]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Feb 2 08:02:19 np0005604725 puppet-user[54877]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Feb 2 08:02:19 np0005604725 puppet-user[54877]: file names. Feb 2 08:02:19 np0005604725 puppet-user[54877]: Feb 2 08:02:19 np0005604725 puppet-user[54877]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Feb 2 08:02:19 np0005604725 puppet-user[54877]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Feb 2 08:02:19 np0005604725 puppet-user[54877]: sanitized $servername parameter when not explicitly defined. Feb 2 08:02:19 np0005604725 ovs-vsctl[55790]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Feb 2 08:02:19 np0005604725 puppet-user[55277]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-bridge]/ensure: created Feb 2 08:02:19 np0005604725 podman[55772]: 2026-02-02 08:02:19.094992527 +0000 UTC m=+0.052988252 container create 83d0af33823058b073e06fb1ae61e12ff9d89e18003423772c6459b1e1adc790 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, container_name=container-puppet-rabbitmq, build-date=2026-01-12T22:10:14Z, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, com.redhat.component=openstack-rabbitmq-container, description=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp-rhel9/openstack-rabbitmq, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, io.openshift.expose-services=, vendor=Red Hat, Inc., tcib_managed=true, architecture=x86_64, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, config_id=tripleo_puppet_step1, org.opencontainers.image.created=2026-01-12T22:10:14Z, version=17.1.13, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, distribution-scope=public) Feb 2 08:02:19 np0005604725 systemd[1]: var-lib-containers-storage-overlay-9fe80a8901e3bc9a5d3668dc0fe31f83b21a43d83ae3985f34262f67b7cc659a-merged.mount: Deactivated successfully. Feb 2 08:02:19 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-dd99056388cd6ad6348895f3de53221eae0e4c2913a327b6886c218489ae4052-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:19 np0005604725 ovs-vsctl[55793]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-remote-probe-interval]/ensure: created Feb 2 08:02:19 np0005604725 ovs-vsctl[55800]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-openflow-probe-interval=60 Feb 2 08:02:19 np0005604725 systemd[1]: Started libpod-conmon-83d0af33823058b073e06fb1ae61e12ff9d89e18003423772c6459b1e1adc790.scope. Feb 2 08:02:19 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:19 np0005604725 puppet-user[55277]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-openflow-probe-interval]/ensure: created Feb 2 08:02:19 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/fa913786ac223c80751f7dd524e333d56e3d4166fd35bcb1ef64160c4f1a3f1e/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:19 np0005604725 podman[55772]: 2026-02-02 08:02:19.156701412 +0000 UTC m=+0.114696977 container init 83d0af33823058b073e06fb1ae61e12ff9d89e18003423772c6459b1e1adc790 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, managed_by=tripleo_ansible, com.redhat.component=openstack-rabbitmq-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.expose-services=, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp-rhel9/openstack-rabbitmq, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, tcib_managed=true, release=1766032510, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:14Z, io.buildah.version=1.41.5, container_name=container-puppet-rabbitmq, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, org.opencontainers.image.created=2026-01-12T22:10:14Z) Feb 2 08:02:19 np0005604725 ovs-vsctl[55808]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=true Feb 2 08:02:19 np0005604725 puppet-user[55277]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-monitor-all]/ensure: created Feb 2 08:02:19 np0005604725 podman[55772]: 2026-02-02 08:02:19.069302634 +0000 UTC m=+0.027298179 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Feb 2 08:02:19 np0005604725 podman[55772]: 2026-02-02 08:02:19.177046211 +0000 UTC m=+0.135041756 container start 83d0af33823058b073e06fb1ae61e12ff9d89e18003423772c6459b1e1adc790 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, org.opencontainers.image.created=2026-01-12T22:10:14Z, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, name=rhosp-rhel9/openstack-rabbitmq, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.expose-services=, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, build-date=2026-01-12T22:10:14Z, com.redhat.component=openstack-rabbitmq-container, release=1766032510, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, container_name=container-puppet-rabbitmq, tcib_managed=true) Feb 2 08:02:19 np0005604725 podman[55772]: 2026-02-02 08:02:19.177405671 +0000 UTC m=+0.135401236 container attach 83d0af33823058b073e06fb1ae61e12ff9d89e18003423772c6459b1e1adc790 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, url=https://www.redhat.com, release=1766032510, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2026-01-12T22:10:14Z, managed_by=tripleo_ansible, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, com.redhat.component=openstack-rabbitmq-container, name=rhosp-rhel9/openstack-rabbitmq, vcs-type=git, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=container-puppet-rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:14Z, version=17.1.13, batch=17.1_20260112.1, distribution-scope=public) Feb 2 08:02:19 np0005604725 puppet-user[55072]: Warning: Scope(Apache::Vhost[nova_metadata_wsgi]): Feb 2 08:02:19 np0005604725 puppet-user[55072]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Feb 2 08:02:19 np0005604725 puppet-user[55072]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Feb 2 08:02:19 np0005604725 puppet-user[55072]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Feb 2 08:02:19 np0005604725 puppet-user[55072]: file names. Feb 2 08:02:19 np0005604725 puppet-user[55072]: Feb 2 08:02:19 np0005604725 puppet-user[55072]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Feb 2 08:02:19 np0005604725 puppet-user[55072]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Feb 2 08:02:19 np0005604725 puppet-user[55072]: sanitized $servername parameter when not explicitly defined. Feb 2 08:02:19 np0005604725 ovs-vsctl[55819]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-ofctrl-wait-before-clear]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 1.86 seconds Feb 2 08:02:19 np0005604725 ovs-vsctl[55821]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-tos=0 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-tos]/ensure: created Feb 2 08:02:19 np0005604725 ovs-vsctl[55828]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-chassis-mac-mappings=datacentre:fa:16:3e:2e:43:71 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-chassis-mac-mappings]/ensure: created Feb 2 08:02:19 np0005604725 ovs-vsctl[55830]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=datacentre:br-ex Feb 2 08:02:19 np0005604725 puppet-user[55277]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-bridge-mappings]/ensure: created Feb 2 08:02:19 np0005604725 ovs-vsctl[55832]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Feb 2 08:02:19 np0005604725 puppet-user[55277]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-match-northd-version]/ensure: created Feb 2 08:02:19 np0005604725 ovs-vsctl[55840]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:garp-max-timeout-sec=0 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:garp-max-timeout-sec]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 1.65 seconds Feb 2 08:02:19 np0005604725 puppet-user[55277]: Notice: Applied catalog in 0.42 seconds Feb 2 08:02:19 np0005604725 puppet-user[55277]: Application: Feb 2 08:02:19 np0005604725 puppet-user[55277]: Initial environment: production Feb 2 08:02:19 np0005604725 puppet-user[55277]: Converged environment: production Feb 2 08:02:19 np0005604725 puppet-user[55277]: Run mode: user Feb 2 08:02:19 np0005604725 puppet-user[55277]: Changes: Feb 2 08:02:19 np0005604725 puppet-user[55277]: Total: 14 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Events: Feb 2 08:02:19 np0005604725 puppet-user[55277]: Success: 14 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Total: 14 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Resources: Feb 2 08:02:19 np0005604725 puppet-user[55277]: Skipped: 12 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Changed: 14 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Out of sync: 14 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Total: 29 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Time: Feb 2 08:02:19 np0005604725 puppet-user[55277]: Exec: 0.01 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Config retrieval: 0.31 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Vs config: 0.35 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Transaction evaluation: 0.41 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Catalog application: 0.42 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Last run: 1770019339 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Total: 0.42 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Version: Feb 2 08:02:19 np0005604725 puppet-user[55277]: Config: 1770019338 Feb 2 08:02:19 np0005604725 puppet-user[55277]: Puppet: 7.10.0 Feb 2 08:02:19 np0005604725 systemd[1]: libpod-d8ea9fd00ae3fba14f49047dde6e3c15eb7a4ef7c6140439efca85df5d667ed3.scope: Deactivated successfully. Feb 2 08:02:19 np0005604725 systemd[1]: libpod-d8ea9fd00ae3fba14f49047dde6e3c15eb7a4ef7c6140439efca85df5d667ed3.scope: Consumed 5.867s CPU time. Feb 2 08:02:19 np0005604725 podman[54365]: 2026-02-02 08:02:19.422805355 +0000 UTC m=+6.347442285 container died d8ea9fd00ae3fba14f49047dde6e3c15eb7a4ef7c6140439efca85df5d667ed3 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, build-date=2026-01-12T22:57:35Z, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, batch=17.1_20260112.1, container_name=container-puppet-neutron, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 neutron-server, description=Red Hat OpenStack Platform 17.1 neutron-server, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, io.openshift.expose-services=, name=rhosp-rhel9/openstack-neutron-server, vendor=Red Hat, Inc., vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, org.opencontainers.image.created=2026-01-12T22:57:35Z, distribution-scope=public, managed_by=tripleo_ansible, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, url=https://www.redhat.com, version=17.1.13, tcib_managed=true) Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Feb 2 08:02:19 np0005604725 podman[55871]: 2026-02-02 08:02:19.575172037 +0000 UTC m=+0.142818456 container cleanup d8ea9fd00ae3fba14f49047dde6e3c15eb7a4ef7c6140439efca85df5d667ed3 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., vcs-type=git, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, container_name=container-puppet-neutron, release=1766032510, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:57:35Z, summary=Red Hat OpenStack Platform 17.1 neutron-server, io.buildah.version=1.41.5, managed_by=tripleo_ansible, com.redhat.component=openstack-neutron-server-container, name=rhosp-rhel9/openstack-neutron-server, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, distribution-scope=public, build-date=2026-01-12T22:57:35Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, config_id=tripleo_puppet_step1) Feb 2 08:02:19 np0005604725 systemd[1]: libpod-conmon-d8ea9fd00ae3fba14f49047dde6e3c15eb7a4ef7c6140439efca85df5d667ed3.scope: Deactivated successfully. Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Feb 2 08:02:19 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-neutron --conmon-pidfile /run/container-puppet-neutron.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2 --env NAME=neutron --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::neutron::server#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::neutron::plugins::ml2#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-neutron --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-neutron.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}89b63b4bc0f13f2c7bc7bfc4f831ca44bf14e24fd66dbc944c3a47e38416e274' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}224e1913534a5aab220e4f36b9f9b1513fe7e3b433c6daefef7dba0ff5103b42' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Feb 2 08:02:19 np0005604725 systemd[1]: libpod-c3581b09ce7e8c5fff838ed62fd72a03a3d5608d313f894163259b186fb3b853.scope: Deactivated successfully. Feb 2 08:02:19 np0005604725 systemd[1]: libpod-c3581b09ce7e8c5fff838ed62fd72a03a3d5608d313f894163259b186fb3b853.scope: Consumed 2.760s CPU time. Feb 2 08:02:19 np0005604725 podman[55247]: 2026-02-02 08:02:19.698973419 +0000 UTC m=+3.057678031 container died c3581b09ce7e8c5fff838ed62fd72a03a3d5608d313f894163259b186fb3b853 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, url=https://www.redhat.com, name=rhosp-rhel9/openstack-ovn-controller, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:36:40Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.expose-services=, version=17.1.13, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, build-date=2026-01-12T22:36:40Z, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, container_name=container-puppet-ovn_controller, vcs-type=git, io.buildah.version=1.41.5, release=1766032510, com.redhat.component=openstack-ovn-controller-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team) Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}ef345fb5fb978c14d3aa0a30dd0e5dff9b266e9ba48a519b676f1a051b0cd526' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}224e1913534a5aab220e4f36b9f9b1513fe7e3b433c6daefef7dba0ff5103b42' Feb 2 08:02:19 np0005604725 podman[55940]: 2026-02-02 08:02:19.765139574 +0000 UTC m=+0.059560578 container cleanup c3581b09ce7e8c5fff838ed62fd72a03a3d5608d313f894163259b186fb3b853 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.created=2026-01-12T22:36:40Z, description=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-type=git, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, com.redhat.component=openstack-ovn-controller-container, summary=Red Hat OpenStack Platform 17.1 ovn-controller, container_name=container-puppet-ovn_controller, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, url=https://www.redhat.com, io.openshift.expose-services=, distribution-scope=public, io.buildah.version=1.41.5, version=17.1.13, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, name=rhosp-rhel9/openstack-ovn-controller, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, build-date=2026-01-12T22:36:40Z) Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Feb 2 08:02:19 np0005604725 systemd[1]: libpod-conmon-c3581b09ce7e8c5fff838ed62fd72a03a3d5608d313f894163259b186fb3b853.scope: Deactivated successfully. Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Feb 2 08:02:19 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-ovn_controller --conmon-pidfile /run/container-puppet-ovn_controller.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,vs_config,exec --env NAME=ovn_controller --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::neutron::agents::ovn#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-ovn_controller --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-ovn_controller.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /etc/sysconfig/modules:/etc/sysconfig/modules --volume /lib/modules:/lib/modules:ro --volume /run/openvswitch:/run/openvswitch:shared,z --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/File[/var/www/cgi-bin/nova]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/File[nova_api_wsgi]/ensure: defined content as '{sha256}901cc9636a87a089b1b6620430d7a36909add0ca7dc2216b74d7bb9dc627d776' Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/ssl_only]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/cert]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/key]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Nova_config[console/ssl_minimum_version]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/my_ip]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/ssl_only]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/host]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/cert]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/key]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Nova_config[console/ssl_minimum_version]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/my_ip]/ensure: created Feb 2 08:02:19 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/host]/ensure: created Feb 2 08:02:20 np0005604725 podman[56006]: 2026-02-02 08:02:20.010427915 +0000 UTC m=+0.072546069 container create 4b7cffbf74e9d9c6049ee75ffbf0e21683de1bed383a6a1d071b8ffba06de145 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, summary=Red Hat OpenStack Platform 17.1 redis, architecture=x86_64, vcs-type=git, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:16Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, batch=17.1_20260112.1, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:10:16Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-redis, distribution-scope=public, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, tcib_managed=true, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, config_id=tripleo_puppet_step1) Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/dhcp_domain]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/dhcp_domain]/ensure: created Feb 2 08:02:20 np0005604725 systemd[1]: Started libpod-conmon-4b7cffbf74e9d9c6049ee75ffbf0e21683de1bed383a6a1d071b8ffba06de145.scope. Feb 2 08:02:20 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:20 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0f2d3c9c5f76900ba72a39131067cadc53812f895ff13c620126f55c117bc48b/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Nova_config[vif_plug_ovs/ovsdb_connection]/ensure: created Feb 2 08:02:20 np0005604725 podman[56006]: 2026-02-02 08:02:20.062292155 +0000 UTC m=+0.124410329 container init 4b7cffbf74e9d9c6049ee75ffbf0e21683de1bed383a6a1d071b8ffba06de145 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, architecture=x86_64, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, version=17.1.13, config_id=tripleo_puppet_step1, org.opencontainers.image.created=2026-01-12T22:10:16Z, vcs-type=git, distribution-scope=public, batch=17.1_20260112.1, managed_by=tripleo_ansible, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 redis, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-redis, container_name=container-puppet-redis, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 redis, build-date=2026-01-12T22:10:16Z, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, vendor=Red Hat, Inc.) Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Nova_config[notifications/notification_format]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Nova_config[vif_plug_ovs/ovsdb_connection]/ensure: created Feb 2 08:02:20 np0005604725 podman[56006]: 2026-02-02 08:02:20.076032146 +0000 UTC m=+0.138150330 container start 4b7cffbf74e9d9c6049ee75ffbf0e21683de1bed383a6a1d071b8ffba06de145 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, vendor=Red Hat, Inc., distribution-scope=public, url=https://www.redhat.com, com.redhat.component=openstack-redis-container, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 redis, description=Red Hat OpenStack Platform 17.1 redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, name=rhosp-rhel9/openstack-redis, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:16Z, architecture=x86_64, managed_by=tripleo_ansible, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, build-date=2026-01-12T22:10:16Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, io.buildah.version=1.41.5, version=17.1.13, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:02:20 np0005604725 podman[56006]: 2026-02-02 08:02:20.076348764 +0000 UTC m=+0.138466928 container attach 4b7cffbf74e9d9c6049ee75ffbf0e21683de1bed383a6a1d071b8ffba06de145 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 redis, build-date=2026-01-12T22:10:16Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-redis, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, architecture=x86_64, name=rhosp-rhel9/openstack-redis, description=Red Hat OpenStack Platform 17.1 redis, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., managed_by=tripleo_ansible, tcib_managed=true, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, org.opencontainers.image.created=2026-01-12T22:10:16Z, com.redhat.component=openstack-redis-container, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public) Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/state_path]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Nova_config[notifications/notification_format]/ensure: created Feb 2 08:02:20 np0005604725 podman[56006]: 2026-02-02 08:02:19.978728219 +0000 UTC m=+0.040846363 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Feb 2 08:02:20 np0005604725 systemd[1]: var-lib-containers-storage-overlay-05dca06fdf26886a9170c0b150e3cdd1498b37ba631e03ecda5ed497e482c57c-merged.mount: Deactivated successfully. Feb 2 08:02:20 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-c3581b09ce7e8c5fff838ed62fd72a03a3d5608d313f894163259b186fb3b853-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:20 np0005604725 systemd[1]: var-lib-containers-storage-overlay-4f58c9cbe84816d7c842a9279ad8e2fd52a22f676865b63890485cf39d7ab4dd-merged.mount: Deactivated successfully. Feb 2 08:02:20 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-d8ea9fd00ae3fba14f49047dde6e3c15eb7a4ef7c6140439efca85df5d667ed3-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/state_path]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/service_down_time]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/rootwrap_config]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/report_interval]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/service_down_time]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Nova_config[notifications/notify_on_state_change]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Nova_config[cinder/cross_az_attach]/ensure: created Feb 2 08:02:20 np0005604725 podman[56071]: 2026-02-02 08:02:20.169981572 +0000 UTC m=+0.053107585 container create 0441ff8d933fa0d99861842c19f5f0cb7f18ddbf558fceabba69c8492decc6cd (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, batch=17.1_20260112.1, version=17.1.13, url=https://www.redhat.com, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-rsyslog, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=container-puppet-rsyslog, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 rsyslog, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, summary=Red Hat OpenStack Platform 17.1 rsyslog, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, managed_by=tripleo_ansible, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, config_id=tripleo_puppet_step1, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:09Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, build-date=2026-01-12T22:10:09Z, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., com.redhat.component=openstack-rsyslog-container) Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/rootwrap_config]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/report_interval]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Nova_config[notifications/notify_on_state_change]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Nova_config[cinder/cross_az_attach]/ensure: created Feb 2 08:02:20 np0005604725 systemd[1]: Started libpod-conmon-0441ff8d933fa0d99861842c19f5f0cb7f18ddbf558fceabba69c8492decc6cd.scope. Feb 2 08:02:20 np0005604725 systemd[1]: tmp-crun.nhrgas.mount: Deactivated successfully. Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Glance/Nova_config[glance/valid_interfaces]/ensure: created Feb 2 08:02:20 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:20 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/9d51467aad67d29019ad134e4c3b6e1e1879bc9b8a7906f5b0ccb41fd87f6b26/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:20 np0005604725 podman[56071]: 2026-02-02 08:02:20.143523147 +0000 UTC m=+0.026649180 image pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Feb 2 08:02:20 np0005604725 podman[56071]: 2026-02-02 08:02:20.248778439 +0000 UTC m=+0.131904462 container init 0441ff8d933fa0d99861842c19f5f0cb7f18ddbf558fceabba69c8492decc6cd (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, name=rhosp-rhel9/openstack-rsyslog, distribution-scope=public, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:09Z, vendor=Red Hat, Inc., com.redhat.component=openstack-rsyslog-container, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 rsyslog, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:09Z, managed_by=tripleo_ansible, release=1766032510, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=container-puppet-rsyslog, config_id=tripleo_puppet_step1) Feb 2 08:02:20 np0005604725 puppet-user[55601]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:20 np0005604725 puppet-user[55601]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:20 np0005604725 puppet-user[55601]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:20 np0005604725 puppet-user[55601]: (file & line not available) Feb 2 08:02:20 np0005604725 podman[56071]: 2026-02-02 08:02:20.258597993 +0000 UTC m=+0.141724006 container start 0441ff8d933fa0d99861842c19f5f0cb7f18ddbf558fceabba69c8492decc6cd (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, build-date=2026-01-12T22:10:09Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:09Z, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, release=1766032510, container_name=container-puppet-rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, version=17.1.13, batch=17.1_20260112.1, managed_by=tripleo_ansible, com.redhat.component=openstack-rsyslog-container, vcs-type=git, name=rhosp-rhel9/openstack-rsyslog, summary=Red Hat OpenStack Platform 17.1 rsyslog, url=https://www.redhat.com, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:02:20 np0005604725 podman[56071]: 2026-02-02 08:02:20.25883394 +0000 UTC m=+0.141959963 container attach 0441ff8d933fa0d99861842c19f5f0cb7f18ddbf558fceabba69c8492decc6cd (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, vcs-type=git, build-date=2026-01-12T22:10:09Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, vendor=Red Hat, Inc., container_name=container-puppet-rsyslog, tcib_managed=true, version=17.1.13, description=Red Hat OpenStack Platform 17.1 rsyslog, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-rsyslog, url=https://www.redhat.com, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_puppet_step1, distribution-scope=public, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:09Z, com.redhat.component=openstack-rsyslog-container, summary=Red Hat OpenStack Platform 17.1 rsyslog, release=1766032510, managed_by=tripleo_ansible) Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Glance/Nova_config[glance/valid_interfaces]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55601]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:20 np0005604725 puppet-user[55601]: (file & line not available) Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_type]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_url]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_type]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/password]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_url]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_domain_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/password]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_domain_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/user_domain_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/username]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/user_domain_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/region_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/valid_interfaces]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/username]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/region_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/valid_interfaces]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_is_fatal]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/instance_name_template]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_timeout]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/enabled_apis]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/default_floating_pool]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Api/Nova_config[wsgi/api_paste_config]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/timeout]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_listen]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_domain_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_listen_port]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/region_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_workers]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/username]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/user_domain_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Api/Nova_config[api/use_forwarded_for]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/password]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Api/Nova_config[api/max_limit]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_url]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/valid_interfaces]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/ovs_bridge]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/allow_resize_to_same_host]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/extension_sync_interval]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_type]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Metadata/Nova_config[api/local_metadata_per_cell]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Metadata/Nova_config[neutron/service_metadata_proxy]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Metadata/Nova_config[neutron/metadata_proxy_shared_secret]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_is_fatal]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/project_domain_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_timeout]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/user_domain_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/default_floating_pool]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/timeout]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_domain_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/debug]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/region_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/username]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/user_domain_name]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/password]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_url]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/valid_interfaces]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/log_dir]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/ovs_bridge]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/extension_sync_interval]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_type]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/backend]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/enabled]/ensure: created Feb 2 08:02:20 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/memcache_servers]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/project_domain_name]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/user_domain_name]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/tls_enabled]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Conductor/Nova_config[conductor/workers]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/workers]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/discover_hosts_in_cells_interval]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_image_type_support]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/limit_tenants_to_placement_aggregate]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/placement_aggregate_required_for_tenants]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/enable_isolated_aggregate_filtering]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_availability_zone]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_routed_network_aggregates]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/host_subset_size]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/ssl]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/weight_classes]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/shuffle_best_same_weighed_hosts]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Warning: Scope(Apache::Vhost[placement_wsgi]): Feb 2 08:02:21 np0005604725 puppet-user[55601]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Feb 2 08:02:21 np0005604725 puppet-user[55601]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Feb 2 08:02:21 np0005604725 puppet-user[55601]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Feb 2 08:02:21 np0005604725 puppet-user[55601]: file names. Feb 2 08:02:21 np0005604725 puppet-user[55601]: Feb 2 08:02:21 np0005604725 puppet-user[55601]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Feb 2 08:02:21 np0005604725 puppet-user[55601]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Feb 2 08:02:21 np0005604725 puppet-user[55601]: sanitized $servername parameter when not explicitly defined. Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_ca_certs]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_client_cert]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_client_key]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/novncproxy_host]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/novncproxy_port]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/auth_schemes]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/debug]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 1.26 seconds Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Oslo::Messaging::Default[nova_config]/Nova_config[DEFAULT/transport_url]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/driver]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/transport_url]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/log_dir]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova/Oslo::Concurrency[nova_config]/Nova_config[oslo_concurrency/lock_path]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_type]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/region_name]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_url]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/username]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/password]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/user_domain_name]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_name]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_domain_name]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/backend]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/send_service_user_token]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/enabled]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/www_authenticate_uri]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_type]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/memcache_servers]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/tls_enabled]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/debug]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/log_file]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/log_dir]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Db/Oslo::Db[placement_config]/Placement_config[placement_database/connection]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/www_authenticate_uri]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/auth_type]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/memcached_servers]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/region_name]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/auth_url]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/username]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/password]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/user_domain_name]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/project_name]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/project_domain_name]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/interface]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}bad04a22292dc3e3eaa2dc1af003113f35ecad3d2dea59f97f280e917a2bf870' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}224e1913534a5aab220e4f36b9f9b1513fe7e3b433c6daefef7dba0ff5103b42' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcached_servers]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/region_name]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/enforce_scope]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/enforce_new_defaults]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/ssl]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/policy_file]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_url]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/username]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Wsgi::Apache/File[/etc/httpd/conf.d/00-placement-api.conf]/content: content changed '{sha256}829e74856246ff8f4a56a4995cd421edd210e3c0342c998de9e934d33c2d229f' to '{sha256}a742a33fca7bd0225b70d9c9c3f9977f3f5b1391a7c4db389c2e405e7a0e7ecc' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/File[/var/www/cgi-bin/placement]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/password]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/user_domain_name]/ensure: created Feb 2 08:02:21 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/File[placement_wsgi]/ensure: defined content as '{sha256}7330573e2f484b77671e7cd10bec4bf8fe4471ba5a127b8362286c6c89a050fe' Feb 2 08:02:21 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_name]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_domain_name]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Feb 2 08:02:22 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55601]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/Apache::Vhost[placement_wsgi]/Concat[10-placement_wsgi.conf]/File[/etc/httpd/conf.d/10-placement_wsgi.conf]/ensure: defined content as '{sha256}6e9eb3230d950a228be5b87e715dec8f020a283f1750debe52ec6471b874d69a' Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/interface]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[55601]: Notice: Applied catalog in 0.47 seconds Feb 2 08:02:22 np0005604725 puppet-user[55601]: Application: Feb 2 08:02:22 np0005604725 puppet-user[55601]: Initial environment: production Feb 2 08:02:22 np0005604725 puppet-user[55601]: Converged environment: production Feb 2 08:02:22 np0005604725 puppet-user[55601]: Run mode: user Feb 2 08:02:22 np0005604725 puppet-user[55601]: Changes: Feb 2 08:02:22 np0005604725 puppet-user[55601]: Total: 63 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Events: Feb 2 08:02:22 np0005604725 puppet-user[55601]: Success: 63 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Total: 63 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Resources: Feb 2 08:02:22 np0005604725 puppet-user[55601]: Skipped: 31 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Changed: 63 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Out of sync: 63 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Total: 208 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Time: Feb 2 08:02:22 np0005604725 puppet-user[55601]: Concat file: 0.00 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Anchor: 0.00 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Concat fragment: 0.00 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Augeas: 0.02 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Package: 0.02 Feb 2 08:02:22 np0005604725 puppet-user[55601]: File: 0.10 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Placement config: 0.12 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Transaction evaluation: 0.46 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Catalog application: 0.47 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Config retrieval: 1.37 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Last run: 1770019342 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Total: 0.47 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Version: Feb 2 08:02:22 np0005604725 puppet-user[55601]: Config: 1770019340 Feb 2 08:02:22 np0005604725 puppet-user[55601]: Puppet: 7.10.0 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:22 np0005604725 puppet-user[56161]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:22 np0005604725 puppet-user[56161]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:22 np0005604725 puppet-user[56161]: (file & line not available) Feb 2 08:02:22 np0005604725 puppet-user[56161]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:22 np0005604725 puppet-user[56161]: (file & line not available) Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/connection]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/max_retries]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/db_max_retries]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Db/Oslo::Db[api_database]/Nova_config[api_database/connection]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Oslo::Messaging::Default[nova_config]/Nova_config[DEFAULT/transport_url]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/driver]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/transport_url]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[56077]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:22 np0005604725 puppet-user[56077]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:22 np0005604725 puppet-user[56077]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:22 np0005604725 puppet-user[56077]: (file & line not available) Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/File[/var/www/cgi-bin/nova]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/File[nova_metadata_wsgi]/ensure: defined content as '{sha256}7311c9047eec89f1e952197038ebb53e3ab5810905e7292a2f802c7e4fc0351c' Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Feb 2 08:02:22 np0005604725 puppet-user[56077]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:22 np0005604725 puppet-user[56077]: (file & line not available) Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova/Oslo::Concurrency[nova_config]/Nova_config[oslo_concurrency/lock_path]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_type]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/Apache::Vhost[nova_metadata_wsgi]/Concat[10-nova_metadata_wsgi.conf]/File[/etc/httpd/conf.d/10-nova_metadata_wsgi.conf]/ensure: defined content as '{sha256}2af7ea2026a3dc6266ff098f5c2ba238b0c7fbb419f56cf762a11b3562783ae1' Feb 2 08:02:22 np0005604725 puppet-user[56161]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.44 seconds Feb 2 08:02:22 np0005604725 puppet-user[55072]: Notice: Applied catalog in 2.93 seconds Feb 2 08:02:22 np0005604725 systemd[1]: libpod-e5cffa002916362cf3f4c5572489f7278af364eb4faaef04f3fa7b94a3c2eb80.scope: Deactivated successfully. Feb 2 08:02:22 np0005604725 systemd[1]: libpod-e5cffa002916362cf3f4c5572489f7278af364eb4faaef04f3fa7b94a3c2eb80.scope: Consumed 3.935s CPU time. Feb 2 08:02:22 np0005604725 puppet-user[55072]: Application: Feb 2 08:02:22 np0005604725 puppet-user[55072]: Initial environment: production Feb 2 08:02:22 np0005604725 puppet-user[55072]: Converged environment: production Feb 2 08:02:22 np0005604725 puppet-user[55072]: Run mode: user Feb 2 08:02:22 np0005604725 puppet-user[55072]: Changes: Feb 2 08:02:22 np0005604725 puppet-user[55072]: Total: 126 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Events: Feb 2 08:02:22 np0005604725 puppet-user[55072]: Success: 126 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Total: 126 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Resources: Feb 2 08:02:22 np0005604725 puppet-user[55072]: Changed: 126 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Out of sync: 126 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Skipped: 37 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Total: 421 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Time: Feb 2 08:02:22 np0005604725 puppet-user[55072]: Concat file: 0.00 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Anchor: 0.00 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Concat fragment: 0.00 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Augeas: 0.02 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Package: 0.02 Feb 2 08:02:22 np0005604725 puppet-user[55072]: File: 0.13 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Config retrieval: 1.91 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Last run: 1770019342 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Nova config: 2.47 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Transaction evaluation: 2.91 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Catalog application: 2.93 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Resources: 0.00 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Total: 2.93 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Version: Feb 2 08:02:22 np0005604725 puppet-user[55072]: Config: 1770019337 Feb 2 08:02:22 np0005604725 puppet-user[55072]: Puppet: 7.10.0 Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/region_name]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_url]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/username]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/password]/ensure: created Feb 2 08:02:22 np0005604725 podman[56504]: 2026-02-02 08:02:22.540737171 +0000 UTC m=+0.035794638 container died e5cffa002916362cf3f4c5572489f7278af364eb4faaef04f3fa7b94a3c2eb80 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, architecture=x86_64, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, container_name=container-puppet-placement, description=Red Hat OpenStack Platform 17.1 placement-api, batch=17.1_20260112.1, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 placement-api, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, com.redhat.component=openstack-placement-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, build-date=2026-01-12T22:34:35Z, org.opencontainers.image.created=2026-01-12T22:34:35Z, io.buildah.version=1.41.5, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-placement-api) Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/user_domain_name]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_name]/ensure: created Feb 2 08:02:22 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-e5cffa002916362cf3f4c5572489f7278af364eb4faaef04f3fa7b94a3c2eb80-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:22 np0005604725 systemd[1]: var-lib-containers-storage-overlay-cb671736c13595c5843eeaf191ba1d6aca7188db98e42e531588282069778187-merged.mount: Deactivated successfully. Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_domain_name]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/send_service_user_token]/ensure: created Feb 2 08:02:22 np0005604725 podman[56504]: 2026-02-02 08:02:22.591938882 +0000 UTC m=+0.086996329 container cleanup e5cffa002916362cf3f4c5572489f7278af364eb4faaef04f3fa7b94a3c2eb80 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.component=openstack-placement-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-placement-api, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 placement-api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, url=https://www.redhat.com, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.created=2026-01-12T22:34:35Z, managed_by=tripleo_ansible, container_name=container-puppet-placement, vcs-type=git, build-date=2026-01-12T22:34:35Z, tcib_managed=true) Feb 2 08:02:22 np0005604725 systemd[1]: libpod-conmon-e5cffa002916362cf3f4c5572489f7278af364eb4faaef04f3fa7b94a3c2eb80.scope: Deactivated successfully. Feb 2 08:02:22 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-placement --conmon-pidfile /run/container-puppet-placement.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,placement_config --env NAME=placement --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::placement::api --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-placement --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-placement.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/www_authenticate_uri]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_type]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[56161]: Notice: /Stage[main]/Rsyslog::Base/File[/etc/rsyslog.conf]/content: content changed '{sha256}d6f679f6a4eb6f33f9fc20c846cb30bef93811e1c86bc4da1946dc3100b826c3' to '{sha256}7963bd801fadd49a17561f4d3f80738c3f504b413b11c443432d8303138041f2' Feb 2 08:02:22 np0005604725 puppet-user[56161]: Notice: /Stage[main]/Rsyslog::Config::Global/Rsyslog::Component::Global_config[MaxMessageSize]/Rsyslog::Generate_concat[rsyslog::concat::global_config::MaxMessageSize]/Concat[/etc/rsyslog.d/00_rsyslog.conf]/File[/etc/rsyslog.d/00_rsyslog.conf]/ensure: defined content as '{sha256}a291d5cc6d5884a978161f4c7b5831d43edd07797cc590bae366e7f150b8643b' Feb 2 08:02:22 np0005604725 puppet-user[56161]: Notice: /Stage[main]/Rsyslog::Config::Templates/Rsyslog::Component::Template[rsyslog-node-index]/Rsyslog::Generate_concat[rsyslog::concat::template::rsyslog-node-index]/Concat[/etc/rsyslog.d/50_openstack_logs.conf]/File[/etc/rsyslog.d/50_openstack_logs.conf]/ensure: defined content as '{sha256}306542b239894cf15237bb53802b05b115d743ddf28fdc9312c61b4709026b9e' Feb 2 08:02:22 np0005604725 puppet-user[56161]: Notice: Applied catalog in 0.13 seconds Feb 2 08:02:22 np0005604725 puppet-user[56161]: Application: Feb 2 08:02:22 np0005604725 puppet-user[56161]: Initial environment: production Feb 2 08:02:22 np0005604725 puppet-user[56161]: Converged environment: production Feb 2 08:02:22 np0005604725 puppet-user[56161]: Run mode: user Feb 2 08:02:22 np0005604725 puppet-user[56161]: Changes: Feb 2 08:02:22 np0005604725 puppet-user[56161]: Total: 3 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Events: Feb 2 08:02:22 np0005604725 puppet-user[56161]: Success: 3 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Total: 3 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Resources: Feb 2 08:02:22 np0005604725 puppet-user[56161]: Skipped: 11 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Changed: 3 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Out of sync: 3 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Total: 45 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Time: Feb 2 08:02:22 np0005604725 puppet-user[56161]: Concat file: 0.00 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Concat fragment: 0.00 Feb 2 08:02:22 np0005604725 puppet-user[56161]: File: 0.01 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Transaction evaluation: 0.12 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Catalog application: 0.13 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Config retrieval: 0.51 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Last run: 1770019342 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Total: 0.13 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Version: Feb 2 08:02:22 np0005604725 puppet-user[56161]: Config: 1770019342 Feb 2 08:02:22 np0005604725 puppet-user[56161]: Puppet: 7.10.0 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.34 seconds Feb 2 08:02:22 np0005604725 puppet-user[56077]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Redis_bundle/File[/etc/redis-tls.conf]/ensure: defined content as '{sha256}05ac47acbffedaa4e406118e2985b44e9c057e03a329dce9f63452238f47cc2a' Feb 2 08:02:22 np0005604725 puppet-user[56077]: Notice: /Stage[main]/Tripleo::Stunnel/Concat[/etc/stunnel/stunnel.conf]/File[/etc/stunnel/stunnel.conf]/ensure: defined content as '{sha256}cd41ab2755917de167c1ac35c93dec78728196ff04e3f7abce6079783adaaf85' Feb 2 08:02:22 np0005604725 puppet-user[56077]: Notice: /Stage[main]/Redis::Config/File[/etc/redis]/mode: mode changed '0750' to '0755' Feb 2 08:02:22 np0005604725 puppet-user[56077]: Notice: /Stage[main]/Redis::Ulimit/File[/etc/security/limits.d/redis.conf]/ensure: defined content as '{sha256}4723daf91256d1c55ef938214e69b3359209d2df79c3dceb8b8352faf4c8886d' Feb 2 08:02:22 np0005604725 puppet-user[56077]: Notice: /Stage[main]/Redis::Ulimit/File[/etc/systemd/system/redis.service.d/limit.conf]/mode: mode changed '0644' to '0444' Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[56077]: Notice: /Stage[main]/Redis::Config/Redis::Instance[default]/File[/etc/redis.conf.puppet]/ensure: defined content as '{sha256}7e748ef30153ceb5f70928d7e9a9f5fd7294c2e93832cf85c7acaebcfad24146' Feb 2 08:02:22 np0005604725 puppet-user[56077]: Notice: /Stage[main]/Redis::Config/Redis::Instance[default]/Exec[cp -p /etc/redis.conf.puppet /etc/redis.conf]: Triggered 'refresh' from 1 event Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcached_servers]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[56077]: Notice: Applied catalog in 0.08 seconds Feb 2 08:02:22 np0005604725 puppet-user[56077]: Application: Feb 2 08:02:22 np0005604725 puppet-user[56077]: Initial environment: production Feb 2 08:02:22 np0005604725 puppet-user[56077]: Converged environment: production Feb 2 08:02:22 np0005604725 puppet-user[56077]: Run mode: user Feb 2 08:02:22 np0005604725 puppet-user[56077]: Changes: Feb 2 08:02:22 np0005604725 puppet-user[56077]: Total: 7 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Events: Feb 2 08:02:22 np0005604725 puppet-user[56077]: Success: 7 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Total: 7 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Resources: Feb 2 08:02:22 np0005604725 puppet-user[56077]: Restarted: 1 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Changed: 7 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Out of sync: 7 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Skipped: 9 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Total: 25 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Time: Feb 2 08:02:22 np0005604725 puppet-user[56077]: Concat file: 0.00 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Concat fragment: 0.00 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Exec: 0.00 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Augeas: 0.01 Feb 2 08:02:22 np0005604725 puppet-user[56077]: File: 0.03 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Transaction evaluation: 0.08 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Catalog application: 0.08 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Config retrieval: 0.38 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Last run: 1770019342 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Total: 0.08 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Version: Feb 2 08:02:22 np0005604725 puppet-user[56077]: Config: 1770019342 Feb 2 08:02:22 np0005604725 puppet-user[56077]: Puppet: 7.10.0 Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/region_name]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_url]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/username]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/password]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/user_domain_name]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_name]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_domain_name]/ensure: created Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/interface]/ensure: created Feb 2 08:02:22 np0005604725 podman[56580]: 2026-02-02 08:02:22.923396469 +0000 UTC m=+0.057451202 container create 313d4d276a753a1465ea72d44191f50907ea76d6826d49fce5fe3c293739fefb (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=container-puppet-swift, com.redhat.component=openstack-swift-proxy-server-container, name=rhosp-rhel9/openstack-swift-proxy-server, batch=17.1_20260112.1, io.buildah.version=1.41.5, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, managed_by=tripleo_ansible, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:50:51Z, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:51Z, architecture=x86_64, distribution-scope=public, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1766032510, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, version=17.1.13, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1) Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/connection]/ensure: created Feb 2 08:02:22 np0005604725 podman[56071]: 2026-02-02 08:02:22.956105272 +0000 UTC m=+2.839231305 container died 0441ff8d933fa0d99861842c19f5f0cb7f18ddbf558fceabba69c8492decc6cd (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, release=1766032510, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 rsyslog, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, com.redhat.component=openstack-rsyslog-container, distribution-scope=public, maintainer=OpenStack TripleO Team, tcib_managed=true, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, architecture=x86_64, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:09Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, build-date=2026-01-12T22:10:09Z, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 rsyslog, name=rhosp-rhel9/openstack-rsyslog, managed_by=tripleo_ansible, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=container-puppet-rsyslog, config_id=tripleo_puppet_step1) Feb 2 08:02:22 np0005604725 systemd[1]: Started libpod-conmon-313d4d276a753a1465ea72d44191f50907ea76d6826d49fce5fe3c293739fefb.scope. Feb 2 08:02:22 np0005604725 systemd[1]: libpod-0441ff8d933fa0d99861842c19f5f0cb7f18ddbf558fceabba69c8492decc6cd.scope: Deactivated successfully. Feb 2 08:02:22 np0005604725 systemd[1]: libpod-0441ff8d933fa0d99861842c19f5f0cb7f18ddbf558fceabba69c8492decc6cd.scope: Consumed 2.548s CPU time. Feb 2 08:02:22 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:22 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/8b310cb52cb87a43a862a1687259a9c1c2e9ca90ed27dd09cdfe9f07989fb92e/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:22 np0005604725 puppet-user[55826]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:22 np0005604725 puppet-user[55826]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:22 np0005604725 puppet-user[55826]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:22 np0005604725 puppet-user[55826]: (file & line not available) Feb 2 08:02:22 np0005604725 podman[56580]: 2026-02-02 08:02:22.980053578 +0000 UTC m=+0.114108311 container init 313d4d276a753a1465ea72d44191f50907ea76d6826d49fce5fe3c293739fefb (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, managed_by=tripleo_ansible, architecture=x86_64, vendor=Red Hat, Inc., build-date=2026-01-12T22:50:51Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1766032510, config_id=tripleo_puppet_step1, batch=17.1_20260112.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-swift-proxy-server-container, container_name=container-puppet-swift, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, name=rhosp-rhel9/openstack-swift-proxy-server, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:51Z, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.13, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:02:22 np0005604725 podman[56580]: 2026-02-02 08:02:22.985225618 +0000 UTC m=+0.119280351 container start 313d4d276a753a1465ea72d44191f50907ea76d6826d49fce5fe3c293739fefb (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, batch=17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, url=https://www.redhat.com, com.redhat.component=openstack-swift-proxy-server-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, container_name=container-puppet-swift, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, release=1766032510, architecture=x86_64, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.created=2026-01-12T22:50:51Z, build-date=2026-01-12T22:50:51Z, distribution-scope=public, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server) Feb 2 08:02:22 np0005604725 podman[56580]: 2026-02-02 08:02:22.985376302 +0000 UTC m=+0.119431045 container attach 313d4d276a753a1465ea72d44191f50907ea76d6826d49fce5fe3c293739fefb (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, url=https://www.redhat.com, io.openshift.expose-services=, container_name=container-puppet-swift, version=17.1.13, vendor=Red Hat, Inc., distribution-scope=public, com.redhat.component=openstack-swift-proxy-server-container, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:50:51Z, release=1766032510, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, build-date=2026-01-12T22:50:51Z, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-swift-proxy-server, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:02:22 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/max_retries]/ensure: created Feb 2 08:02:23 np0005604725 podman[56580]: 2026-02-02 08:02:22.892706801 +0000 UTC m=+0.026761544 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/db_max_retries]/ensure: created Feb 2 08:02:23 np0005604725 puppet-user[55826]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:23 np0005604725 puppet-user[55826]: (file & line not available) Feb 2 08:02:23 np0005604725 systemd[1]: libpod-4b7cffbf74e9d9c6049ee75ffbf0e21683de1bed383a6a1d071b8ffba06de145.scope: Deactivated successfully. Feb 2 08:02:23 np0005604725 systemd[1]: libpod-4b7cffbf74e9d9c6049ee75ffbf0e21683de1bed383a6a1d071b8ffba06de145.scope: Consumed 2.862s CPU time. Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Db/Oslo::Db[api_database]/Nova_config[api_database/connection]/ensure: created Feb 2 08:02:23 np0005604725 podman[56686]: 2026-02-02 08:02:23.123233223 +0000 UTC m=+0.161917432 container cleanup 0441ff8d933fa0d99861842c19f5f0cb7f18ddbf558fceabba69c8492decc6cd (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.created=2026-01-12T22:10:09Z, release=1766032510, container_name=container-puppet-rsyslog, managed_by=tripleo_ansible, url=https://www.redhat.com, build-date=2026-01-12T22:10:09Z, io.buildah.version=1.41.5, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 rsyslog, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, architecture=x86_64, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, batch=17.1_20260112.1, io.openshift.expose-services=, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.component=openstack-rsyslog-container, name=rhosp-rhel9/openstack-rsyslog) Feb 2 08:02:23 np0005604725 systemd[1]: libpod-conmon-0441ff8d933fa0d99861842c19f5f0cb7f18ddbf558fceabba69c8492decc6cd.scope: Deactivated successfully. Feb 2 08:02:23 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-rsyslog --conmon-pidfile /run/container-puppet-rsyslog.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment --env NAME=rsyslog --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::logging::rsyslog --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-rsyslog --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-rsyslog.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Feb 2 08:02:23 np0005604725 puppet-user[55826]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.29 seconds Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/enforce_scope]/ensure: created Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/enforce_new_defaults]/ensure: created Feb 2 08:02:23 np0005604725 podman[56745]: 2026-02-02 08:02:23.286767666 +0000 UTC m=+0.154748397 container died 4b7cffbf74e9d9c6049ee75ffbf0e21683de1bed383a6a1d071b8ffba06de145 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_puppet_step1, name=rhosp-rhel9/openstack-redis, tcib_managed=true, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 redis, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., com.redhat.component=openstack-redis-container, release=1766032510, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:16Z, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, io.buildah.version=1.41.5, batch=17.1_20260112.1, container_name=container-puppet-redis, url=https://www.redhat.com, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:16Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 redis) Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/policy_file]/ensure: created Feb 2 08:02:23 np0005604725 podman[56745]: 2026-02-02 08:02:23.314757632 +0000 UTC m=+0.182738333 container cleanup 4b7cffbf74e9d9c6049ee75ffbf0e21683de1bed383a6a1d071b8ffba06de145 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:16Z, architecture=x86_64, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 redis, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1766032510, tcib_managed=true, batch=17.1_20260112.1, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, config_id=tripleo_puppet_step1, name=rhosp-rhel9/openstack-redis, description=Red Hat OpenStack Platform 17.1 redis, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:16Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, container_name=container-puppet-redis, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, version=17.1.13) Feb 2 08:02:23 np0005604725 systemd[1]: libpod-conmon-4b7cffbf74e9d9c6049ee75ffbf0e21683de1bed383a6a1d071b8ffba06de145.scope: Deactivated successfully. Feb 2 08:02:23 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-redis --conmon-pidfile /run/container-puppet-redis.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,exec --env NAME=redis --env STEP_CONFIG=include ::tripleo::packages#012Exec <| title == 'systemd-reload-redis' |> { unless => 'true' }#012include tripleo::profile::pacemaker::database::redis_bundle#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-redis --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-redis.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Api/Oslo::Middleware[nova_config]/Nova_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Feb 2 08:02:23 np0005604725 puppet-user[55826]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/rabbitmq]/mode: mode changed '0755' to '2755' Feb 2 08:02:23 np0005604725 puppet-user[55826]: Notice: /Stage[main]/Tripleo::Profile::Base::Rabbitmq/File[/etc/rabbitmq/ssl-dist.conf]/ensure: defined content as '{sha256}4fcb8b2c0ce7c31ae2a64808de62371e284138a67310e23f1c73dbf139a874c7' Feb 2 08:02:23 np0005604725 puppet-user[55826]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/rabbitmq/ssl]/ensure: created Feb 2 08:02:23 np0005604725 puppet-user[55826]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq-env.config]/ensure: defined content as '{sha256}4680e2a42d5565adc49e988076a4d08b69ea756eb085bc40c5a5bcb7328ca21a' Feb 2 08:02:23 np0005604725 puppet-user[55826]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq-inetrc]/ensure: defined content as '{sha256}b83b8080dbcdf2a49fff2f747972e7343801f7518a0f1dcb3e2a301e50aef551' Feb 2 08:02:23 np0005604725 puppet-user[55826]: Notice: /Stage[main]/Rabbitmq::Config/File[enabled_plugins]/ensure: defined content as '{sha256}3b5c9fba2f1456d923499fc142bc9ef7a7f6d53d6bc4c0ae88310332eb10a31c' Feb 2 08:02:23 np0005604725 puppet-user[55826]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/security/limits.d/rabbitmq-server.conf]/ensure: defined content as '{sha256}b984a5f0a62696715f206ca0a602fd9d2d497894c6c24502896fb3010ee0c557' Feb 2 08:02:23 np0005604725 puppet-user[55826]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq.config]/ensure: defined content as '{sha256}5d2a6b566c0b33541633663d6b595459d3eb8978d4061d7c449a6eb5d8a9389e' Feb 2 08:02:23 np0005604725 puppet-user[55826]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File[/var/lib/rabbitmq/.erlang.cookie]/content: content changed '{sha256}88f7b412814bd0a0e752db0a74187308ba16bed2ae4a30f64667146a386f198a' to '{sha256}5a005fc58331f4e0212d400355ac7462c2621dccbfc2b373ae881cbea3808ed7' Feb 2 08:02:23 np0005604725 systemd[1]: libpod-24fcc2553b2fe6883e1147e83afb746846b02e2c56d4b0b83ae8821c8acebf66.scope: Deactivated successfully. Feb 2 08:02:23 np0005604725 systemd[1]: libpod-24fcc2553b2fe6883e1147e83afb746846b02e2c56d4b0b83ae8821c8acebf66.scope: Consumed 7.252s CPU time. Feb 2 08:02:23 np0005604725 puppet-user[55826]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File_line[rabbitmq-pamd-systemd]/ensure: removed Feb 2 08:02:23 np0005604725 puppet-user[55826]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File_line[rabbitmq-pamd-succeed]/ensure: created Feb 2 08:02:23 np0005604725 puppet-user[55826]: Notice: Applied catalog in 0.11 seconds Feb 2 08:02:23 np0005604725 puppet-user[55826]: Application: Feb 2 08:02:23 np0005604725 puppet-user[55826]: Initial environment: production Feb 2 08:02:23 np0005604725 puppet-user[55826]: Converged environment: production Feb 2 08:02:23 np0005604725 puppet-user[55826]: Run mode: user Feb 2 08:02:23 np0005604725 puppet-user[55826]: Changes: Feb 2 08:02:23 np0005604725 puppet-user[55826]: Total: 11 Feb 2 08:02:23 np0005604725 puppet-user[55826]: Events: Feb 2 08:02:23 np0005604725 puppet-user[55826]: Success: 11 Feb 2 08:02:23 np0005604725 puppet-user[55826]: Total: 11 Feb 2 08:02:23 np0005604725 puppet-user[55826]: Resources: Feb 2 08:02:23 np0005604725 puppet-user[55826]: Changed: 11 Feb 2 08:02:23 np0005604725 puppet-user[55826]: Out of sync: 11 Feb 2 08:02:23 np0005604725 puppet-user[55826]: Skipped: 9 Feb 2 08:02:23 np0005604725 puppet-user[55826]: Total: 20 Feb 2 08:02:23 np0005604725 puppet-user[55826]: Time: Feb 2 08:02:23 np0005604725 puppet-user[55826]: File line: 0.00 Feb 2 08:02:23 np0005604725 puppet-user[55826]: File: 0.03 Feb 2 08:02:23 np0005604725 puppet-user[55826]: Transaction evaluation: 0.10 Feb 2 08:02:23 np0005604725 puppet-user[55826]: Catalog application: 0.11 Feb 2 08:02:23 np0005604725 puppet-user[55826]: Config retrieval: 0.33 Feb 2 08:02:23 np0005604725 puppet-user[55826]: Last run: 1770019343 Feb 2 08:02:23 np0005604725 puppet-user[55826]: Total: 0.11 Feb 2 08:02:23 np0005604725 puppet-user[55826]: Version: Feb 2 08:02:23 np0005604725 puppet-user[55826]: Config: 1770019342 Feb 2 08:02:23 np0005604725 puppet-user[55826]: Puppet: 7.10.0 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Cron::Archive_deleted_rows/Cron[nova-manage db archive_deleted_rows]/ensure: created Feb 2 08:02:23 np0005604725 podman[55016]: 2026-02-02 08:02:23.411779771 +0000 UTC m=+7.783035143 container died 24fcc2553b2fe6883e1147e83afb746846b02e2c56d4b0b83ae8821c8acebf66 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T23:31:50Z, version=17.1.13, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-api-container, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-nova-api, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, release=1766032510, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, vcs-type=git, config_id=tripleo_puppet_step1, container_name=container-puppet-nova_metadata, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vendor=Red Hat, Inc.) Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Cron::Purge_shadow_tables/Cron[nova-manage db purge]/ensure: created Feb 2 08:02:23 np0005604725 podman[56825]: 2026-02-02 08:02:23.439325315 +0000 UTC m=+0.072452247 container cleanup 24fcc2553b2fe6883e1147e83afb746846b02e2c56d4b0b83ae8821c8acebf66 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, container_name=container-puppet-nova_metadata, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-api-container, io.buildah.version=1.41.5, vcs-type=git, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 nova-api, release=1766032510, url=https://www.redhat.com, version=17.1.13, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T23:31:50Z, summary=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, name=rhosp-rhel9/openstack-nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T23:31:50Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Feb 2 08:02:23 np0005604725 systemd[1]: libpod-conmon-24fcc2553b2fe6883e1147e83afb746846b02e2c56d4b0b83ae8821c8acebf66.scope: Deactivated successfully. Feb 2 08:02:23 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-nova_metadata --conmon-pidfile /run/container-puppet-nova_metadata.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini --env NAME=nova_metadata --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::nova::metadata#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-nova_metadata --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-nova_metadata.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/Apache::Vhost[nova_api_wsgi]/Concat[10-nova_api_wsgi.conf]/File[/etc/httpd/conf.d/10-nova_api_wsgi.conf]/ensure: defined content as '{sha256}d59b5a356e81738d9b1a8a5e9573b71dd1a20b1df0ad3a679f2e246d7dc6f2d2' Feb 2 08:02:23 np0005604725 puppet-user[54877]: Notice: Applied catalog in 4.15 seconds Feb 2 08:02:23 np0005604725 podman[56875]: 2026-02-02 08:02:23.543847345 +0000 UTC m=+0.088369755 container create d4c6d9964f2ba60f8611f64b174950e588bbf1d53a6c7c18dd58960730ecec58 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, name=rhosp-rhel9/openstack-swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.13, io.buildah.version=1.41.5, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, distribution-scope=public, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, container_name=container-puppet-swift_ringbuilder, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, io.openshift.expose-services=, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, architecture=x86_64, tcib_managed=true, build-date=2026-01-12T22:50:51Z, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:50:51Z, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:02:23 np0005604725 puppet-user[54877]: Application: Feb 2 08:02:23 np0005604725 puppet-user[54877]: Initial environment: production Feb 2 08:02:23 np0005604725 puppet-user[54877]: Converged environment: production Feb 2 08:02:23 np0005604725 puppet-user[54877]: Run mode: user Feb 2 08:02:23 np0005604725 puppet-user[54877]: Changes: Feb 2 08:02:23 np0005604725 puppet-user[54877]: Total: 156 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Events: Feb 2 08:02:23 np0005604725 puppet-user[54877]: Success: 156 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Total: 156 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Resources: Feb 2 08:02:23 np0005604725 puppet-user[54877]: Changed: 156 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Out of sync: 156 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Skipped: 45 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Total: 511 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Time: Feb 2 08:02:23 np0005604725 puppet-user[54877]: Concat file: 0.00 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Anchor: 0.00 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Concat fragment: 0.00 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Package: 0.02 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Augeas: 0.03 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Cron: 0.04 Feb 2 08:02:23 np0005604725 puppet-user[54877]: File: 0.18 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Last run: 1770019343 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Config retrieval: 2.06 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Nova config: 3.47 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Transaction evaluation: 4.12 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Catalog application: 4.15 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Resources: 0.00 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Total: 4.15 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Version: Feb 2 08:02:23 np0005604725 puppet-user[54877]: Config: 1770019337 Feb 2 08:02:23 np0005604725 puppet-user[54877]: Puppet: 7.10.0 Feb 2 08:02:23 np0005604725 systemd[1]: var-lib-containers-storage-overlay-9d51467aad67d29019ad134e4c3b6e1e1879bc9b8a7906f5b0ccb41fd87f6b26-merged.mount: Deactivated successfully. Feb 2 08:02:23 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-0441ff8d933fa0d99861842c19f5f0cb7f18ddbf558fceabba69c8492decc6cd-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:23 np0005604725 systemd[1]: var-lib-containers-storage-overlay-0f2d3c9c5f76900ba72a39131067cadc53812f895ff13c620126f55c117bc48b-merged.mount: Deactivated successfully. Feb 2 08:02:23 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-4b7cffbf74e9d9c6049ee75ffbf0e21683de1bed383a6a1d071b8ffba06de145-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:23 np0005604725 systemd[1]: var-lib-containers-storage-overlay-b5cc6e714ec56ed6c408692170f0a27a1f11b97ea45c188bc609c3b312a29f3d-merged.mount: Deactivated successfully. Feb 2 08:02:23 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-24fcc2553b2fe6883e1147e83afb746846b02e2c56d4b0b83ae8821c8acebf66-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:23 np0005604725 systemd[1]: Started libpod-conmon-d4c6d9964f2ba60f8611f64b174950e588bbf1d53a6c7c18dd58960730ecec58.scope. Feb 2 08:02:23 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:23 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/50b696acfc5753ba4c4a1edb1332667cae98f2d35bf7e3e7925ce66aa4c58957/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:23 np0005604725 podman[56875]: 2026-02-02 08:02:23.597320819 +0000 UTC m=+0.141843229 container init d4c6d9964f2ba60f8611f64b174950e588bbf1d53a6c7c18dd58960730ecec58 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, name=rhosp-rhel9/openstack-swift-proxy-server, org.opencontainers.image.created=2026-01-12T22:50:51Z, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, com.redhat.component=openstack-swift-proxy-server-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, container_name=container-puppet-swift_ringbuilder, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, version=17.1.13, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, io.buildah.version=1.41.5, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:51Z, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., distribution-scope=public, vcs-type=git, batch=17.1_20260112.1) Feb 2 08:02:23 np0005604725 podman[56875]: 2026-02-02 08:02:23.604136563 +0000 UTC m=+0.148658963 container start d4c6d9964f2ba60f8611f64b174950e588bbf1d53a6c7c18dd58960730ecec58 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_id=tripleo_puppet_step1, build-date=2026-01-12T22:50:51Z, tcib_managed=true, vendor=Red Hat, Inc., distribution-scope=public, io.buildah.version=1.41.5, url=https://www.redhat.com, vcs-type=git, container_name=container-puppet-swift_ringbuilder, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-swift-proxy-server, batch=17.1_20260112.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.13, com.redhat.component=openstack-swift-proxy-server-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:50:51Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, architecture=x86_64) Feb 2 08:02:23 np0005604725 podman[56875]: 2026-02-02 08:02:23.604418751 +0000 UTC m=+0.148941171 container attach d4c6d9964f2ba60f8611f64b174950e588bbf1d53a6c7c18dd58960730ecec58 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, com.redhat.component=openstack-swift-proxy-server-container, name=rhosp-rhel9/openstack-swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, io.openshift.expose-services=, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:50:51Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:50:51Z, managed_by=tripleo_ansible, tcib_managed=true, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=container-puppet-swift_ringbuilder, distribution-scope=public, io.buildah.version=1.41.5, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_puppet_step1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server) Feb 2 08:02:23 np0005604725 podman[56875]: 2026-02-02 08:02:23.511877883 +0000 UTC m=+0.056400313 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Feb 2 08:02:23 np0005604725 systemd[1]: libpod-83d0af33823058b073e06fb1ae61e12ff9d89e18003423772c6459b1e1adc790.scope: Deactivated successfully. Feb 2 08:02:23 np0005604725 systemd[1]: libpod-83d0af33823058b073e06fb1ae61e12ff9d89e18003423772c6459b1e1adc790.scope: Consumed 4.950s CPU time. Feb 2 08:02:23 np0005604725 podman[55772]: 2026-02-02 08:02:23.713648619 +0000 UTC m=+4.671644174 container died 83d0af33823058b073e06fb1ae61e12ff9d89e18003423772c6459b1e1adc790 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, tcib_managed=true, vcs-type=git, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., container_name=container-puppet-rabbitmq, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp-rhel9/openstack-rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, version=17.1.13, build-date=2026-01-12T22:10:14Z, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:14Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, distribution-scope=public) Feb 2 08:02:23 np0005604725 podman[56956]: 2026-02-02 08:02:23.773963096 +0000 UTC m=+0.049582638 container cleanup 83d0af33823058b073e06fb1ae61e12ff9d89e18003423772c6459b1e1adc790 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, version=17.1.13, release=1766032510, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 rabbitmq, distribution-scope=public, build-date=2026-01-12T22:10:14Z, name=rhosp-rhel9/openstack-rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, vendor=Red Hat, Inc., architecture=x86_64, io.openshift.expose-services=, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-rabbitmq-container, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, container_name=container-puppet-rabbitmq) Feb 2 08:02:23 np0005604725 systemd[1]: libpod-conmon-83d0af33823058b073e06fb1ae61e12ff9d89e18003423772c6459b1e1adc790.scope: Deactivated successfully. Feb 2 08:02:23 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-rabbitmq --conmon-pidfile /run/container-puppet-rabbitmq.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file,file_line --env NAME=rabbitmq --env STEP_CONFIG=include ::tripleo::packages#012['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }#012include tripleo::profile::pacemaker::rabbitmq_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-rabbitmq --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-rabbitmq.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Feb 2 08:02:24 np0005604725 systemd[1]: libpod-196dede859dfa5374799a52f0ef0517408765511e42e239f04c610ed542a972d.scope: Deactivated successfully. Feb 2 08:02:24 np0005604725 systemd[1]: libpod-196dede859dfa5374799a52f0ef0517408765511e42e239f04c610ed542a972d.scope: Consumed 8.907s CPU time. Feb 2 08:02:24 np0005604725 podman[54819]: 2026-02-02 08:02:24.528311938 +0000 UTC m=+9.342530235 container died 196dede859dfa5374799a52f0ef0517408765511e42e239f04c610ed542a972d (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, release=1766032510, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, container_name=container-puppet-nova, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T23:31:50Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.buildah.version=1.41.5, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, batch=17.1_20260112.1, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, name=rhosp-rhel9/openstack-nova-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, maintainer=OpenStack TripleO Team) Feb 2 08:02:24 np0005604725 systemd[1]: tmp-crun.d4UJya.mount: Deactivated successfully. Feb 2 08:02:24 np0005604725 systemd[1]: var-lib-containers-storage-overlay-fa913786ac223c80751f7dd524e333d56e3d4166fd35bcb1ef64160c4f1a3f1e-merged.mount: Deactivated successfully. Feb 2 08:02:24 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-83d0af33823058b073e06fb1ae61e12ff9d89e18003423772c6459b1e1adc790-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:24 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-196dede859dfa5374799a52f0ef0517408765511e42e239f04c610ed542a972d-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:24 np0005604725 systemd[1]: var-lib-containers-storage-overlay-2998d98e19fd3d37fc5a32c52789c88de0795a44228d2ac288522c8b937a2d9d-merged.mount: Deactivated successfully. Feb 2 08:02:24 np0005604725 podman[57033]: 2026-02-02 08:02:24.650780223 +0000 UTC m=+0.115210711 container cleanup 196dede859dfa5374799a52f0ef0517408765511e42e239f04c610ed542a972d (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, io.openshift.expose-services=, config_id=tripleo_puppet_step1, container_name=container-puppet-nova, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-api-container, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp-rhel9/openstack-nova-api, release=1766032510, build-date=2026-01-12T23:31:50Z, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, tcib_managed=true, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:31:50Z, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64) Feb 2 08:02:24 np0005604725 systemd[1]: libpod-conmon-196dede859dfa5374799a52f0ef0517408765511e42e239f04c610ed542a972d.scope: Deactivated successfully. Feb 2 08:02:24 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-nova --conmon-pidfile /run/container-puppet-nova.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config --env NAME=nova --env STEP_CONFIG=include ::tripleo::packages#012['Nova_cell_v2'].each |String $val| { noop_resource($val) }#012include tripleo::profile::base::nova::api#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::conductor#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::scheduler#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::vncproxy#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-nova --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-nova.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:02:25 np0005604725 puppet-user[56744]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:25 np0005604725 puppet-user[56744]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:25 np0005604725 puppet-user[56744]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:25 np0005604725 puppet-user[56744]: (file & line not available) Feb 2 08:02:25 np0005604725 puppet-user[56744]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:25 np0005604725 puppet-user[56744]: (file & line not available) Feb 2 08:02:25 np0005604725 puppet-user[56955]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:02:25 np0005604725 puppet-user[56955]: (file: /etc/puppet/hiera.yaml) Feb 2 08:02:25 np0005604725 puppet-user[56955]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:02:25 np0005604725 puppet-user[56955]: (file & line not available) Feb 2 08:02:25 np0005604725 puppet-user[56955]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:02:25 np0005604725 puppet-user[56955]: (file & line not available) Feb 2 08:02:25 np0005604725 puppet-user[56744]: Warning: Scope(Class[Swift::Proxy::S3token]): Usage of the default password is deprecated and will be removed in a future release. \ Feb 2 08:02:25 np0005604725 puppet-user[56744]: Please set password parameter Feb 2 08:02:25 np0005604725 puppet-user[56744]: Warning: Scope(Class[Swift::Keymaster]): password parameter is missing Feb 2 08:02:25 np0005604725 puppet-user[56744]: Warning: Scope(Class[Swift::Storage::All]): The default port for the object storage server has changed \ Feb 2 08:02:25 np0005604725 puppet-user[56744]: from 6000 to 6200 and will be changed in a later release Feb 2 08:02:25 np0005604725 puppet-user[56744]: Warning: Scope(Class[Swift::Storage::All]): The default port for the container storage server has changed \ Feb 2 08:02:25 np0005604725 puppet-user[56744]: from 6001 to 6201 and will be changed in a later release Feb 2 08:02:25 np0005604725 puppet-user[56744]: Warning: Scope(Class[Swift::Storage::All]): The default port for the account storage server has changed \ Feb 2 08:02:25 np0005604725 puppet-user[56744]: from 6002 to 6202 and will be changed in a later release Feb 2 08:02:25 np0005604725 puppet-user[56955]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Feb 2 08:02:25 np0005604725 puppet-user[56955]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Feb 2 08:02:25 np0005604725 puppet-user[56955]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Feb 2 08:02:25 np0005604725 puppet-user[56955]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Feb 2 08:02:25 np0005604725 puppet-user[56955]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Feb 2 08:02:25 np0005604725 puppet-user[56955]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Feb 2 08:02:25 np0005604725 puppet-user[56955]: Warning: validate_legacy(validate_re) expects an Integer value, got String at ["/etc/puppet/modules/swift/manifests/ringbuilder/rebalance.pp", 23]: Feb 2 08:02:25 np0005604725 puppet-user[56955]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Feb 2 08:02:25 np0005604725 puppet-user[56955]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.31 seconds Feb 2 08:02:25 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Swift/File[/var/lib/swift]/group: group changed 'root' to 'swift' Feb 2 08:02:25 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Swift/File[/var/run/swift]/group: group changed 'root' to 'swift' Feb 2 08:02:25 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Swift/File[/etc/swift/swift.conf]/owner: owner changed 'root' to 'swift' Feb 2 08:02:25 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_suffix]/value: value changed %SWIFT_HASH_PATH_SUFFIX% to iJJqA5R4b8gKRkRmYNYXLSWbs Feb 2 08:02:25 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_prefix]/ensure: created Feb 2 08:02:25 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Swift/Swift_config[swift-constraints/max_header_size]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Warning: Scope(Apache::Vhost[swift-proxy-api-proxy]): Feb 2 08:02:26 np0005604725 puppet-user[56744]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Feb 2 08:02:26 np0005604725 puppet-user[56744]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Feb 2 08:02:26 np0005604725 puppet-user[56744]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Feb 2 08:02:26 np0005604725 puppet-user[56744]: file names. Feb 2 08:02:26 np0005604725 puppet-user[56744]: Feb 2 08:02:26 np0005604725 puppet-user[56744]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Feb 2 08:02:26 np0005604725 puppet-user[56744]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Feb 2 08:02:26 np0005604725 puppet-user[56744]: sanitized $servername parameter when not explicitly defined. Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 1.23 seconds Feb 2 08:02:26 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[object]/Exec[create_object]/returns: executed successfully Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Feb 2 08:02:26 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[account]/Exec[create_account]/returns: executed successfully Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}a29aeff20ddf3424d30a25615dcdfa6e336850b5b7f5bd2b3e0b5899a55e0ad0' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}224e1913534a5aab220e4f36b9f9b1513fe7e3b433c6daefef7dba0ff5103b42' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Rsync::Server/Concat[/etc/rsyncd.conf]/File[/etc/rsyncd.conf]/content: content changed '{sha256}189b30972178b755e8e70eab81b1d261c4def61b342300f11760e6f2e706ff64' to '{sha256}411032608183f9e5b8b39ca066ad3afad91296d0f5b0212a6a000b83dbb9871f' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Rsync::Server/Service[rsyncd]/ensure: ensure changed 0 to 'running' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:cache/memcache_servers]/value: value changed 127.0.0.1:11211 to np0005604723.internalapi.ooo.test:11212,np0005604725.internalapi.ooo.test:11212,np0005604726.internalapi.ooo.test:11212 Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:cache/tls_enabled]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:proxy-logging/use]/value: value changed egg:swift#poxy_logging to egg:swift#proxy_logging Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[pipeline:main/pipeline]/value: value changed catch_errors proxy-logging cache proxy-server to catch_errors cache proxy-server Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/auto_create_account_prefix]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/concurrency]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/expiring_objects_account_name]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/interval]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/process]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/processes]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/reclaim_age]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/recon_cache_path]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/report_interval]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/log_facility]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/log_level]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift/File[/var/lib/swift]/group: group changed 'root' to 'swift' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift/File[/var/run/swift]/group: group changed 'root' to 'swift' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift/File[/etc/swift/swift.conf]/owner: owner changed 'root' to 'swift' Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_suffix]/value: value changed %SWIFT_HASH_PATH_SUFFIX% to iJJqA5R4b8gKRkRmYNYXLSWbs Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_prefix]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift/Swift_config[swift-constraints/max_header_size]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/bind_ip]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/workers]/value: value changed 8 to 1 Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_name]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_facility]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_level]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_headers]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_address]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[pipeline:main/pipeline]/value: value changed catch_errors gatekeeper healthcheck proxy-logging cache container_sync bulk tempurl ratelimit copy container-quotas account-quotas slo dlo versioned_writes proxy-logging proxy-server to catch_errors gatekeeper healthcheck proxy-logging cache listing_formats ratelimit bulk tempurl formpost authtoken s3api s3token keystone staticweb copy container_quotas account_quotas slo dlo versioned_writes proxy-logging proxy-server Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_name]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_facility]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_level]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_address]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/log_handoffs]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/object_chunk_size]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/client_chunk_size]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/allow_account_management]/value: value changed true to True Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/account_autocreate]/value: value changed true to True Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/max_containers_per_account]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/node_timeout]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/recoverable_node_timeout]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_name]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_facility]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_level]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_headers]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_address]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/memcache_servers]/value: value changed 127.0.0.1:11211 to np0005604723.internalapi.ooo.test:11212,np0005604725.internalapi.ooo.test:11212,np0005604726.internalapi.ooo.test:11212 Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/tls_enabled]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/memcache_max_connections]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Listing_formats/Swift_proxy_config[filter:listing_formats/use]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/clock_accuracy]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/max_sleep_time_seconds]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/log_sleep_time_seconds]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/rate_buffer_seconds]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/account_ratelimit]/ensure: created Feb 2 08:02:26 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_containers_per_extraction]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_failed_extractions]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_deletes_per_request]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[container]/Exec[create_container]/returns: executed successfully Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/yield_frequency]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Formpost/Swift_proxy_config[filter:formpost/use]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/log_name]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/www_authenticate_uri]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/auth_url]/value: value changed http://127.0.0.1:5000 to https://overcloud.internalapi.ooo.test:5000 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/auth_type]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/project_domain_id]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/user_domain_id]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/project_name]/value: value changed %SERVICE_TENANT_NAME% to service Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/username]/value: value changed %SERVICE_USER% to swift Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/password]/value: value changed [old secret redacted] to [new secret redacted] Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/region_name]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/delay_auth_decision]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/cache]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/include_service_catalog]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/interface]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::S3api/Swift_proxy_config[filter:s3api/use]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::S3api/Swift_proxy_config[filter:s3api/auth_pipeline_check]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/use]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_uri]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/reseller_prefix]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/delay_auth_decision]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/secret_cache_duration]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_url]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_type]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/username]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/password]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/project_name]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/project_domain_id]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/user_domain_id]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/operator_roles]/value: value changed admin, SwiftOperator to admin, swiftoperator, ResellerAdmin Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/reseller_prefix]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/system_reader_roles]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Staticweb/Swift_proxy_config[filter:staticweb/use]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Staticweb/Swift_proxy_config[filter:staticweb/url_base]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Copy/Swift_proxy_config[filter:copy/object_post_as_copy]/value: value changed false to True Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Container_quotas/Swift_proxy_config[filter:container_quotas/use]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Account_quotas/Swift_proxy_config[filter:account_quotas/use]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_manifest_segments]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_manifest_size]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/min_segment_size]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/rate_limit_after_segment]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/rate_limit_segments_per_sec]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_get_time]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/rate_limit_after_segment]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/rate_limit_segments_per_sec]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/max_get_time]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Versioned_writes/Swift_proxy_config[filter:versioned_writes/allow_versioned_writes]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Kms_keymaster/Swift_proxy_config[filter:kms_keymaster/use]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Kms_keymaster/Swift_proxy_config[filter:kms_keymaster/keymaster_config_path]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Encryption/Swift_proxy_config[filter:encryption/use]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Proxy::Encryption/Swift_proxy_config[filter:encryption/disable_encryption]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/api_class]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/username]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/project_name]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/project_domain_id]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/user_domain_id]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/meta_version_to_write]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Storage/File[/srv/node]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Storage/File[/srv/node/d1]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Storage::Account/Swift::Storage::Generic[account]/File[/etc/swift/account-server/]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Storage::Container/Swift::Storage::Generic[container]/File[/etc/swift/container-server/]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Storage::Object/Swift::Storage::Generic[object]/File[/etc/swift/object-server/]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6002]/Concat[/etc/swift/account-server.conf]/File[/etc/swift/account-server.conf]/ensure: defined content as '{sha256}5138ebbc3d5189b87d4200cfcfc6cfff3f5b5bb68beb210c3259530fc9ce3468' Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6001]/Concat[/etc/swift/container-server.conf]/File[/etc/swift/container-server.conf]/ensure: defined content as '{sha256}d818bcada1a4bbf1549cc7b6baa318183401d27e22ae87bf20c105bdbba3854c' Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6000]/Concat[/etc/swift/object-server.conf]/File[/etc/swift/object-server.conf]/ensure: defined content as '{sha256}ec9884acb7b26bc4784ffc31c7679f496187d7890bb4db4431cbf25a49ba470f' Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Proxy/Tripleo::Tls_proxy[swift-proxy-api]/Apache::Vhost[swift-proxy-api-proxy]/Concat[25-swift-proxy-api-proxy.conf]/File[/etc/httpd/conf.d/25-swift-proxy-api-proxy.conf]/ensure: defined content as '{sha256}b687cca0b8d0cf7e5a2c41117d4877635c59f0b9982814267a6c6cae03ab3dbd' Feb 2 08:02:27 np0005604725 puppet-user[56744]: Notice: Applied catalog in 0.73 seconds Feb 2 08:02:27 np0005604725 puppet-user[56744]: Application: Feb 2 08:02:27 np0005604725 puppet-user[56744]: Initial environment: production Feb 2 08:02:27 np0005604725 puppet-user[56744]: Converged environment: production Feb 2 08:02:27 np0005604725 puppet-user[56744]: Run mode: user Feb 2 08:02:27 np0005604725 puppet-user[56744]: Changes: Feb 2 08:02:27 np0005604725 puppet-user[56744]: Total: 163 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Events: Feb 2 08:02:27 np0005604725 puppet-user[56744]: Success: 163 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Total: 163 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Resources: Feb 2 08:02:27 np0005604725 puppet-user[56744]: Changed: 163 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Out of sync: 163 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Skipped: 46 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Total: 330 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Time: Feb 2 08:02:27 np0005604725 puppet-user[56744]: Concat file: 0.00 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Service: 0.00 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Swift config: 0.00 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Concat fragment: 0.00 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Swift keymaster config: 0.01 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Swift object expirer config: 0.02 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Package: 0.03 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Swift proxy config: 0.17 Feb 2 08:02:27 np0005604725 puppet-user[56744]: File: 0.19 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Transaction evaluation: 0.72 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Catalog application: 0.73 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Config retrieval: 1.50 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Last run: 1770019347 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Resources: 0.00 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Total: 0.73 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Version: Feb 2 08:02:27 np0005604725 puppet-user[56744]: Config: 1770019345 Feb 2 08:02:27 np0005604725 puppet-user[56744]: Puppet: 7.10.0 Feb 2 08:02:27 np0005604725 puppet-user[56955]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Feb 2 08:02:27 np0005604725 puppet-user[56955]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Feb 2 08:02:27 np0005604725 puppet-user[56955]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Feb 2 08:02:27 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_object_device[172.20.0.103:6000/d1]/ensure: created Feb 2 08:02:27 np0005604725 puppet-user[56955]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Feb 2 08:02:27 np0005604725 puppet-user[56955]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Feb 2 08:02:27 np0005604725 puppet-user[56955]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Feb 2 08:02:27 np0005604725 systemd[1]: libpod-313d4d276a753a1465ea72d44191f50907ea76d6826d49fce5fe3c293739fefb.scope: Deactivated successfully. Feb 2 08:02:27 np0005604725 systemd[1]: libpod-313d4d276a753a1465ea72d44191f50907ea76d6826d49fce5fe3c293739fefb.scope: Consumed 4.548s CPU time. Feb 2 08:02:27 np0005604725 podman[56580]: 2026-02-02 08:02:27.911943834 +0000 UTC m=+5.045998627 container died 313d4d276a753a1465ea72d44191f50907ea76d6826d49fce5fe3c293739fefb (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, url=https://www.redhat.com, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, distribution-scope=public, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1766032510, name=rhosp-rhel9/openstack-swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, com.redhat.component=openstack-swift-proxy-server-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_puppet_step1, version=17.1.13, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:50:51Z, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:50:51Z, container_name=container-puppet-swift, description=Red Hat OpenStack Platform 17.1 swift-proxy-server) Feb 2 08:02:27 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-313d4d276a753a1465ea72d44191f50907ea76d6826d49fce5fe3c293739fefb-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:27 np0005604725 systemd[1]: var-lib-containers-storage-overlay-8b310cb52cb87a43a862a1687259a9c1c2e9ca90ed27dd09cdfe9f07989fb92e-merged.mount: Deactivated successfully. Feb 2 08:02:28 np0005604725 podman[57254]: 2026-02-02 08:02:28.002738055 +0000 UTC m=+0.080446862 container cleanup 313d4d276a753a1465ea72d44191f50907ea76d6826d49fce5fe3c293739fefb (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-swift-proxy-server, release=1766032510, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, tcib_managed=true, distribution-scope=public, container_name=container-puppet-swift, build-date=2026-01-12T22:50:51Z, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, version=17.1.13, com.redhat.component=openstack-swift-proxy-server-container, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:51Z, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, architecture=x86_64) Feb 2 08:02:28 np0005604725 systemd[1]: libpod-conmon-313d4d276a753a1465ea72d44191f50907ea76d6826d49fce5fe3c293739fefb.scope: Deactivated successfully. Feb 2 08:02:28 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-swift --conmon-pidfile /run/container-puppet-swift.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server --env NAME=swift --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::swift::proxy#012#012class xinetd() {}#012define xinetd::service($bind='',$port='',$server='',$server_args='') {}#012noop_resource('service')#012include tripleo::profile::base::swift::storage --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-swift --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-swift.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Feb 2 08:02:28 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_container_device[172.20.0.103:6001/d1]/ensure: created Feb 2 08:02:28 np0005604725 puppet-user[56955]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Feb 2 08:02:28 np0005604725 puppet-user[56955]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Feb 2 08:02:28 np0005604725 puppet-user[56955]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Feb 2 08:02:28 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_account_device[172.20.0.103:6002/d1]/ensure: created Feb 2 08:02:29 np0005604725 puppet-user[56955]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Feb 2 08:02:29 np0005604725 puppet-user[56955]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Feb 2 08:02:29 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_object_device[172.20.0.104:6000/d1]/ensure: created Feb 2 08:02:29 np0005604725 puppet-user[56955]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Feb 2 08:02:29 np0005604725 puppet-user[56955]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Feb 2 08:02:30 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_container_device[172.20.0.104:6001/d1]/ensure: created Feb 2 08:02:30 np0005604725 puppet-user[56955]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Feb 2 08:02:30 np0005604725 puppet-user[56955]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Feb 2 08:02:30 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_account_device[172.20.0.104:6002/d1]/ensure: created Feb 2 08:02:31 np0005604725 puppet-user[56955]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Feb 2 08:02:31 np0005604725 puppet-user[56955]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Feb 2 08:02:31 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_object_device[172.20.0.105:6000/d1]/ensure: created Feb 2 08:02:31 np0005604725 puppet-user[56955]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Feb 2 08:02:31 np0005604725 puppet-user[56955]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Feb 2 08:02:31 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_container_device[172.20.0.105:6001/d1]/ensure: created Feb 2 08:02:32 np0005604725 puppet-user[56955]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Feb 2 08:02:32 np0005604725 puppet-user[56955]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Feb 2 08:02:32 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_account_device[172.20.0.105:6002/d1]/ensure: created Feb 2 08:02:32 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[object]/Exec[rebalance_object]: Triggered 'refresh' from 3 events Feb 2 08:02:33 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[account]/Exec[rebalance_account]: Triggered 'refresh' from 3 events Feb 2 08:02:33 np0005604725 puppet-user[56955]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[container]/Exec[rebalance_container]: Triggered 'refresh' from 3 events Feb 2 08:02:33 np0005604725 puppet-user[56955]: Notice: Applied catalog in 7.76 seconds Feb 2 08:02:33 np0005604725 puppet-user[56955]: Application: Feb 2 08:02:33 np0005604725 puppet-user[56955]: Initial environment: production Feb 2 08:02:33 np0005604725 puppet-user[56955]: Converged environment: production Feb 2 08:02:33 np0005604725 puppet-user[56955]: Run mode: user Feb 2 08:02:33 np0005604725 puppet-user[56955]: Changes: Feb 2 08:02:33 np0005604725 puppet-user[56955]: Total: 21 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Events: Feb 2 08:02:33 np0005604725 puppet-user[56955]: Success: 21 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Total: 21 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Resources: Feb 2 08:02:33 np0005604725 puppet-user[56955]: Skipped: 16 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Changed: 21 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Out of sync: 21 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Restarted: 3 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Total: 38 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Time: Feb 2 08:02:33 np0005604725 puppet-user[56955]: File: 0.00 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Swift config: 0.01 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Config retrieval: 0.37 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Exec: 1.00 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Ring object device: 1.80 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Ring account device: 1.87 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Ring container device: 1.91 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Last run: 1770019353 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Transaction evaluation: 7.75 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Catalog application: 7.76 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Total: 7.76 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Version: Feb 2 08:02:33 np0005604725 puppet-user[56955]: Config: 1770019345 Feb 2 08:02:33 np0005604725 puppet-user[56955]: Puppet: 7.10.0 Feb 2 08:02:34 np0005604725 systemd[1]: libpod-d4c6d9964f2ba60f8611f64b174950e588bbf1d53a6c7c18dd58960730ecec58.scope: Deactivated successfully. Feb 2 08:02:34 np0005604725 systemd[1]: libpod-d4c6d9964f2ba60f8611f64b174950e588bbf1d53a6c7c18dd58960730ecec58.scope: Consumed 10.251s CPU time. Feb 2 08:02:34 np0005604725 podman[56875]: 2026-02-02 08:02:34.100214681 +0000 UTC m=+10.644737101 container died d4c6d9964f2ba60f8611f64b174950e588bbf1d53a6c7c18dd58960730ecec58 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, vcs-type=git, batch=17.1_20260112.1, config_id=tripleo_puppet_step1, container_name=container-puppet-swift_ringbuilder, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, distribution-scope=public, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.13, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-swift-proxy-server, io.openshift.expose-services=, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:50:51Z, com.redhat.component=openstack-swift-proxy-server-container, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:50:51Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server) Feb 2 08:02:34 np0005604725 systemd[1]: tmp-crun.jfJ5ZW.mount: Deactivated successfully. Feb 2 08:02:34 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-d4c6d9964f2ba60f8611f64b174950e588bbf1d53a6c7c18dd58960730ecec58-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:34 np0005604725 systemd[1]: var-lib-containers-storage-overlay-50b696acfc5753ba4c4a1edb1332667cae98f2d35bf7e3e7925ce66aa4c58957-merged.mount: Deactivated successfully. Feb 2 08:02:34 np0005604725 podman[57359]: 2026-02-02 08:02:34.182304318 +0000 UTC m=+0.073051443 container cleanup d4c6d9964f2ba60f8611f64b174950e588bbf1d53a6c7c18dd58960730ecec58 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-swift_ringbuilder, tcib_managed=true, batch=17.1_20260112.1, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:51Z, release=1766032510, io.buildah.version=1.41.5, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp-rhel9/openstack-swift-proxy-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, vcs-type=git, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:51Z, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server) Feb 2 08:02:34 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:02:34 np0005604725 systemd[1]: libpod-conmon-d4c6d9964f2ba60f8611f64b174950e588bbf1d53a6c7c18dd58960730ecec58.scope: Deactivated successfully. Feb 2 08:02:34 np0005604725 python3[51535]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-swift_ringbuilder --conmon-pidfile /run/container-puppet-swift_ringbuilder.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005604725 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball --env NAME=swift_ringbuilder --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::swift::ringbuilder#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-swift_ringbuilder --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005604725', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-swift_ringbuilder.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Feb 2 08:02:35 np0005604725 python3[57411]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:02:36 np0005604725 python3[57443]: ansible-stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:02:36 np0005604725 python3[57493]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-container-shutdown follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:02:37 np0005604725 python3[57536]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019356.3351183-119204-107585984907689/source dest=/usr/libexec/tripleo-container-shutdown mode=0700 owner=root group=root _original_basename=tripleo-container-shutdown follow=False checksum=7d67b1986212f5548057505748cd74cfcf9c0d35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:02:37 np0005604725 python3[57598]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-start-podman-container follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:02:37 np0005604725 python3[57641]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019357.2703564-119204-44659159030974/source dest=/usr/libexec/tripleo-start-podman-container mode=0700 owner=root group=root _original_basename=tripleo-start-podman-container follow=False checksum=536965633b8d3b1ce794269ffb07be0105a560a0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:02:38 np0005604725 python3[57703]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/tripleo-container-shutdown.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:02:38 np0005604725 python3[57746]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019358.244347-119296-167073431041199/source dest=/usr/lib/systemd/system/tripleo-container-shutdown.service mode=0644 owner=root group=root _original_basename=tripleo-container-shutdown-service follow=False checksum=66c1d41406ba8714feb9ed0a35259a7a57ef9707 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:02:39 np0005604725 python3[57808]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:02:39 np0005604725 python3[57851]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019359.2011964-119509-157948560312575/source dest=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset mode=0644 owner=root group=root _original_basename=91-tripleo-container-shutdown-preset follow=False checksum=bccb1207dcbcfaa5ca05f83c8f36ce4c2460f081 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:02:40 np0005604725 python3[57881]: ansible-systemd Invoked with name=tripleo-container-shutdown state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:02:40 np0005604725 systemd[1]: Reloading. Feb 2 08:02:40 np0005604725 systemd-sysv-generator[57909]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:02:40 np0005604725 systemd-rc-local-generator[57905]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:02:40 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:02:40 np0005604725 systemd[1]: Reloading. Feb 2 08:02:40 np0005604725 systemd-sysv-generator[57949]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:02:40 np0005604725 systemd-rc-local-generator[57944]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:02:40 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:02:40 np0005604725 systemd[1]: Starting TripleO Container Shutdown... Feb 2 08:02:41 np0005604725 systemd[1]: Finished TripleO Container Shutdown. Feb 2 08:02:41 np0005604725 python3[58005]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/netns-placeholder.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:02:41 np0005604725 python3[58048]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019361.1939323-119645-84561180998021/source dest=/usr/lib/systemd/system/netns-placeholder.service mode=0644 owner=root group=root _original_basename=netns-placeholder-service follow=False checksum=8e9c6d5ce3a6e7f71c18780ec899f32f23de4c71 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:02:42 np0005604725 python3[58110]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-netns-placeholder.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:02:42 np0005604725 python3[58153]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019362.174664-119693-223511202264128/source dest=/usr/lib/systemd/system-preset/91-netns-placeholder.preset mode=0644 owner=root group=root _original_basename=91-netns-placeholder-preset follow=False checksum=28b7b9aa893525d134a1eeda8a0a48fb25b736b9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:02:43 np0005604725 python3[58183]: ansible-systemd Invoked with name=netns-placeholder state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:02:43 np0005604725 systemd[1]: Reloading. Feb 2 08:02:43 np0005604725 systemd-rc-local-generator[58208]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:02:43 np0005604725 systemd-sysv-generator[58211]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:02:43 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:02:43 np0005604725 systemd[1]: Reloading. Feb 2 08:02:43 np0005604725 systemd-sysv-generator[58251]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:02:43 np0005604725 systemd-rc-local-generator[58245]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:02:43 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:02:43 np0005604725 systemd[1]: Starting Create netns directory... Feb 2 08:02:43 np0005604725 systemd[1]: run-netns-placeholder.mount: Deactivated successfully. Feb 2 08:02:43 np0005604725 systemd[1]: netns-placeholder.service: Deactivated successfully. Feb 2 08:02:43 np0005604725 systemd[1]: Finished Create netns directory. Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for memcached, new hash: 244a3d4ccef8b7e455e8c0a562499110 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for metrics_qdr, new hash: ac03474490c6584f4d92c7446902c1e8 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for mysql_bootstrap, new hash: d1309b2578c29eaa98f7da1cd8d204bd Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for rabbitmq_bootstrap, new hash: 11853ded09cf37385695153625c2b80e Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for redis_tls_proxy, new hash: 8ac4210307763861f9d48a3f4df13575 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for clustercheck, new hash: 194706b4cbbff1d0d528056ff0c9c800 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for horizon_fix_perms, new hash: a8e5b44090fb824658d0cdcc54fbcb7d Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for mysql_wait_bundle, new hash: d1309b2578c29eaa98f7da1cd8d204bd Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api_db_sync, new hash: bb6b8a5d9470c5e09d1e4beb6638faa7 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for collectd, new hash: 0a0af6a6a39e15fddd775e0090d092bc Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_db_sync, new hash: 06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for heat_engine_db_sync, new hash: 3b9828291d650a0cb3f28eaed8d5f04d Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for horizon, new hash: a8e5b44090fb824658d0cdcc54fbcb7d Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for iscsid, new hash: 9bab49ca47f1b48252b0430bf6d56c46 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for keystone, new hash: dff5bf4ccd6d0a40575dff90620f5e0d Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for keystone_cron, new hash: dff5bf4ccd6d0a40575dff90620f5e0d Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for keystone_db_sync, new hash: dff5bf4ccd6d0a40575dff90620f5e0d Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for manila_api_db_sync, new hash: d8e2b9fe37394fa4702f0b4840e2be72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for neutron_db_sync, new hash: ed61d1adcabe12fe3dffa08621622e77 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_db_sync, new hash: 0f33bf354435ad6e844c942ca95c792b Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_ensure_default_cells, new hash: 0f33bf354435ad6e844c942ca95c792b Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for nova_db_sync, new hash: 0f33bf354435ad6e844c942ca95c792b Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for placement_api_db_sync, new hash: ae2de9ab0db0f109a0e66975aa28d256 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for rsyslog, new hash: ae28058d2cacd52586f33ad08231e41f Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_copy_rings, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72-0384afc25edd213d382c71d6593bd444 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for ceilometer_agent_central, new hash: 8edb2eeeece67be8549d65057558ff12 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for ceilometer_agent_notification, new hash: 8edb2eeeece67be8549d65057558ff12 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api, new hash: bb6b8a5d9470c5e09d1e4beb6638faa7 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api_cron, new hash: bb6b8a5d9470c5e09d1e4beb6638faa7 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for cinder_scheduler, new hash: bb6b8a5d9470c5e09d1e4beb6638faa7 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for glance_api, new hash: 06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_cron, new hash: 06def20cab1144dca51887b587adc9f4 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_internal, new hash: 84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_internal_tls_proxy, new hash: 84c08a8ebc73eda47bfbdbf4963c031d Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_tls_proxy, new hash: 06def20cab1144dca51887b587adc9f4 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for heat_api, new hash: 9fe8b459c1d20e59bcd177e00032de6d Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for heat_api_cfn, new hash: c34de4047376a18922c4fddbe99616f0 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for heat_api_cron, new hash: 9fe8b459c1d20e59bcd177e00032de6d Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for heat_engine, new hash: 3b9828291d650a0cb3f28eaed8d5f04d Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for logrotate_crond, new hash: 53ed83bb0cae779ff95edb2002262c6f Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for manila_api, new hash: d8e2b9fe37394fa4702f0b4840e2be72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for manila_api_cron, new hash: d8e2b9fe37394fa4702f0b4840e2be72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for manila_scheduler, new hash: d8e2b9fe37394fa4702f0b4840e2be72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for neutron_api, new hash: ed61d1adcabe12fe3dffa08621622e77 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for neutron_server_tls_proxy, new hash: ed61d1adcabe12fe3dffa08621622e77 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for nova_api, new hash: 0f33bf354435ad6e844c942ca95c792b Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_cron, new hash: 0f33bf354435ad6e844c942ca95c792b Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for nova_conductor, new hash: 0f33bf354435ad6e844c942ca95c792b Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for nova_metadata, new hash: 85ffc2ed75932f3a27d6e0188d1bb69e Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for nova_scheduler, new hash: 0f33bf354435ad6e844c942ca95c792b Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for nova_vnc_proxy, new hash: 0f33bf354435ad6e844c942ca95c792b Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for nova_wait_for_api_service, new hash: 0f33bf354435ad6e844c942ca95c792b Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for placement_api, new hash: ae2de9ab0db0f109a0e66975aa28d256 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for placement_wait_for_service, new hash: ae2de9ab0db0f109a0e66975aa28d256 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_auditor, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_reaper, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_replicator, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_server, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_auditor, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_replicator, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_server, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_updater, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_auditor, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_expirer, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_replicator, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_server, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_updater, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_proxy, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_proxy_tls_proxy, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:44 np0005604725 python3[58276]: ansible-container_puppet_config [WARNING] Config change detected for swift_rsync, new hash: 2b3e11d6dd07c45ddbe26d38ce1c0c72 Feb 2 08:02:45 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:02:45 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:02:46 np0005604725 python3[58335]: ansible-tripleo_container_manage Invoked with config_id=tripleo_step1 config_dir=/var/lib/tripleo-config/container-startup-config/step_1 config_patterns=*.json config_overrides={} concurrency=5 log_base_path=/var/log/containers/stdouts debug=False Feb 2 08:02:46 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:02:46 np0005604725 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Feb 2 08:02:46 np0005604725 podman[58467]: 2026-02-02 08:02:46.764723288 +0000 UTC m=+0.062728033 container create e00d415597dc98428163e6c6aae0440692e08bec9a4e4d5021c807947651e20c (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, vcs-type=git, version=17.1.13, description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step1, name=rhosp-rhel9/openstack-qdrouterd, container_name=metrics_qdr_init_logs, summary=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, release=1766032510, build-date=2026-01-12T22:10:14Z, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:14Z, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, io.buildah.version=1.41.5, com.redhat.component=openstack-qdrouterd-container, distribution-scope=public) Feb 2 08:02:46 np0005604725 systemd[1]: Started libpod-conmon-e00d415597dc98428163e6c6aae0440692e08bec9a4e4d5021c807947651e20c.scope. Feb 2 08:02:46 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:46 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a428b7e5d1648b1fef6ebf25d124b6d28e15034dbf20c6174aa597473dd377d6/merged/var/log/qdrouterd supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:46 np0005604725 podman[58467]: 2026-02-02 08:02:46.820984407 +0000 UTC m=+0.118989152 container init e00d415597dc98428163e6c6aae0440692e08bec9a4e4d5021c807947651e20c (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, release=1766032510, build-date=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, tcib_managed=true, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp-rhel9/openstack-qdrouterd, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, batch=17.1_20260112.1, com.redhat.component=openstack-qdrouterd-container, version=17.1.13, description=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, vendor=Red Hat, Inc., container_name=metrics_qdr_init_logs, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:02:46 np0005604725 podman[58467]: 2026-02-02 08:02:46.828284684 +0000 UTC m=+0.126289439 container start e00d415597dc98428163e6c6aae0440692e08bec9a4e4d5021c807947651e20c (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, build-date=2026-01-12T22:10:14Z, version=17.1.13, batch=17.1_20260112.1, com.redhat.component=openstack-qdrouterd-container, managed_by=tripleo_ansible, architecture=x86_64, container_name=metrics_qdr_init_logs, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_step1, vcs-type=git, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp-rhel9/openstack-qdrouterd) Feb 2 08:02:46 np0005604725 podman[58467]: 2026-02-02 08:02:46.828542481 +0000 UTC m=+0.126547216 container attach e00d415597dc98428163e6c6aae0440692e08bec9a4e4d5021c807947651e20c (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, container_name=metrics_qdr_init_logs, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2026-01-12T22:10:14Z, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, batch=17.1_20260112.1, tcib_managed=true, distribution-scope=public, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, vendor=Red Hat, Inc., config_id=tripleo_step1, io.buildah.version=1.41.5, release=1766032510, summary=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp-rhel9/openstack-qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:02:46 np0005604725 podman[58467]: 2026-02-02 08:02:46.731919673 +0000 UTC m=+0.029924428 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Feb 2 08:02:46 np0005604725 systemd[1]: libpod-e00d415597dc98428163e6c6aae0440692e08bec9a4e4d5021c807947651e20c.scope: Deactivated successfully. Feb 2 08:02:46 np0005604725 podman[58467]: 2026-02-02 08:02:46.838731206 +0000 UTC m=+0.136735961 container died e00d415597dc98428163e6c6aae0440692e08bec9a4e4d5021c807947651e20c (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, container_name=metrics_qdr_init_logs, architecture=x86_64, name=rhosp-rhel9/openstack-qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, config_id=tripleo_step1, url=https://www.redhat.com, tcib_managed=true, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, distribution-scope=public, release=1766032510, description=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git) Feb 2 08:02:46 np0005604725 podman[58534]: 2026-02-02 08:02:46.845076167 +0000 UTC m=+0.080643007 container create eb2d50c1330ed2c3882126cec357fd6f8fcff21c4c1ec4e993130a05c7d98c49 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, summary=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, architecture=x86_64, build-date=2026-01-12T22:10:14Z, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://www.redhat.com, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, name=rhosp-rhel9/openstack-rabbitmq, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:14Z, version=17.1.13, batch=17.1_20260112.1, release=1766032510, tcib_managed=true, maintainer=OpenStack TripleO Team, vcs-type=git, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '11853ded09cf37385695153625c2b80e'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, distribution-scope=public, container_name=rabbitmq_bootstrap, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:02:46 np0005604725 systemd[1]: Started libpod-conmon-eb2d50c1330ed2c3882126cec357fd6f8fcff21c4c1ec4e993130a05c7d98c49.scope. Feb 2 08:02:46 np0005604725 podman[58521]: 2026-02-02 08:02:46.868122559 +0000 UTC m=+0.122548709 container create 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, io.openshift.expose-services=, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, batch=17.1_20260112.1, build-date=2026-01-12T22:12:26Z, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, vendor=Red Hat, Inc., distribution-scope=public, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:12:26Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, vcs-type=git, container_name=memcached, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 memcached, name=rhosp-rhel9/openstack-memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, io.buildah.version=1.41.5, config_id=tripleo_step1) Feb 2 08:02:46 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:46 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ff115b832ce2c42f60d1760072ada5b4cdf156e57970bd3b6f901c2de87b36aa/merged/var/lib/rabbitmq supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:46 np0005604725 podman[58521]: 2026-02-02 08:02:46.783055544 +0000 UTC m=+0.037481704 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Feb 2 08:02:46 np0005604725 podman[58534]: 2026-02-02 08:02:46.884148482 +0000 UTC m=+0.119715322 container init eb2d50c1330ed2c3882126cec357fd6f8fcff21c4c1ec4e993130a05c7d98c49 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, vcs-type=git, tcib_managed=true, version=17.1.13, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, distribution-scope=public, container_name=rabbitmq_bootstrap, build-date=2026-01-12T22:10:14Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-rabbitmq, org.opencontainers.image.created=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, config_id=tripleo_step1, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '11853ded09cf37385695153625c2b80e'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:02:46 np0005604725 systemd[1]: Started libpod-conmon-2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.scope. Feb 2 08:02:46 np0005604725 podman[58534]: 2026-02-02 08:02:46.889668201 +0000 UTC m=+0.125235041 container start eb2d50c1330ed2c3882126cec357fd6f8fcff21c4c1ec4e993130a05c7d98c49 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, build-date=2026-01-12T22:10:14Z, vcs-type=git, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, container_name=rabbitmq_bootstrap, maintainer=OpenStack TripleO Team, config_id=tripleo_step1, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '11853ded09cf37385695153625c2b80e'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, summary=Red Hat OpenStack Platform 17.1 rabbitmq, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:14Z, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, io.buildah.version=1.41.5, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, release=1766032510, architecture=x86_64, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-rabbitmq) Feb 2 08:02:46 np0005604725 podman[58534]: 2026-02-02 08:02:46.793590757 +0000 UTC m=+0.029157617 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Feb 2 08:02:46 np0005604725 python3[58335]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name rabbitmq_bootstrap --conmon-pidfile /run/rabbitmq_bootstrap.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --env TRIPLEO_CONFIG_HASH=11853ded09cf37385695153625c2b80e --label config_id=tripleo_step1 --label container_name=rabbitmq_bootstrap --label managed_by=tripleo_ansible --label config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '11853ded09cf37385695153625c2b80e'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/rabbitmq_bootstrap.log --network host --privileged=False --user root --volume /var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /var/lib/rabbitmq:/var/lib/rabbitmq:z --volume /etc/puppet:/etc/puppet:ro,z registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 bash -ec kolla_set_configs#012if [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi#012hiera 'rabbitmq::erlang_cookie' > /var/lib/rabbitmq/.erlang.cookie#012chown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie#012chmod 400 /var/lib/rabbitmq/.erlang.cookie Feb 2 08:02:46 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:46 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/fabcc70b34633ccf9291c45d563556c1d832d791501332ea4133591d3742af71/merged/var/log/memcached supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:46 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/fabcc70b34633ccf9291c45d563556c1d832d791501332ea4133591d3742af71/merged/var/lib/kolla/config_files/src supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:46 np0005604725 podman[58542]: 2026-02-02 08:02:46.902342673 +0000 UTC m=+0.127716168 container create 16b4bd44ec5e0d712609b7988a1db49fb9590a34cfd7aece67fd7442965161ae (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, build-date=2026-01-12T22:10:16Z, name=rhosp-rhel9/openstack-redis, vcs-type=git, architecture=x86_64, distribution-scope=public, release=1766032510, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 redis, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, container_name=redis_tls_proxy, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8ac4210307763861f9d48a3f4df13575'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-redis-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, vendor=Red Hat, Inc., batch=17.1_20260112.1, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, description=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, org.opencontainers.image.created=2026-01-12T22:10:16Z, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 redis) Feb 2 08:02:46 np0005604725 podman[58542]: 2026-02-02 08:02:46.811940043 +0000 UTC m=+0.037313558 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Feb 2 08:02:46 np0005604725 podman[58503]: 2026-02-02 08:02:46.818435798 +0000 UTC m=+0.086514186 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Feb 2 08:02:46 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:02:46 np0005604725 podman[58521]: 2026-02-02 08:02:46.920644487 +0000 UTC m=+0.175070657 container init 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, summary=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-memcached, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, com.redhat.component=openstack-memcached-container, architecture=x86_64, build-date=2026-01-12T22:12:26Z, io.buildah.version=1.41.5, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13) Feb 2 08:02:46 np0005604725 podman[58503]: 2026-02-02 08:02:46.920910934 +0000 UTC m=+0.188989312 container create 7a80e2347622a3a75e5cd4b219abf053c3e9c5b23d362a85bd7124e5445e3ad1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, distribution-scope=public, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-mariadb-container, release=1766032510, architecture=x86_64, build-date=2026-01-12T22:10:18Z, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=mysql_data_ownership, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., batch=17.1_20260112.1, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:18Z, managed_by=tripleo_ansible, config_id=tripleo_step1) Feb 2 08:02:46 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:02:46 np0005604725 podman[58521]: 2026-02-02 08:02:46.954741707 +0000 UTC m=+0.209167907 container start 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, com.redhat.component=openstack-memcached-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.openshift.expose-services=, vendor=Red Hat, Inc., config_id=tripleo_step1, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vcs-type=git, container_name=memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1, io.buildah.version=1.41.5, version=17.1.13, build-date=2026-01-12T22:12:26Z, summary=Red Hat OpenStack Platform 17.1 memcached, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible) Feb 2 08:02:46 np0005604725 python3[58335]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name memcached --conmon-pidfile /run/memcached.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=244a3d4ccef8b7e455e8c0a562499110 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step1 --label container_name=memcached --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/memcached.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z --volume /var/log/containers/memcached:/var/log/memcached:rw --volume /etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro --volume /etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Feb 2 08:02:46 np0005604725 systemd[1]: Started libpod-conmon-16b4bd44ec5e0d712609b7988a1db49fb9590a34cfd7aece67fd7442965161ae.scope. Feb 2 08:02:47 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:47 np0005604725 systemd[1]: Started libpod-conmon-7a80e2347622a3a75e5cd4b219abf053c3e9c5b23d362a85bd7124e5445e3ad1.scope. Feb 2 08:02:47 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:47 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/dcb35eccc226c5c034909bc5fd01b00d3632a8cbf6da87e90185feb7e68d89a4/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:47 np0005604725 podman[58542]: 2026-02-02 08:02:47.026200427 +0000 UTC m=+0.251573922 container init 16b4bd44ec5e0d712609b7988a1db49fb9590a34cfd7aece67fd7442965161ae (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, name=rhosp-rhel9/openstack-redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, description=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, url=https://www.redhat.com, vcs-type=git, release=1766032510, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:16Z, maintainer=OpenStack TripleO Team, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8ac4210307763861f9d48a3f4df13575'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, summary=Red Hat OpenStack Platform 17.1 redis, config_id=tripleo_step1, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., com.redhat.component=openstack-redis-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:16Z, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, container_name=redis_tls_proxy) Feb 2 08:02:47 np0005604725 podman[58619]: 2026-02-02 08:02:47.027297546 +0000 UTC m=+0.068499411 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=starting, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:12:26Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-memcached-container, summary=Red Hat OpenStack Platform 17.1 memcached, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., architecture=x86_64, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, name=rhosp-rhel9/openstack-memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, config_id=tripleo_step1, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, io.buildah.version=1.41.5, io.openshift.expose-services=, tcib_managed=true, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:12:26Z, container_name=memcached, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached) Feb 2 08:02:47 np0005604725 podman[58542]: 2026-02-02 08:02:47.031834469 +0000 UTC m=+0.257207964 container start 16b4bd44ec5e0d712609b7988a1db49fb9590a34cfd7aece67fd7442965161ae (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8ac4210307763861f9d48a3f4df13575'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, summary=Red Hat OpenStack Platform 17.1 redis, org.opencontainers.image.created=2026-01-12T22:10:16Z, tcib_managed=true, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-redis-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, container_name=redis_tls_proxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:16Z, maintainer=OpenStack TripleO Team, version=17.1.13, vcs-type=git, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 redis, managed_by=tripleo_ansible, vendor=Red Hat, Inc., batch=17.1_20260112.1, architecture=x86_64, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-redis, config_id=tripleo_step1, io.openshift.expose-services=) Feb 2 08:02:47 np0005604725 python3[58335]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name redis_tls_proxy --conmon-pidfile /run/redis_tls_proxy.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=8ac4210307763861f9d48a3f4df13575 --label config_id=tripleo_step1 --label container_name=redis_tls_proxy --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8ac4210307763861f9d48a3f4df13575'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/redis_tls_proxy.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro --volume /etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro --volume /var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Feb 2 08:02:47 np0005604725 podman[58619]: 2026-02-02 08:02:47.037579654 +0000 UTC m=+0.078781509 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, summary=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, config_id=tripleo_step1, io.openshift.expose-services=, vcs-type=git, architecture=x86_64, url=https://www.redhat.com, vendor=Red Hat, Inc., com.redhat.component=openstack-memcached-container, maintainer=OpenStack TripleO Team, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1, container_name=memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, description=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:12:26Z, io.buildah.version=1.41.5, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, name=rhosp-rhel9/openstack-memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z) Feb 2 08:02:47 np0005604725 systemd[1]: libpod-eb2d50c1330ed2c3882126cec357fd6f8fcff21c4c1ec4e993130a05c7d98c49.scope: Deactivated successfully. Feb 2 08:02:47 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:02:47 np0005604725 podman[58503]: 2026-02-02 08:02:47.081320224 +0000 UTC m=+0.349398582 container init 7a80e2347622a3a75e5cd4b219abf053c3e9c5b23d362a85bd7124e5445e3ad1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, vendor=Red Hat, Inc., io.buildah.version=1.41.5, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, batch=17.1_20260112.1, com.redhat.component=openstack-mariadb-container, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, vcs-type=git, container_name=mysql_data_ownership, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step1, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:18Z, build-date=2026-01-12T22:10:18Z, version=17.1.13, release=1766032510) Feb 2 08:02:47 np0005604725 podman[58573]: 2026-02-02 08:02:47.084603272 +0000 UTC m=+0.242207168 container cleanup e00d415597dc98428163e6c6aae0440692e08bec9a4e4d5021c807947651e20c (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, batch=17.1_20260112.1, distribution-scope=public, io.openshift.expose-services=, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=metrics_qdr_init_logs, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-qdrouterd-container, summary=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp-rhel9/openstack-qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, managed_by=tripleo_ansible, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:14Z, url=https://www.redhat.com, release=1766032510, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd) Feb 2 08:02:47 np0005604725 systemd[1]: libpod-conmon-e00d415597dc98428163e6c6aae0440692e08bec9a4e4d5021c807947651e20c.scope: Deactivated successfully. Feb 2 08:02:47 np0005604725 podman[58503]: 2026-02-02 08:02:47.08896116 +0000 UTC m=+0.357039538 container start 7a80e2347622a3a75e5cd4b219abf053c3e9c5b23d362a85bd7124e5445e3ad1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, url=https://www.redhat.com, config_id=tripleo_step1, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-mariadb, managed_by=tripleo_ansible, vcs-type=git, tcib_managed=true, com.redhat.component=openstack-mariadb-container, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, build-date=2026-01-12T22:10:18Z, release=1766032510, version=17.1.13, container_name=mysql_data_ownership) Feb 2 08:02:47 np0005604725 podman[58503]: 2026-02-02 08:02:47.089600867 +0000 UTC m=+0.357679255 container attach 7a80e2347622a3a75e5cd4b219abf053c3e9c5b23d362a85bd7124e5445e3ad1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, vcs-type=git, name=rhosp-rhel9/openstack-mariadb, build-date=2026-01-12T22:10:18Z, com.redhat.component=openstack-mariadb-container, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, tcib_managed=true, release=1766032510, summary=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, container_name=mysql_data_ownership, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, version=17.1.13, io.buildah.version=1.41.5) Feb 2 08:02:47 np0005604725 systemd[1]: libpod-7a80e2347622a3a75e5cd4b219abf053c3e9c5b23d362a85bd7124e5445e3ad1.scope: Deactivated successfully. Feb 2 08:02:47 np0005604725 podman[58686]: 2026-02-02 08:02:47.097800428 +0000 UTC m=+0.043137014 container died eb2d50c1330ed2c3882126cec357fd6f8fcff21c4c1ec4e993130a05c7d98c49 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '11853ded09cf37385695153625c2b80e'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-type=git, config_id=tripleo_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, container_name=rabbitmq_bootstrap, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:14Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, com.redhat.component=openstack-rabbitmq-container, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, io.openshift.expose-services=) Feb 2 08:02:47 np0005604725 python3[58335]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name metrics_qdr_init_logs --conmon-pidfile /run/metrics_qdr_init_logs.pid --detach=False --label config_id=tripleo_step1 --label container_name=metrics_qdr_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/metrics_qdr_init_logs.log --network none --privileged=False --user root --volume /var/log/containers/metrics_qdr:/var/log/qdrouterd:z registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 /bin/bash -c chown -R qdrouterd:qdrouterd /var/log/qdrouterd Feb 2 08:02:47 np0005604725 podman[58686]: 2026-02-02 08:02:47.122428603 +0000 UTC m=+0.067765169 container cleanup eb2d50c1330ed2c3882126cec357fd6f8fcff21c4c1ec4e993130a05c7d98c49 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2026-01-12T22:10:14Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, version=17.1.13, com.redhat.component=openstack-rabbitmq-container, release=1766032510, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, vendor=Red Hat, Inc., config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '11853ded09cf37385695153625c2b80e'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, distribution-scope=public, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:14Z, container_name=rabbitmq_bootstrap, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, name=rhosp-rhel9/openstack-rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1) Feb 2 08:02:47 np0005604725 systemd[1]: libpod-conmon-eb2d50c1330ed2c3882126cec357fd6f8fcff21c4c1ec4e993130a05c7d98c49.scope: Deactivated successfully. Feb 2 08:02:47 np0005604725 podman[58503]: 2026-02-02 08:02:47.243212353 +0000 UTC m=+0.511290731 container died 7a80e2347622a3a75e5cd4b219abf053c3e9c5b23d362a85bd7124e5445e3ad1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, architecture=x86_64, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, config_id=tripleo_step1, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, build-date=2026-01-12T22:10:18Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, name=rhosp-rhel9/openstack-mariadb, container_name=mysql_data_ownership, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1) Feb 2 08:02:47 np0005604725 podman[58705]: 2026-02-02 08:02:47.264614711 +0000 UTC m=+0.161179281 container cleanup 7a80e2347622a3a75e5cd4b219abf053c3e9c5b23d362a85bd7124e5445e3ad1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, container_name=mysql_data_ownership, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, tcib_managed=true, managed_by=tripleo_ansible, release=1766032510, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, io.openshift.expose-services=, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:18Z, name=rhosp-rhel9/openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-mariadb-container, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, architecture=x86_64, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team) Feb 2 08:02:47 np0005604725 systemd[1]: libpod-conmon-7a80e2347622a3a75e5cd4b219abf053c3e9c5b23d362a85bd7124e5445e3ad1.scope: Deactivated successfully. Feb 2 08:02:47 np0005604725 python3[58335]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name mysql_data_ownership --conmon-pidfile /run/mysql_data_ownership.pid --detach=False --label config_id=tripleo_step1 --label container_name=mysql_data_ownership --label managed_by=tripleo_ansible --label config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/mysql_data_ownership.log --network host --user root --volume /var/lib/mysql:/var/lib/mysql:z registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 chown -R mysql: /var/lib/mysql Feb 2 08:02:47 np0005604725 podman[58893]: 2026-02-02 08:02:47.680242269 +0000 UTC m=+0.109632730 container create b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, com.redhat.component=openstack-qdrouterd-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, build-date=2026-01-12T22:10:14Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, version=17.1.13, architecture=x86_64, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, container_name=metrics_qdr, tcib_managed=true, vendor=Red Hat, Inc., io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, url=https://www.redhat.com, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, summary=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:02:47 np0005604725 podman[58892]: 2026-02-02 08:02:47.695397108 +0000 UTC m=+0.128000285 container create dd413ca66b4deb0aba56f2b14fd3015a9d093e22cfe33c5108f16fd0ef170f0d (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, managed_by=tripleo_ansible, url=https://www.redhat.com, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=mysql_bootstrap, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, name=rhosp-rhel9/openstack-mariadb, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:18Z, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'egQUHP9AWZ8pgpaKI5POCQGwX', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd1309b2578c29eaa98f7da1cd8d204bd'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, config_id=tripleo_step1, com.redhat.component=openstack-mariadb-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, build-date=2026-01-12T22:10:18Z, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team) Feb 2 08:02:47 np0005604725 systemd[1]: Started libpod-conmon-b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.scope. Feb 2 08:02:47 np0005604725 podman[58893]: 2026-02-02 08:02:47.630378243 +0000 UTC m=+0.059768764 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Feb 2 08:02:47 np0005604725 systemd[1]: Started libpod-conmon-dd413ca66b4deb0aba56f2b14fd3015a9d093e22cfe33c5108f16fd0ef170f0d.scope. Feb 2 08:02:47 np0005604725 podman[58892]: 2026-02-02 08:02:47.63209036 +0000 UTC m=+0.064693617 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Feb 2 08:02:47 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:47 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:02:47 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6297874f478c55bb13197287f35d76157f85627d3602c30f76181995e921dbde/merged/var/lib/qdrouterd supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:47 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6a297c0585bbbe00b93e6187ced999752db8a107e0dca9fd52b9ed42a5153643/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:47 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6297874f478c55bb13197287f35d76157f85627d3602c30f76181995e921dbde/merged/var/log/qdrouterd supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:47 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6a297c0585bbbe00b93e6187ced999752db8a107e0dca9fd52b9ed42a5153643/merged/var/lib/kolla/config_files/config.json supports timestamps until 2038 (0x7fffffff) Feb 2 08:02:47 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:02:47 np0005604725 podman[58893]: 2026-02-02 08:02:47.777662319 +0000 UTC m=+0.207052890 container init b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, maintainer=OpenStack TripleO Team, release=1766032510, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, com.redhat.component=openstack-qdrouterd-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=metrics_qdr, org.opencontainers.image.created=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:14Z, version=17.1.13, name=rhosp-rhel9/openstack-qdrouterd, tcib_managed=true, vcs-type=git) Feb 2 08:02:47 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:02:47 np0005604725 podman[58892]: 2026-02-02 08:02:47.811902643 +0000 UTC m=+0.244505790 container init dd413ca66b4deb0aba56f2b14fd3015a9d093e22cfe33c5108f16fd0ef170f0d (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, version=17.1.13, maintainer=OpenStack TripleO Team, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'egQUHP9AWZ8pgpaKI5POCQGwX', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd1309b2578c29eaa98f7da1cd8d204bd'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, io.openshift.expose-services=, vcs-type=git, build-date=2026-01-12T22:10:18Z, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, tcib_managed=true, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-mariadb-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, distribution-scope=public, config_id=tripleo_step1, container_name=mysql_bootstrap, org.opencontainers.image.created=2026-01-12T22:10:18Z, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5) Feb 2 08:02:47 np0005604725 podman[58892]: 2026-02-02 08:02:47.821464821 +0000 UTC m=+0.254067968 container start dd413ca66b4deb0aba56f2b14fd3015a9d093e22cfe33c5108f16fd0ef170f0d (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'egQUHP9AWZ8pgpaKI5POCQGwX', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd1309b2578c29eaa98f7da1cd8d204bd'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-mariadb, io.openshift.expose-services=, container_name=mysql_bootstrap, config_id=tripleo_step1, managed_by=tripleo_ansible, build-date=2026-01-12T22:10:18Z, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, com.redhat.component=openstack-mariadb-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:18Z, tcib_managed=true, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, summary=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git) Feb 2 08:02:47 np0005604725 podman[58892]: 2026-02-02 08:02:47.822977952 +0000 UTC m=+0.255581139 container attach dd413ca66b4deb0aba56f2b14fd3015a9d093e22cfe33c5108f16fd0ef170f0d (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:18Z, managed_by=tripleo_ansible, url=https://www.redhat.com, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, name=rhosp-rhel9/openstack-mariadb, vendor=Red Hat, Inc., config_id=tripleo_step1, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb, container_name=mysql_bootstrap, batch=17.1_20260112.1, tcib_managed=true, release=1766032510, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'egQUHP9AWZ8pgpaKI5POCQGwX', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd1309b2578c29eaa98f7da1cd8d204bd'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, com.redhat.component=openstack-mariadb-container, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:02:47 np0005604725 podman[58893]: 2026-02-02 08:02:47.863197347 +0000 UTC m=+0.292587838 container start b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, summary=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, batch=17.1_20260112.1, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.openshift.expose-services=, vendor=Red Hat, Inc., managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, com.redhat.component=openstack-qdrouterd-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-qdrouterd, config_id=tripleo_step1, vcs-type=git, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}) Feb 2 08:02:47 np0005604725 python3[58335]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name metrics_qdr --conmon-pidfile /run/metrics_qdr.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=ac03474490c6584f4d92c7446902c1e8 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step1 --label container_name=metrics_qdr --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/metrics_qdr.log --network host --privileged=False --user qdrouterd --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro --volume /var/lib/metrics_qdr:/var/lib/qdrouterd:z --volume /var/log/containers/metrics_qdr:/var/log/qdrouterd:z --volume /etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro --volume /etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Feb 2 08:02:47 np0005604725 podman[58930]: 2026-02-02 08:02:47.945042827 +0000 UTC m=+0.124437730 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=starting, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step1, build-date=2026-01-12T22:10:14Z, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, architecture=x86_64, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, description=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.13, vcs-type=git, tcib_managed=true, com.redhat.component=openstack-qdrouterd-container, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, release=1766032510, container_name=metrics_qdr, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:02:48 np0005604725 podman[58930]: 2026-02-02 08:02:48.151971501 +0000 UTC m=+0.331366394 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, version=17.1.13, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step1, container_name=metrics_qdr, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, architecture=x86_64, managed_by=tripleo_ansible, tcib_managed=true, build-date=2026-01-12T22:10:14Z, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, name=rhosp-rhel9/openstack-qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, distribution-scope=public, url=https://www.redhat.com) Feb 2 08:02:48 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:02:53 np0005604725 systemd[1]: libpod-dd413ca66b4deb0aba56f2b14fd3015a9d093e22cfe33c5108f16fd0ef170f0d.scope: Deactivated successfully. Feb 2 08:02:53 np0005604725 systemd[1]: libpod-dd413ca66b4deb0aba56f2b14fd3015a9d093e22cfe33c5108f16fd0ef170f0d.scope: Consumed 2.259s CPU time. Feb 2 08:02:53 np0005604725 podman[59736]: 2026-02-02 08:02:53.736460782 +0000 UTC m=+0.054841272 container died dd413ca66b4deb0aba56f2b14fd3015a9d093e22cfe33c5108f16fd0ef170f0d (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, build-date=2026-01-12T22:10:18Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, container_name=mysql_bootstrap, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, vendor=Red Hat, Inc., com.redhat.component=openstack-mariadb-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, url=https://www.redhat.com, vcs-type=git, batch=17.1_20260112.1, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'egQUHP9AWZ8pgpaKI5POCQGwX', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd1309b2578c29eaa98f7da1cd8d204bd'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, architecture=x86_64, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, config_id=tripleo_step1, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:18Z, description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public) Feb 2 08:02:53 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-dd413ca66b4deb0aba56f2b14fd3015a9d093e22cfe33c5108f16fd0ef170f0d-userdata-shm.mount: Deactivated successfully. Feb 2 08:02:53 np0005604725 systemd[1]: var-lib-containers-storage-overlay-6a297c0585bbbe00b93e6187ced999752db8a107e0dca9fd52b9ed42a5153643-merged.mount: Deactivated successfully. Feb 2 08:02:53 np0005604725 podman[59736]: 2026-02-02 08:02:53.772450264 +0000 UTC m=+0.090830684 container cleanup dd413ca66b4deb0aba56f2b14fd3015a9d093e22cfe33c5108f16fd0ef170f0d (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, org.opencontainers.image.created=2026-01-12T22:10:18Z, container_name=mysql_bootstrap, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, vcs-type=git, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'egQUHP9AWZ8pgpaKI5POCQGwX', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd1309b2578c29eaa98f7da1cd8d204bd'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-mariadb, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step1, build-date=2026-01-12T22:10:18Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, tcib_managed=true, version=17.1.13) Feb 2 08:02:53 np0005604725 systemd[1]: libpod-conmon-dd413ca66b4deb0aba56f2b14fd3015a9d093e22cfe33c5108f16fd0ef170f0d.scope: Deactivated successfully. Feb 2 08:02:53 np0005604725 python3[58335]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name mysql_bootstrap --conmon-pidfile /run/mysql_bootstrap.pid --detach=False --env DB_MARIABACKUP_PASSWORD=egQUHP9AWZ8pgpaKI5POCQGwX --env DB_MARIABACKUP_USER=mariabackup --env DB_MAX_TIMEOUT=60 --env KOLLA_BOOTSTRAP=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=d1309b2578c29eaa98f7da1cd8d204bd --label config_id=tripleo_step1 --label container_name=mysql_bootstrap --label managed_by=tripleo_ansible --label config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'egQUHP9AWZ8pgpaKI5POCQGwX', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd1309b2578c29eaa98f7da1cd8d204bd'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/mysql_bootstrap.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z --volume /var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z --volume /var/lib/mysql:/var/lib/mysql:rw,z --volume /etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro --volume /etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 bash -ec if [ -e /var/lib/mysql/mysql ]; then exit 0; fi#012echo -e "\n[mysqld]\nwsrep_provider=none" >> /etc/my.cnf#012export DB_ROOT_PASSWORD=$(hiera 'mysql::server::root_password')#012kolla_set_configs#012sudo -u mysql -E kolla_extend_start#012timeout ${DB_MAX_TIMEOUT} /bin/bash -c 'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done'#012mysqld_safe --skip-networking --wsrep-on=OFF timeout ${DB_MAX_TIMEOUT} /bin/bash -c 'until mysqladmin -uroot -p"$(hiera 'mysql::server::root_password')" ping 2>/dev/null; do sleep 1; done'#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "CREATE USER 'clustercheck'@'localhost' IDENTIFIED BY '$(hiera mysql_clustercheck_password)';"#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "GRANT PROCESS ON *.* TO 'clustercheck'@'localhost' WITH GRANT OPTION;"#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "DELETE FROM mysql.user WHERE user = 'root' AND host NOT IN ('%','localhost');"#012timeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera 'mysql::server::root_password')" shutdown Feb 2 08:02:54 np0005604725 python3[59790]: ansible-file Invoked with path=/etc/systemd/system/tripleo_memcached.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:02:54 np0005604725 python3[59806]: ansible-file Invoked with path=/etc/systemd/system/tripleo_metrics_qdr.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:02:54 np0005604725 python3[59822]: ansible-file Invoked with path=/etc/systemd/system/tripleo_redis_tls_proxy.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:02:55 np0005604725 python3[59838]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_memcached_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:02:55 np0005604725 python3[59854]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_metrics_qdr_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:02:55 np0005604725 python3[59870]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_redis_tls_proxy_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:02:56 np0005604725 python3[59931]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019375.7710028-120093-196280843027313/source dest=/etc/systemd/system/tripleo_memcached.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:02:56 np0005604725 python3[59960]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019375.7710028-120093-196280843027313/source dest=/etc/systemd/system/tripleo_metrics_qdr.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:02:57 np0005604725 python3[59989]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019375.7710028-120093-196280843027313/source dest=/etc/systemd/system/tripleo_redis_tls_proxy.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:02:57 np0005604725 python3[60005]: ansible-systemd Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Feb 2 08:02:57 np0005604725 systemd[1]: Reloading. Feb 2 08:02:57 np0005604725 systemd-rc-local-generator[60029]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:02:57 np0005604725 systemd-sysv-generator[60033]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:02:57 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:02:58 np0005604725 python3[60057]: ansible-systemd Invoked with state=restarted name=tripleo_memcached.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:02:58 np0005604725 systemd[1]: Reloading. Feb 2 08:02:59 np0005604725 systemd-sysv-generator[60088]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:02:59 np0005604725 systemd-rc-local-generator[60085]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:02:59 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:02:59 np0005604725 systemd[1]: Starting memcached container... Feb 2 08:02:59 np0005604725 systemd[1]: Started memcached container. Feb 2 08:03:00 np0005604725 python3[60124]: ansible-systemd Invoked with state=restarted name=tripleo_metrics_qdr.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:03:00 np0005604725 systemd[1]: Reloading. Feb 2 08:03:00 np0005604725 systemd-rc-local-generator[60153]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:03:00 np0005604725 systemd-sysv-generator[60157]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:03:00 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:03:00 np0005604725 systemd[1]: Starting metrics_qdr container... Feb 2 08:03:00 np0005604725 systemd[1]: Started metrics_qdr container. Feb 2 08:03:01 np0005604725 python3[60191]: ansible-systemd Invoked with state=restarted name=tripleo_redis_tls_proxy.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:03:01 np0005604725 systemd[1]: Reloading. Feb 2 08:03:01 np0005604725 systemd-sysv-generator[60220]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:03:01 np0005604725 systemd-rc-local-generator[60217]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:03:01 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:03:01 np0005604725 systemd[1]: Starting redis_tls_proxy container... Feb 2 08:03:02 np0005604725 systemd[1]: Started redis_tls_proxy container. Feb 2 08:03:02 np0005604725 python3[60271]: ansible-file Invoked with path=/var/lib/container-puppet/container-puppet-tasks1.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:03:04 np0005604725 python3[60392]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=True puppet_config=/var/lib/container-puppet/container-puppet-tasks1.json short_hostname=np0005604725 step=1 update_config_hash_only=False Feb 2 08:03:04 np0005604725 python3[60408]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:03:05 np0005604725 python3[60424]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_1 config_pattern=container-puppet-*.json config_overrides={} debug=True Feb 2 08:03:16 np0005604725 python3[60472]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/config_step.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:03:16 np0005604725 python3[60517]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/config_step.json force=True mode=0600 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019396.169808-120901-88691732293598/source _original_basename=tmpwkgxb5s_ follow=False checksum=f17091ee142621a3c8290c8c96b5b52d67b3a864 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:03:17 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:03:17 np0005604725 podman[60532]: 2026-02-02 08:03:17.340526093 +0000 UTC m=+0.091352583 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:12:26Z, managed_by=tripleo_ansible, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 memcached, description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, architecture=x86_64, name=rhosp-rhel9/openstack-memcached, container_name=memcached, version=17.1.13, maintainer=OpenStack TripleO Team, vcs-type=git, batch=17.1_20260112.1, build-date=2026-01-12T22:12:26Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510) Feb 2 08:03:17 np0005604725 podman[60532]: 2026-02-02 08:03:17.386635196 +0000 UTC m=+0.137461666 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, com.redhat.component=openstack-memcached-container, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=memcached, io.buildah.version=1.41.5, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, name=rhosp-rhel9/openstack-memcached, summary=Red Hat OpenStack Platform 17.1 memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, maintainer=OpenStack TripleO Team, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:12:26Z, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached) Feb 2 08:03:17 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:03:18 np0005604725 python3[60570]: ansible-ansible.legacy.command Invoked with _raw_params=pcs resource config "haproxy-bundle"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:03:18 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:03:18 np0005604725 systemd[1]: tmp-crun.yBnTk0.mount: Deactivated successfully. Feb 2 08:03:18 np0005604725 podman[60572]: 2026-02-02 08:03:18.343706307 +0000 UTC m=+0.097774117 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, distribution-scope=public, vcs-type=git, container_name=metrics_qdr, com.redhat.component=openstack-qdrouterd-container, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:14Z, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, architecture=x86_64, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, url=https://www.redhat.com, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 qdrouterd, release=1766032510, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:10:14Z, name=rhosp-rhel9/openstack-qdrouterd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:03:18 np0005604725 podman[60572]: 2026-02-02 08:03:18.543944399 +0000 UTC m=+0.298012169 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:14Z, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-qdrouterd, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, container_name=metrics_qdr, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, com.redhat.component=openstack-qdrouterd-container, description=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, release=1766032510, architecture=x86_64, url=https://www.redhat.com, distribution-scope=public, tcib_managed=true) Feb 2 08:03:18 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:03:19 np0005604725 python3[60615]: ansible-ansible.legacy.command Invoked with _raw_params=puppet apply --detailed-exitcodes --summarize --color=false --modulepath '/etc/puppet/modules:/opt/stack/puppet-modules:/usr/share/openstack-puppet/modules' --tags 'pacemaker::resource::bundle,pacemaker::property,pacemaker::resource::ip,pacemaker::resource::ocf,pacemaker::constraint::order,pacemaker::constraint::colocation' -e 'include ::tripleo::profile::base::pacemaker; include ::tripleo::profile::pacemaker::haproxy_bundle'#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:03:27 np0005604725 python3[60758]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/haproxy.md5sum follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:03:27 np0005604725 python3[60776]: ansible-tripleo_diff_exec Invoked with command=/var/lib/container-config-scripts/pacemaker_restart_bundle.sh haproxy haproxy-bundle haproxy-bundle Started state_file=/var/lib/config-data/puppet-generated/haproxy.md5sum state_file_suffix=.previous_run environment={'TRIPLEO_MINOR_UPDATE': '', 'TRIPLEO_HA_WRAPPER_RESOURCE_EXISTS': 'False'} return_codes=[0] Feb 2 08:03:27 np0005604725 systemd-journald[617]: Field hash table of /run/log/journal/48447b9b8976f23a3b4b319f2b01dfe5/system.journal has a fill level at 76.0 (253 of 333 items), suggesting rotation. Feb 2 08:03:27 np0005604725 systemd-journald[617]: /run/log/journal/48447b9b8976f23a3b4b319f2b01dfe5/system.journal: Journal header limits reached or header out-of-date, rotating. Feb 2 08:03:27 np0005604725 rsyslogd[48053]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Feb 2 08:03:27 np0005604725 rsyslogd[48053]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Feb 2 08:03:28 np0005604725 python3[60797]: ansible-stat Invoked with path=/tmp/tripleo_ha_image_haproxy-bundle follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:03:28 np0005604725 python3[60813]: ansible-ansible.legacy.command Invoked with _raw_params=pcs resource config "galera-bundle"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:03:29 np0005604725 python3[60831]: ansible-ansible.legacy.command Invoked with _raw_params=puppet apply --detailed-exitcodes --summarize --color=false --modulepath '/etc/puppet/modules:/opt/stack/puppet-modules:/usr/share/openstack-puppet/modules' --tags 'pacemaker::resource::bundle,pacemaker::property,pacemaker::resource::ocf,pacemaker::constraint::order,pacemaker::constraint::colocation' -e '["Mysql_datadir", "Mysql_user", "Mysql_database", "Mysql_grant", "Mysql_plugin"].each |String $val| { noop_resource($val) }; include ::tripleo::profile::base::pacemaker; include ::tripleo::profile::pacemaker::database::mysql_bundle'#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:03:36 np0005604725 python3[60976]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/mysql.md5sum follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:03:37 np0005604725 python3[60994]: ansible-tripleo_diff_exec Invoked with command=/var/lib/container-config-scripts/pacemaker_restart_bundle.sh mysql galera galera-bundle Master state_file=/var/lib/config-data/puppet-generated/mysql.md5sum state_file_suffix=.previous_run environment={'TRIPLEO_MINOR_UPDATE': '', 'TRIPLEO_HA_WRAPPER_RESOURCE_EXISTS': 'False'} return_codes=[0] Feb 2 08:03:37 np0005604725 python3[61014]: ansible-stat Invoked with path=/tmp/tripleo_ha_image_galera-bundle follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:03:38 np0005604725 python3[61062]: ansible-ansible.legacy.stat Invoked with path=/usr/local/sbin/containers-tmpwatch follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:03:39 np0005604725 python3[61105]: ansible-ansible.legacy.copy Invoked with dest=/usr/local/sbin/containers-tmpwatch group=root mode=493 owner=root src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019418.4554307-121919-79784614342980/source _original_basename=tmpxm5alpt3 follow=False checksum=84397b037dad9813fed388c4bcdd4871f384cd22 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:03:39 np0005604725 python3[61135]: ansible-cron Invoked with job=/usr/local/sbin/containers-tmpwatch name=Remove old logs special_time=daily user=root state=present backup=False minute=* hour=* day=* month=* weekday=* disabled=False env=False cron_file=None insertafter=None insertbefore=None Feb 2 08:03:40 np0005604725 python3[61154]: ansible-ansible.legacy.command Invoked with _raw_params=pcs resource config "rabbitmq-bundle"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:03:41 np0005604725 python3[61172]: ansible-ansible.legacy.command Invoked with _raw_params=puppet apply --detailed-exitcodes --summarize --color=false --modulepath '/etc/puppet/modules:/opt/stack/puppet-modules:/usr/share/openstack-puppet/modules' --tags 'pacemaker::resource::bundle,pacemaker::property,pacemaker::resource::ip,pacemaker::resource::ocf,pacemaker::constraint::order,pacemaker::constraint::colocation' -e '["Rabbitmq_policy", "Rabbitmq_user"].each |String $val| { noop_resource($val) }; include ::tripleo::profile::base::pacemaker; include ::tripleo::profile::pacemaker::rabbitmq_bundle'#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:03:45 np0005604725 pacemaker-fenced[51061]: warning: Blind faith: not fencing unseen nodes Feb 2 08:03:45 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for ip-192.168.122.99 on np0005604725 Feb 2 08:03:45 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for ip-192.168.122.99 on np0005604725: not running Feb 2 08:03:47 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:03:47 np0005604725 podman[61341]: 2026-02-02 08:03:47.725172347 +0000 UTC m=+0.067229193 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, container_name=memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:12:26Z, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, vcs-type=git, distribution-scope=public, build-date=2026-01-12T22:12:26Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-memcached-container, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, name=rhosp-rhel9/openstack-memcached, architecture=x86_64, version=17.1.13, io.buildah.version=1.41.5, url=https://www.redhat.com) Feb 2 08:03:47 np0005604725 podman[61341]: 2026-02-02 08:03:47.738884942 +0000 UTC m=+0.080941818 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, name=rhosp-rhel9/openstack-memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-memcached-container, container_name=memcached, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, vendor=Red Hat, Inc., tcib_managed=true, io.openshift.expose-services=, vcs-type=git, io.buildah.version=1.41.5, build-date=2026-01-12T22:12:26Z, summary=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, description=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:03:47 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:03:48 np0005604725 python3[61384]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/rabbitmq.md5sum follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:03:48 np0005604725 python3[61402]: ansible-tripleo_diff_exec Invoked with command=/var/lib/container-config-scripts/pacemaker_restart_bundle.sh oslo_messaging_rpc rabbitmq rabbitmq-bundle Started state_file=/var/lib/config-data/puppet-generated/rabbitmq.md5sum state_file_suffix=.previous_run environment={'TRIPLEO_MINOR_UPDATE': '', 'TRIPLEO_HA_WRAPPER_RESOURCE_EXISTS': 'False'} return_codes=[0] Feb 2 08:03:49 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:03:49 np0005604725 systemd[1]: tmp-crun.Xp8utI.mount: Deactivated successfully. Feb 2 08:03:49 np0005604725 podman[61422]: 2026-02-02 08:03:49.203547816 +0000 UTC m=+0.069652007 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, com.redhat.component=openstack-qdrouterd-container, config_id=tripleo_step1, architecture=x86_64, tcib_managed=true, version=17.1.13, description=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, name=rhosp-rhel9/openstack-qdrouterd, distribution-scope=public, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, release=1766032510, url=https://www.redhat.com, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-type=git, build-date=2026-01-12T22:10:14Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=metrics_qdr) Feb 2 08:03:49 np0005604725 python3[61423]: ansible-stat Invoked with path=/tmp/tripleo_ha_image_rabbitmq-bundle follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:03:49 np0005604725 podman[61422]: 2026-02-02 08:03:49.484052745 +0000 UTC m=+0.350156936 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, io.openshift.expose-services=, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:14Z, container_name=metrics_qdr, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, config_id=tripleo_step1, version=17.1.13, batch=17.1_20260112.1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 qdrouterd, release=1766032510, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-qdrouterd-container, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., io.buildah.version=1.41.5) Feb 2 08:03:49 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:03:50 np0005604725 python3[61467]: ansible-ansible.legacy.command Invoked with _raw_params=pcs resource config "redis-bundle"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:03:50 np0005604725 python3[61486]: ansible-ansible.legacy.command Invoked with _raw_params=puppet apply --detailed-exitcodes --summarize --color=false --modulepath '/etc/puppet/modules:/opt/stack/puppet-modules:/usr/share/openstack-puppet/modules' --tags 'pacemaker::resource::bundle,pacemaker::property,pacemaker::resource::ocf,pacemaker::constraint::order,pacemaker::constraint::colocation' -e 'include ::tripleo::profile::base::pacemaker; include ::tripleo::profile::pacemaker::database::redis_bundle'#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:03:56 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for ip-172.21.0.122 on np0005604725 Feb 2 08:03:56 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for ip-172.21.0.122 on np0005604725: not running Feb 2 08:03:58 np0005604725 python3[61672]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/redis.md5sum follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:03:58 np0005604725 python3[61690]: ansible-tripleo_diff_exec Invoked with command=/var/lib/container-config-scripts/pacemaker_restart_bundle.sh redis redis redis-bundle Slave Master state_file=/var/lib/config-data/puppet-generated/redis.md5sum state_file_suffix=.previous_run environment={'TRIPLEO_MINOR_UPDATE': '', 'TRIPLEO_HA_WRAPPER_RESOURCE_EXISTS': 'False'} return_codes=[0] Feb 2 08:03:59 np0005604725 python3[61710]: ansible-stat Invoked with path=/tmp/tripleo_ha_image_redis-bundle follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:04:00 np0005604725 python3[61726]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_2 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:04:00 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of start operation for ip-172.21.0.122 on np0005604725 Feb 2 08:04:00 np0005604725 IPaddr2(ip-172.21.0.122)[61765]: INFO: Adding inet address 172.21.0.122/32 with broadcast address 172.21.0.255 to device vlan44 Feb 2 08:04:00 np0005604725 IPaddr2(ip-172.21.0.122)[61765]: INFO: Bringing device vlan44 up Feb 2 08:04:00 np0005604725 IPaddr2(ip-172.21.0.122)[61765]: INFO: /usr/libexec/heartbeat/send_arp -i 200 -r 5 -p /run/resource-agents/send_arp-172.21.0.122 vlan44 172.21.0.122 auto not_used not_used Feb 2 08:04:00 np0005604725 pacemaker-controld[51065]: notice: Result of start operation for ip-172.21.0.122 on np0005604725: ok Feb 2 08:04:00 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for ip-172.21.0.122 on np0005604725 Feb 2 08:04:00 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for ip-172.21.0.122 on np0005604725: ok Feb 2 08:04:01 np0005604725 ansible-async_wrapper.py[62008]: Invoked with 44047562929 3600 /home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019441.1402216-123077-128750870569659/AnsiballZ_command.py _ Feb 2 08:04:01 np0005604725 ansible-async_wrapper.py[62011]: Starting module and watcher Feb 2 08:04:01 np0005604725 ansible-async_wrapper.py[62011]: Start watching 62012 (3600) Feb 2 08:04:01 np0005604725 ansible-async_wrapper.py[62012]: Start module (62012) Feb 2 08:04:01 np0005604725 ansible-async_wrapper.py[62008]: Return async_wrapper task started. Feb 2 08:04:02 np0005604725 python3[62032]: ansible-ansible.legacy.async_status Invoked with jid=44047562929.62008 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:04:04 np0005604725 IPaddr2(ip-172.21.0.122)[61765]: INFO: ARPING 172.21.0.122 from 172.21.0.122 vlan44#012Sent 5 probes (5 broadcast(s))#012Received 0 response(s) Feb 2 08:04:06 np0005604725 ansible-async_wrapper.py[62011]: 62012 still running (3600) Feb 2 08:04:06 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for ip-192.168.122.110 on np0005604725 Feb 2 08:04:06 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for ip-192.168.122.110 on np0005604725: not running Feb 2 08:04:07 np0005604725 puppet-user[62030]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:04:07 np0005604725 puppet-user[62030]: (file: /etc/puppet/hiera.yaml) Feb 2 08:04:07 np0005604725 puppet-user[62030]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:04:07 np0005604725 puppet-user[62030]: (file & line not available) Feb 2 08:04:07 np0005604725 puppet-user[62030]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:04:07 np0005604725 puppet-user[62030]: (file & line not available) Feb 2 08:04:07 np0005604725 puppet-user[62030]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/database/mysql/client.pp, line: 89, column: 8) Feb 2 08:04:08 np0005604725 puppet-user[62030]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/packages.pp, line: 39, column: 69) Feb 2 08:04:08 np0005604725 puppet-user[62030]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.39 seconds Feb 2 08:04:08 np0005604725 systemd[1]: Reloading. Feb 2 08:04:08 np0005604725 systemd-sysv-generator[62239]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:04:08 np0005604725 systemd-rc-local-generator[62234]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:04:08 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:04:08 np0005604725 systemd[1]: Reloading. Feb 2 08:04:08 np0005604725 systemd-rc-local-generator[62271]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:04:08 np0005604725 systemd-sysv-generator[62275]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:04:08 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:04:09 np0005604725 puppet-user[62030]: Notice: /Stage[main]/Pacemaker::Service/Service[corosync]/enable: enable changed 'false' to 'true' Feb 2 08:04:09 np0005604725 systemd[1]: Reloading. Feb 2 08:04:09 np0005604725 systemd-rc-local-generator[62309]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:04:09 np0005604725 systemd-sysv-generator[62313]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:04:09 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:04:09 np0005604725 systemd[1]: Reloading. Feb 2 08:04:09 np0005604725 systemd-sysv-generator[62344]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:04:09 np0005604725 systemd-rc-local-generator[62341]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:04:09 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:04:09 np0005604725 puppet-user[62030]: Notice: /Stage[main]/Pacemaker::Service/Service[pacemaker]/enable: enable changed 'false' to 'true' Feb 2 08:04:10 np0005604725 puppet-user[62030]: Notice: Applied catalog in 2.53 seconds Feb 2 08:04:10 np0005604725 puppet-user[62030]: Application: Feb 2 08:04:10 np0005604725 puppet-user[62030]: Initial environment: production Feb 2 08:04:10 np0005604725 puppet-user[62030]: Converged environment: production Feb 2 08:04:10 np0005604725 puppet-user[62030]: Run mode: user Feb 2 08:04:10 np0005604725 puppet-user[62030]: Changes: Feb 2 08:04:10 np0005604725 puppet-user[62030]: Total: 2 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Events: Feb 2 08:04:10 np0005604725 puppet-user[62030]: Success: 2 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Total: 2 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Resources: Feb 2 08:04:10 np0005604725 puppet-user[62030]: Changed: 2 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Out of sync: 2 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Total: 23 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Time: Feb 2 08:04:10 np0005604725 puppet-user[62030]: Schedule: 0.00 Feb 2 08:04:10 np0005604725 puppet-user[62030]: File line: 0.00 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Package: 0.00 Feb 2 08:04:10 np0005604725 puppet-user[62030]: File: 0.00 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Augeas: 0.01 Feb 2 08:04:10 np0005604725 puppet-user[62030]: User: 0.01 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Config retrieval: 0.43 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Service: 1.12 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Exec: 1.22 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Last run: 1770019450 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Transaction evaluation: 2.52 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Catalog application: 2.53 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Filebucket: 0.00 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Total: 2.54 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Version: Feb 2 08:04:10 np0005604725 puppet-user[62030]: Config: 1770019447 Feb 2 08:04:10 np0005604725 puppet-user[62030]: Puppet: 7.10.0 Feb 2 08:04:10 np0005604725 ansible-async_wrapper.py[62012]: Module complete (62012) Feb 2 08:04:11 np0005604725 ansible-async_wrapper.py[62011]: Done in kid B. Feb 2 08:04:12 np0005604725 python3[62435]: ansible-ansible.legacy.async_status Invoked with jid=44047562929.62008 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:04:13 np0005604725 python3[62451]: ansible-file Invoked with path=/var/lib/container-puppet/puppetlabs state=directory setype=svirt_sandbox_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Feb 2 08:04:13 np0005604725 python3[62467]: ansible-stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:04:14 np0005604725 python3[62517]: ansible-ansible.legacy.stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:04:14 np0005604725 python3[62535]: ansible-ansible.legacy.file Invoked with setype=svirt_sandbox_file_t selevel=s0 dest=/var/lib/container-puppet/puppetlabs/facter.conf _original_basename=tmpv3bu01iw recurse=False state=file path=/var/lib/container-puppet/puppetlabs/facter.conf force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Feb 2 08:04:14 np0005604725 python3[62565]: ansible-file Invoked with path=/opt/puppetlabs/facter state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:04:16 np0005604725 python3[62668]: ansible-ansible.posix.synchronize Invoked with src=/opt/puppetlabs/ dest=/var/lib/container-puppet/puppetlabs/ _local_rsync_path=rsync _local_rsync_password=NOT_LOGGING_PARAMETER rsync_path=None delete=False _substitute_controller=False archive=True checksum=False compress=True existing_only=False dirs=False copy_links=False set_remote_user=True rsync_timeout=0 rsync_opts=[] ssh_connection_multiplexing=False partial=False verify_host=False mode=push dest_port=None private_key=None recursive=None links=None perms=None times=None owner=None group=None ssh_args=None link_dest=None Feb 2 08:04:16 np0005604725 python3[62687]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:04:17 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for ip-172.17.0.127 on np0005604725 Feb 2 08:04:17 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for ip-172.17.0.127 on np0005604725: not running Feb 2 08:04:17 np0005604725 python3[62719]: ansible-stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:04:18 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:04:18 np0005604725 systemd[1]: tmp-crun.fzcYKX.mount: Deactivated successfully. Feb 2 08:04:18 np0005604725 podman[62812]: 2026-02-02 08:04:18.325858822 +0000 UTC m=+0.100727168 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, summary=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., com.redhat.component=openstack-memcached-container, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step1, tcib_managed=true, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:12:26Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, name=rhosp-rhel9/openstack-memcached, managed_by=tripleo_ansible, build-date=2026-01-12T22:12:26Z, container_name=memcached, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, batch=17.1_20260112.1, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 memcached, release=1766032510) Feb 2 08:04:18 np0005604725 podman[62812]: 2026-02-02 08:04:18.343837276 +0000 UTC m=+0.118705622 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, com.redhat.component=openstack-memcached-container, config_id=tripleo_step1, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:12:26Z, name=rhosp-rhel9/openstack-memcached, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, container_name=memcached, io.openshift.expose-services=, vcs-type=git, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, build-date=2026-01-12T22:12:26Z, version=17.1.13, distribution-scope=public, tcib_managed=true, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 memcached, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5) Feb 2 08:04:18 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:04:18 np0005604725 python3[62811]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-container-shutdown follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:04:18 np0005604725 python3[62854]: ansible-ansible.legacy.file Invoked with mode=0700 owner=root group=root dest=/usr/libexec/tripleo-container-shutdown _original_basename=tripleo-container-shutdown recurse=False state=file path=/usr/libexec/tripleo-container-shutdown force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:04:19 np0005604725 python3[62916]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-start-podman-container follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:04:19 np0005604725 python3[62934]: ansible-ansible.legacy.file Invoked with mode=0700 owner=root group=root dest=/usr/libexec/tripleo-start-podman-container _original_basename=tripleo-start-podman-container recurse=False state=file path=/usr/libexec/tripleo-start-podman-container force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:04:19 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:04:20 np0005604725 podman[62997]: 2026-02-02 08:04:20.035840538 +0000 UTC m=+0.087713404 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step1, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, release=1766032510, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, vcs-type=git, build-date=2026-01-12T22:10:14Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, container_name=metrics_qdr, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, io.buildah.version=1.41.5, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-qdrouterd-container, io.openshift.expose-services=) Feb 2 08:04:20 np0005604725 python3[62998]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/tripleo-container-shutdown.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:04:20 np0005604725 podman[62997]: 2026-02-02 08:04:20.213932184 +0000 UTC m=+0.265805080 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, release=1766032510, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:14Z, config_id=tripleo_step1, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., architecture=x86_64, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, container_name=metrics_qdr, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, name=rhosp-rhel9/openstack-qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:14Z, url=https://www.redhat.com, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-qdrouterd-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:04:20 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:04:20 np0005604725 python3[63044]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system/tripleo-container-shutdown.service _original_basename=tripleo-container-shutdown-service recurse=False state=file path=/usr/lib/systemd/system/tripleo-container-shutdown.service force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:04:20 np0005604725 python3[63147]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:04:21 np0005604725 python3[63165]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset _original_basename=91-tripleo-container-shutdown-preset recurse=False state=file path=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:04:21 np0005604725 python3[63195]: ansible-systemd Invoked with name=tripleo-container-shutdown state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:04:21 np0005604725 systemd[1]: Reloading. Feb 2 08:04:21 np0005604725 systemd-rc-local-generator[63219]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:04:21 np0005604725 systemd-sysv-generator[63223]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:04:21 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:04:22 np0005604725 python3[63282]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/netns-placeholder.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:04:22 np0005604725 python3[63300]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system/netns-placeholder.service _original_basename=netns-placeholder-service recurse=False state=file path=/usr/lib/systemd/system/netns-placeholder.service force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:04:23 np0005604725 python3[63362]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-netns-placeholder.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:04:23 np0005604725 python3[63380]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system-preset/91-netns-placeholder.preset _original_basename=91-netns-placeholder-preset recurse=False state=file path=/usr/lib/systemd/system-preset/91-netns-placeholder.preset force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:04:24 np0005604725 python3[63410]: ansible-systemd Invoked with name=netns-placeholder state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:04:24 np0005604725 systemd[1]: Reloading. Feb 2 08:04:24 np0005604725 systemd-rc-local-generator[63435]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:04:24 np0005604725 systemd-sysv-generator[63440]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:04:24 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:04:24 np0005604725 systemd[1]: Starting Create netns directory... Feb 2 08:04:24 np0005604725 systemd[1]: run-netns-placeholder.mount: Deactivated successfully. Feb 2 08:04:24 np0005604725 systemd[1]: netns-placeholder.service: Deactivated successfully. Feb 2 08:04:24 np0005604725 systemd[1]: Finished Create netns directory. Feb 2 08:04:25 np0005604725 python3[63467]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Feb 2 08:04:27 np0005604725 python3[63526]: ansible-tripleo_container_manage Invoked with config_id=tripleo_step2 config_dir=/var/lib/tripleo-config/container-startup-config/step_2 config_patterns=*.json config_overrides={} concurrency=5 log_base_path=/var/log/containers/stdouts debug=False Feb 2 08:04:27 np0005604725 podman[63682]: 2026-02-02 08:04:27.378034212 +0000 UTC m=+0.070813473 container create da296c8ff6ec9230c335b6d395904daf1a9ea1b5b525aa96da4b48c15396ec58 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_init_logs, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:58:44Z, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.component=openstack-cinder-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, build-date=2026-01-12T22:58:44Z, batch=17.1_20260112.1, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, summary=Red Hat OpenStack Platform 17.1 cinder-api, container_name=cinder_api_init_logs, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, distribution-scope=public, config_id=tripleo_step2, release=1766032510, tcib_managed=true, managed_by=tripleo_ansible, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api) Feb 2 08:04:27 np0005604725 podman[63695]: 2026-02-02 08:04:27.402943915 +0000 UTC m=+0.081028711 container create 4f815d4d8a6525b769c3454eedbf02411a36f98a525915c5af8e47a2a1b3f13f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler_init_logs, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.component=openstack-cinder-scheduler-container, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.openshift.expose-services=, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-scheduler, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, tcib_managed=true, container_name=cinder_scheduler_init_logs, org.opencontainers.image.created=2026-01-12T22:58:47Z, build-date=2026-01-12T22:58:47Z, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step2, version=17.1.13, maintainer=OpenStack TripleO Team, architecture=x86_64, url=https://www.redhat.com, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, vcs-type=git) Feb 2 08:04:27 np0005604725 podman[63694]: 2026-02-02 08:04:27.421200967 +0000 UTC m=+0.103199172 container create dd4a01a9f944274885defff7c80ad28b0a23029096d9d09caa82f65392876b0c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_init_log, build-date=2026-01-12T22:53:38Z, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, description=Red Hat OpenStack Platform 17.1 heat-engine, container_name=heat_init_log, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, com.redhat.component=openstack-heat-engine-container, config_data={'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']}, release=1766032510, io.openshift.expose-services=, vcs-type=git, vcs-ref=755001522886c265e88561b4997cab642504a845, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-heat-engine, architecture=x86_64, config_id=tripleo_step2, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, org.opencontainers.image.created=2026-01-12T22:53:38Z, tcib_managed=true, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 heat-engine, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:04:27 np0005604725 systemd[1]: Started libpod-conmon-da296c8ff6ec9230c335b6d395904daf1a9ea1b5b525aa96da4b48c15396ec58.scope. Feb 2 08:04:27 np0005604725 systemd[1]: Started libpod-conmon-4f815d4d8a6525b769c3454eedbf02411a36f98a525915c5af8e47a2a1b3f13f.scope. Feb 2 08:04:27 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a515f78e7e5eac0dff49952d71a150e457ce7d1c1f65d75a0dc20a4599f8fadf/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a515f78e7e5eac0dff49952d71a150e457ce7d1c1f65d75a0dc20a4599f8fadf/merged/var/log/cinder supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:27 np0005604725 podman[63719]: 2026-02-02 08:04:27.441509701 +0000 UTC m=+0.097623464 container create 02dfc133a43d94acaeb7be7ac723513008eeb6b19ea72ab13c6db461bd6d69b5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_init_logs, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, container_name=glance_init_logs, config_data={'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']}, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, com.redhat.component=openstack-glance-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, build-date=2026-01-12T22:34:42Z, release=1766032510, config_id=tripleo_step2, architecture=x86_64, name=rhosp-rhel9/openstack-glance-api, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:04:27 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:27 np0005604725 systemd[1]: Started libpod-conmon-dd4a01a9f944274885defff7c80ad28b0a23029096d9d09caa82f65392876b0c.scope. Feb 2 08:04:27 np0005604725 podman[63682]: 2026-02-02 08:04:27.446536483 +0000 UTC m=+0.139315754 container init da296c8ff6ec9230c335b6d395904daf1a9ea1b5b525aa96da4b48c15396ec58 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_init_logs, tcib_managed=true, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, build-date=2026-01-12T22:58:44Z, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 cinder-api, io.buildah.version=1.41.5, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:58:44Z, batch=17.1_20260112.1, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, container_name=cinder_api_init_logs, architecture=x86_64, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-cinder-api-container, distribution-scope=public, config_id=tripleo_step2, release=1766032510, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api) Feb 2 08:04:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e4d6f358bc5417911e0a41b88eef12fa3c4bbbc7e82ae6f0ac348117036a1ef7/merged/var/log/cinder supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:27 np0005604725 podman[63682]: 2026-02-02 08:04:27.3475409 +0000 UTC m=+0.040320171 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Feb 2 08:04:27 np0005604725 podman[63694]: 2026-02-02 08:04:27.350808648 +0000 UTC m=+0.032806883 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 Feb 2 08:04:27 np0005604725 podman[63682]: 2026-02-02 08:04:27.454916037 +0000 UTC m=+0.147695298 container start da296c8ff6ec9230c335b6d395904daf1a9ea1b5b525aa96da4b48c15396ec58 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_init_logs, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.13, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, container_name=cinder_api_init_logs, distribution-scope=public, io.openshift.expose-services=, config_id=tripleo_step2, tcib_managed=true, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, architecture=x86_64, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-cinder-api, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-cinder-api-container, build-date=2026-01-12T22:58:44Z, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:58:44Z, url=https://www.redhat.com, vendor=Red Hat, Inc.) Feb 2 08:04:27 np0005604725 podman[63695]: 2026-02-02 08:04:27.457062392 +0000 UTC m=+0.135147188 container init 4f815d4d8a6525b769c3454eedbf02411a36f98a525915c5af8e47a2a1b3f13f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler_init_logs, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, com.redhat.component=openstack-cinder-scheduler-container, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, batch=17.1_20260112.1, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=cinder_scheduler_init_logs, distribution-scope=public, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, vendor=Red Hat, Inc., config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, maintainer=OpenStack TripleO Team, version=17.1.13, config_id=tripleo_step2, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, build-date=2026-01-12T22:58:47Z, io.openshift.expose-services=, name=rhosp-rhel9/openstack-cinder-scheduler, vcs-type=git, release=1766032510, org.opencontainers.image.created=2026-01-12T22:58:47Z) Feb 2 08:04:27 np0005604725 python3[63526]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name cinder_api_init_logs --conmon-pidfile /run/cinder_api_init_logs.pid --detach=True --label config_id=tripleo_step2 --label container_name=cinder_api_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/cinder_api_init_logs.log --network none --privileged=False --user root --volume /var/log/containers/cinder:/var/log/cinder:z --volume /var/log/containers/httpd/cinder-api:/var/log/httpd:z registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 /bin/bash -c chown -R cinder:cinder /var/log/cinder Feb 2 08:04:27 np0005604725 podman[63695]: 2026-02-02 08:04:27.360606774 +0000 UTC m=+0.038691600 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 Feb 2 08:04:27 np0005604725 podman[63695]: 2026-02-02 08:04:27.463424624 +0000 UTC m=+0.141509430 container start 4f815d4d8a6525b769c3454eedbf02411a36f98a525915c5af8e47a2a1b3f13f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler_init_logs, release=1766032510, org.opencontainers.image.created=2026-01-12T22:58:47Z, tcib_managed=true, name=rhosp-rhel9/openstack-cinder-scheduler, version=17.1.13, batch=17.1_20260112.1, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 cinder-scheduler, build-date=2026-01-12T22:58:47Z, maintainer=OpenStack TripleO Team, architecture=x86_64, io.openshift.expose-services=, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=cinder_scheduler_init_logs, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, config_id=tripleo_step2, managed_by=tripleo_ansible, com.redhat.component=openstack-cinder-scheduler-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler) Feb 2 08:04:27 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:27 np0005604725 systemd[1]: libpod-da296c8ff6ec9230c335b6d395904daf1a9ea1b5b525aa96da4b48c15396ec58.scope: Deactivated successfully. Feb 2 08:04:27 np0005604725 systemd[1]: libpod-4f815d4d8a6525b769c3454eedbf02411a36f98a525915c5af8e47a2a1b3f13f.scope: Deactivated successfully. Feb 2 08:04:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5a52559da5f04b3efefd4decd1ecb25d3abf2f3c12047121049e90b37101f309/merged/var/log/heat supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:27 np0005604725 python3[63526]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name cinder_scheduler_init_logs --conmon-pidfile /run/cinder_scheduler_init_logs.pid --detach=True --label config_id=tripleo_step2 --label container_name=cinder_scheduler_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/cinder_scheduler_init_logs.log --network none --privileged=False --user root --volume /var/log/containers/cinder:/var/log/cinder:z registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 /bin/bash -c chown -R cinder:cinder /var/log/cinder Feb 2 08:04:27 np0005604725 podman[63694]: 2026-02-02 08:04:27.476569092 +0000 UTC m=+0.158567297 container init dd4a01a9f944274885defff7c80ad28b0a23029096d9d09caa82f65392876b0c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_init_log, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.buildah.version=1.41.5, config_data={'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, architecture=x86_64, version=17.1.13, com.redhat.component=openstack-heat-engine-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, summary=Red Hat OpenStack Platform 17.1 heat-engine, name=rhosp-rhel9/openstack-heat-engine, config_id=tripleo_step2, url=https://www.redhat.com, vendor=Red Hat, Inc., vcs-ref=755001522886c265e88561b4997cab642504a845, batch=17.1_20260112.1, release=1766032510, build-date=2026-01-12T22:53:38Z, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:53:38Z, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 heat-engine, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=heat_init_log) Feb 2 08:04:27 np0005604725 podman[63742]: 2026-02-02 08:04:27.483189202 +0000 UTC m=+0.097461429 container create df3913cd6822d79c5b395effdaac92b74dcffe13ff925f3c13ef15c7916c3f88 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon_fix_perms, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:34:41Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, release=1766032510, architecture=x86_64, container_name=horizon_fix_perms, maintainer=OpenStack TripleO Team, config_data={'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard'], 'environment': {'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}}, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, config_id=tripleo_step2, com.redhat.component=openstack-horizon-container, batch=17.1_20260112.1, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-horizon, summary=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, io.buildah.version=1.41.5, managed_by=tripleo_ansible, build-date=2026-01-12T22:34:41Z, url=https://www.redhat.com) Feb 2 08:04:27 np0005604725 systemd[1]: libpod-dd4a01a9f944274885defff7c80ad28b0a23029096d9d09caa82f65392876b0c.scope: Deactivated successfully. Feb 2 08:04:27 np0005604725 podman[63719]: 2026-02-02 08:04:27.396072797 +0000 UTC m=+0.052186550 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:04:27 np0005604725 systemd[1]: Started libpod-conmon-df3913cd6822d79c5b395effdaac92b74dcffe13ff925f3c13ef15c7916c3f88.scope. Feb 2 08:04:27 np0005604725 podman[63787]: 2026-02-02 08:04:27.516657874 +0000 UTC m=+0.032049960 container died 4f815d4d8a6525b769c3454eedbf02411a36f98a525915c5af8e47a2a1b3f13f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler_init_logs, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, container_name=cinder_scheduler_init_logs, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, build-date=2026-01-12T22:58:47Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, org.opencontainers.image.created=2026-01-12T22:58:47Z, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.buildah.version=1.41.5, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, tcib_managed=true, config_id=tripleo_step2, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, io.openshift.expose-services=, url=https://www.redhat.com, version=17.1.13, batch=17.1_20260112.1, com.redhat.component=openstack-cinder-scheduler-container, architecture=x86_64, name=rhosp-rhel9/openstack-cinder-scheduler, description=Red Hat OpenStack Platform 17.1 cinder-scheduler) Feb 2 08:04:27 np0005604725 systemd[1]: Started libpod-conmon-02dfc133a43d94acaeb7be7ac723513008eeb6b19ea72ab13c6db461bd6d69b5.scope. Feb 2 08:04:27 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/121bb91f343c1e29fe18b6db3d60348b78537968dcc831203774bfd6dd83a420/merged/etc/openstack-dashboard supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/121bb91f343c1e29fe18b6db3d60348b78537968dcc831203774bfd6dd83a420/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/121bb91f343c1e29fe18b6db3d60348b78537968dcc831203774bfd6dd83a420/merged/var/log/horizon supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:27 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/128d8612933d14f6b62fb8266b3c0a4198b9ec9b7277eedff5243d7d597afc59/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/128d8612933d14f6b62fb8266b3c0a4198b9ec9b7277eedff5243d7d597afc59/merged/var/log/glance supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:27 np0005604725 podman[63742]: 2026-02-02 08:04:27.533263006 +0000 UTC m=+0.147535213 container init df3913cd6822d79c5b395effdaac92b74dcffe13ff925f3c13ef15c7916c3f88 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon_fix_perms, vendor=Red Hat, Inc., url=https://www.redhat.com, build-date=2026-01-12T22:34:41Z, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-horizon-container, batch=17.1_20260112.1, managed_by=tripleo_ansible, tcib_managed=true, version=17.1.13, description=Red Hat OpenStack Platform 17.1 horizon, config_id=tripleo_step2, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, architecture=x86_64, name=rhosp-rhel9/openstack-horizon, distribution-scope=public, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard'], 'environment': {'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}}, container_name=horizon_fix_perms, summary=Red Hat OpenStack Platform 17.1 horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:41Z) Feb 2 08:04:27 np0005604725 podman[63719]: 2026-02-02 08:04:27.53704387 +0000 UTC m=+0.193157643 container init 02dfc133a43d94acaeb7be7ac723513008eeb6b19ea72ab13c6db461bd6d69b5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_init_logs, com.redhat.component=openstack-glance-api-container, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, name=rhosp-rhel9/openstack-glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:34:42Z, version=17.1.13, url=https://www.redhat.com, config_data={'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']}, config_id=tripleo_step2, managed_by=tripleo_ansible, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, container_name=glance_init_logs, vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, distribution-scope=public, build-date=2026-01-12T22:34:42Z, maintainer=OpenStack TripleO Team) Feb 2 08:04:27 np0005604725 podman[63719]: 2026-02-02 08:04:27.541435214 +0000 UTC m=+0.197548987 container start 02dfc133a43d94acaeb7be7ac723513008eeb6b19ea72ab13c6db461bd6d69b5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_init_logs, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, vcs-ref=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']}, tcib_managed=true, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:34:42Z, architecture=x86_64, maintainer=OpenStack TripleO Team, container_name=glance_init_logs, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, vendor=Red Hat, Inc., batch=17.1_20260112.1, build-date=2026-01-12T22:34:42Z, distribution-scope=public, com.redhat.component=openstack-glance-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step2, io.buildah.version=1.41.5) Feb 2 08:04:27 np0005604725 podman[63742]: 2026-02-02 08:04:27.445193063 +0000 UTC m=+0.059465300 image pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Feb 2 08:04:27 np0005604725 python3[63526]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name glance_init_logs --conmon-pidfile /run/glance_init_logs.pid --detach=True --label config_id=tripleo_step2 --label container_name=glance_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/glance_init_logs.log --network none --privileged=False --user root --volume /var/log/containers/glance:/var/log/glance:z --volume /var/log/containers/httpd/glance:/var/log/httpd:z registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 /bin/bash -c chown -R glance:glance /var/log/glance Feb 2 08:04:27 np0005604725 systemd[1]: libpod-df3913cd6822d79c5b395effdaac92b74dcffe13ff925f3c13ef15c7916c3f88.scope: Deactivated successfully. Feb 2 08:04:27 np0005604725 systemd[1]: libpod-02dfc133a43d94acaeb7be7ac723513008eeb6b19ea72ab13c6db461bd6d69b5.scope: Deactivated successfully. Feb 2 08:04:27 np0005604725 podman[63774]: 2026-02-02 08:04:27.56015793 +0000 UTC m=+0.090852509 container died da296c8ff6ec9230c335b6d395904daf1a9ea1b5b525aa96da4b48c15396ec58 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_init_logs, io.openshift.expose-services=, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:58:44Z, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, build-date=2026-01-12T22:58:44Z, batch=17.1_20260112.1, vcs-type=git, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, config_id=tripleo_step2, io.buildah.version=1.41.5, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, container_name=cinder_api_init_logs, name=rhosp-rhel9/openstack-cinder-api, tcib_managed=true, com.redhat.component=openstack-cinder-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, distribution-scope=public, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:04:27 np0005604725 podman[63850]: 2026-02-02 08:04:27.583793604 +0000 UTC m=+0.030757881 container died 02dfc133a43d94acaeb7be7ac723513008eeb6b19ea72ab13c6db461bd6d69b5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_init_logs, config_id=tripleo_step2, distribution-scope=public, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, architecture=x86_64, release=1766032510, com.redhat.component=openstack-glance-api-container, build-date=2026-01-12T22:34:42Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp-rhel9/openstack-glance-api, config_data={'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']}, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, container_name=glance_init_logs, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, version=17.1.13, description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:34:42Z, batch=17.1_20260112.1) Feb 2 08:04:27 np0005604725 podman[63853]: 2026-02-02 08:04:27.655169374 +0000 UTC m=+0.096081248 container cleanup 02dfc133a43d94acaeb7be7ac723513008eeb6b19ea72ab13c6db461bd6d69b5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_init_logs, config_data={'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']}, com.redhat.component=openstack-glance-api-container, vcs-ref=705339545363fec600102567c4e923938e0f43b3, container_name=glance_init_logs, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step2, summary=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:34:42Z, architecture=x86_64, build-date=2026-01-12T22:34:42Z, managed_by=tripleo_ansible, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, version=17.1.13) Feb 2 08:04:27 np0005604725 systemd[1]: libpod-conmon-02dfc133a43d94acaeb7be7ac723513008eeb6b19ea72ab13c6db461bd6d69b5.scope: Deactivated successfully. Feb 2 08:04:27 np0005604725 podman[63773]: 2026-02-02 08:04:27.681804989 +0000 UTC m=+0.216613382 container cleanup da296c8ff6ec9230c335b6d395904daf1a9ea1b5b525aa96da4b48c15396ec58 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_init_logs, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, container_name=cinder_api_init_logs, release=1766032510, distribution-scope=public, com.redhat.component=openstack-cinder-api-container, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, architecture=x86_64, tcib_managed=true, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, build-date=2026-01-12T22:58:44Z, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, version=17.1.13, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, vendor=Red Hat, Inc., config_id=tripleo_step2) Feb 2 08:04:27 np0005604725 systemd[1]: libpod-conmon-da296c8ff6ec9230c335b6d395904daf1a9ea1b5b525aa96da4b48c15396ec58.scope: Deactivated successfully. Feb 2 08:04:27 np0005604725 podman[63694]: 2026-02-02 08:04:27.687776259 +0000 UTC m=+0.369774504 container start dd4a01a9f944274885defff7c80ad28b0a23029096d9d09caa82f65392876b0c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_init_log, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 heat-engine, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 heat-engine, build-date=2026-01-12T22:53:38Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, vendor=Red Hat, Inc., config_id=tripleo_step2, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:53:38Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-heat-engine, config_data={'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']}, release=1766032510, url=https://www.redhat.com, com.redhat.component=openstack-heat-engine-container, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=, container_name=heat_init_log, vcs-type=git, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, architecture=x86_64) Feb 2 08:04:27 np0005604725 podman[63742]: 2026-02-02 08:04:27.689911834 +0000 UTC m=+0.304184051 container start df3913cd6822d79c5b395effdaac92b74dcffe13ff925f3c13ef15c7916c3f88 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon_fix_perms, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, name=rhosp-rhel9/openstack-horizon, config_data={'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard'], 'environment': {'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}}, distribution-scope=public, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step2, architecture=x86_64, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, batch=17.1_20260112.1, container_name=horizon_fix_perms, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, vcs-type=git, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 horizon, version=17.1.13, com.redhat.component=openstack-horizon-container, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:34:41Z, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 horizon, build-date=2026-01-12T22:34:41Z, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:04:27 np0005604725 podman[63860]: 2026-02-02 08:04:27.691814762 +0000 UTC m=+0.129719005 container died df3913cd6822d79c5b395effdaac92b74dcffe13ff925f3c13ef15c7916c3f88 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon_fix_perms, vcs-ref=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, version=17.1.13, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, config_data={'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard'], 'environment': {'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}}, org.opencontainers.image.created=2026-01-12T22:34:41Z, vcs-type=git, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step2, container_name=horizon_fix_perms, build-date=2026-01-12T22:34:41Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-horizon-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 horizon, io.buildah.version=1.41.5, release=1766032510, io.openshift.expose-services=, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-horizon) Feb 2 08:04:27 np0005604725 python3[63526]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name heat_init_log --conmon-pidfile /run/heat_init_log.pid --detach=True --label config_id=tripleo_step2 --label container_name=heat_init_log --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/heat_init_log.log --network none --user root --volume /var/log/containers/heat:/var/log/heat:z registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 /bin/bash -c chown -R heat:heat /var/log/heat Feb 2 08:04:27 np0005604725 python3[63526]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name horizon_fix_perms --conmon-pidfile /run/horizon_fix_perms.pid --detach=True --env TRIPLEO_CONFIG_HASH=a8e5b44090fb824658d0cdcc54fbcb7d --label config_id=tripleo_step2 --label container_name=horizon_fix_perms --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard'], 'environment': {'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/horizon_fix_perms.log --network none --user root --volume /var/log/containers/horizon:/var/log/horizon:z --volume /var/log/containers/httpd/horizon:/var/log/httpd:z --volume /var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 /bin/bash -c touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard Feb 2 08:04:27 np0005604725 podman[63786]: 2026-02-02 08:04:27.703016371 +0000 UTC m=+0.224101809 container cleanup 4f815d4d8a6525b769c3454eedbf02411a36f98a525915c5af8e47a2a1b3f13f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler_init_logs, release=1766032510, config_id=tripleo_step2, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-cinder-scheduler-container, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, build-date=2026-01-12T22:58:47Z, distribution-scope=public, managed_by=tripleo_ansible, io.openshift.expose-services=, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, name=rhosp-rhel9/openstack-cinder-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, vendor=Red Hat, Inc., org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, url=https://www.redhat.com, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, architecture=x86_64, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, container_name=cinder_scheduler_init_logs, org.opencontainers.image.created=2026-01-12T22:58:47Z) Feb 2 08:04:27 np0005604725 systemd[1]: libpod-conmon-4f815d4d8a6525b769c3454eedbf02411a36f98a525915c5af8e47a2a1b3f13f.scope: Deactivated successfully. Feb 2 08:04:27 np0005604725 podman[63932]: 2026-02-02 08:04:27.741179314 +0000 UTC m=+0.034838894 container died dd4a01a9f944274885defff7c80ad28b0a23029096d9d09caa82f65392876b0c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_init_log, batch=17.1_20260112.1, managed_by=tripleo_ansible, vcs-type=git, build-date=2026-01-12T22:53:38Z, container_name=heat_init_log, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=755001522886c265e88561b4997cab642504a845, release=1766032510, tcib_managed=true, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:53:38Z, url=https://www.redhat.com, config_id=tripleo_step2, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-engine, io.buildah.version=1.41.5, version=17.1.13, config_data={'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']}, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, com.redhat.component=openstack-heat-engine-container, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-heat-engine, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, summary=Red Hat OpenStack Platform 17.1 heat-engine) Feb 2 08:04:27 np0005604725 podman[63860]: 2026-02-02 08:04:27.76183977 +0000 UTC m=+0.199743993 container cleanup df3913cd6822d79c5b395effdaac92b74dcffe13ff925f3c13ef15c7916c3f88 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon_fix_perms, container_name=horizon_fix_perms, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-horizon-container, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-horizon, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, vendor=Red Hat, Inc., managed_by=tripleo_ansible, release=1766032510, org.opencontainers.image.created=2026-01-12T22:34:41Z, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, config_id=tripleo_step2, vcs-type=git, io.openshift.expose-services=, distribution-scope=public, architecture=x86_64, build-date=2026-01-12T22:34:41Z, summary=Red Hat OpenStack Platform 17.1 horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard'], 'environment': {'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}}) Feb 2 08:04:27 np0005604725 systemd[1]: libpod-conmon-df3913cd6822d79c5b395effdaac92b74dcffe13ff925f3c13ef15c7916c3f88.scope: Deactivated successfully. Feb 2 08:04:27 np0005604725 podman[63812]: 2026-02-02 08:04:27.815672217 +0000 UTC m=+0.316534735 container cleanup dd4a01a9f944274885defff7c80ad28b0a23029096d9d09caa82f65392876b0c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_init_log, org.opencontainers.image.created=2026-01-12T22:53:38Z, tcib_managed=true, release=1766032510, container_name=heat_init_log, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, batch=17.1_20260112.1, config_data={'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']}, maintainer=OpenStack TripleO Team, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 heat-engine, managed_by=tripleo_ansible, vcs-type=git, architecture=x86_64, distribution-scope=public, name=rhosp-rhel9/openstack-heat-engine, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, vcs-ref=755001522886c265e88561b4997cab642504a845, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step2, build-date=2026-01-12T22:53:38Z, io.openshift.expose-services=, com.redhat.component=openstack-heat-engine-container, description=Red Hat OpenStack Platform 17.1 heat-engine) Feb 2 08:04:27 np0005604725 systemd[1]: libpod-conmon-dd4a01a9f944274885defff7c80ad28b0a23029096d9d09caa82f65392876b0c.scope: Deactivated successfully. Feb 2 08:04:27 np0005604725 podman[64034]: 2026-02-02 08:04:27.895166721 +0000 UTC m=+0.067684948 container create df03213ac1878cd1ccae5c1f11c86daba263846ad5c1261fdacedac9cf3689d7 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_init_logs, config_data={'command': ['/bin/bash', '-c', 'chown -R neutron:neutron /var/log/neutron'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:57:35Z, url=https://www.redhat.com, architecture=x86_64, io.openshift.expose-services=, version=17.1.13, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, description=Red Hat OpenStack Platform 17.1 neutron-server, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, summary=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=neutron_init_logs, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, name=rhosp-rhel9/openstack-neutron-server, vendor=Red Hat, Inc., batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:57:35Z, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step2, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true) Feb 2 08:04:27 np0005604725 podman[64050]: 2026-02-02 08:04:27.920304322 +0000 UTC m=+0.076448613 container create 5187d60c9abb3bf85134f5e2fa0f6c127f004a0468aec83b82b8df576968a37d (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_init_logs, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-manila-api-container, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, architecture=x86_64, managed_by=tripleo_ansible, container_name=manila_init_logs, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vcs-type=git, version=17.1.13, release=1766032510, summary=Red Hat OpenStack Platform 17.1 manila-api, tcib_managed=true, name=rhosp-rhel9/openstack-manila-api, build-date=2026-01-12T22:52:22Z, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, config_id=tripleo_step2, org.opencontainers.image.created=2026-01-12T22:52:22Z, config_data={'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, description=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.41.5) Feb 2 08:04:27 np0005604725 systemd[1]: Started libpod-conmon-df03213ac1878cd1ccae5c1f11c86daba263846ad5c1261fdacedac9cf3689d7.scope. Feb 2 08:04:27 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d9c4c6051175f4bf483ec8a484d67e3146104e33165450923a216ef7186c9445/merged/var/log/neutron supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d9c4c6051175f4bf483ec8a484d67e3146104e33165450923a216ef7186c9445/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:27 np0005604725 systemd[1]: Started libpod-conmon-5187d60c9abb3bf85134f5e2fa0f6c127f004a0468aec83b82b8df576968a37d.scope. Feb 2 08:04:27 np0005604725 podman[64034]: 2026-02-02 08:04:27.944737591 +0000 UTC m=+0.117255818 container init df03213ac1878cd1ccae5c1f11c86daba263846ad5c1261fdacedac9cf3689d7 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_init_logs, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, description=Red Hat OpenStack Platform 17.1 neutron-server, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 neutron-server, vcs-type=git, config_id=tripleo_step2, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, release=1766032510, org.opencontainers.image.created=2026-01-12T22:57:35Z, config_data={'command': ['/bin/bash', '-c', 'chown -R neutron:neutron /var/log/neutron'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z']}, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, batch=17.1_20260112.1, build-date=2026-01-12T22:57:35Z, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, com.redhat.component=openstack-neutron-server-container, managed_by=tripleo_ansible, container_name=neutron_init_logs, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64) Feb 2 08:04:27 np0005604725 podman[64034]: 2026-02-02 08:04:27.950830115 +0000 UTC m=+0.123348342 container start df03213ac1878cd1ccae5c1f11c86daba263846ad5c1261fdacedac9cf3689d7 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_init_logs, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, description=Red Hat OpenStack Platform 17.1 neutron-server, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:57:35Z, summary=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z, config_data={'command': ['/bin/bash', '-c', 'chown -R neutron:neutron /var/log/neutron'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z']}, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, config_id=tripleo_step2, release=1766032510, managed_by=tripleo_ansible, architecture=x86_64, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, tcib_managed=true, batch=17.1_20260112.1, io.openshift.expose-services=, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-neutron-server-container, container_name=neutron_init_logs, name=rhosp-rhel9/openstack-neutron-server) Feb 2 08:04:27 np0005604725 podman[64034]: 2026-02-02 08:04:27.856474011 +0000 UTC m=+0.028992248 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Feb 2 08:04:27 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:27 np0005604725 systemd[1]: libpod-df03213ac1878cd1ccae5c1f11c86daba263846ad5c1261fdacedac9cf3689d7.scope: Deactivated successfully. Feb 2 08:04:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/2d5880ee60d592b99fc65174750da4a959c45a04d21a37baf3f93f9ae50c2eae/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/2d5880ee60d592b99fc65174750da4a959c45a04d21a37baf3f93f9ae50c2eae/merged/var/log/manila supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:27 np0005604725 python3[63526]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name neutron_init_logs --conmon-pidfile /run/neutron_init_logs.pid --detach=True --label config_id=tripleo_step2 --label container_name=neutron_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R neutron:neutron /var/log/neutron'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/neutron_init_logs.log --network none --privileged=False --user root --volume /var/log/containers/neutron:/var/log/neutron:z --volume /var/log/containers/httpd/neutron-api:/var/log/httpd:z registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 /bin/bash -c chown -R neutron:neutron /var/log/neutron Feb 2 08:04:27 np0005604725 podman[64050]: 2026-02-02 08:04:27.962617931 +0000 UTC m=+0.118762172 container init 5187d60c9abb3bf85134f5e2fa0f6c127f004a0468aec83b82b8df576968a37d (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_init_logs, name=rhosp-rhel9/openstack-manila-api, config_data={'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=manila_init_logs, summary=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.41.5, io.openshift.expose-services=, config_id=tripleo_step2, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:52:22Z, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 manila-api, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, tcib_managed=true, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, architecture=x86_64, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, build-date=2026-01-12T22:52:22Z, com.redhat.component=openstack-manila-api-container, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, version=17.1.13, release=1766032510) Feb 2 08:04:27 np0005604725 podman[64050]: 2026-02-02 08:04:27.971559242 +0000 UTC m=+0.127703513 container start 5187d60c9abb3bf85134f5e2fa0f6c127f004a0468aec83b82b8df576968a37d (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_init_logs, config_data={'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, url=https://www.redhat.com, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, config_id=tripleo_step2, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., com.redhat.component=openstack-manila-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-manila-api, build-date=2026-01-12T22:52:22Z, version=17.1.13, container_name=manila_init_logs, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, batch=17.1_20260112.1, managed_by=tripleo_ansible, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 manila-api, org.opencontainers.image.created=2026-01-12T22:52:22Z, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 manila-api, release=1766032510, distribution-scope=public, tcib_managed=true, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb) Feb 2 08:04:27 np0005604725 podman[64050]: 2026-02-02 08:04:27.886883651 +0000 UTC m=+0.043027912 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Feb 2 08:04:27 np0005604725 python3[63526]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name manila_init_logs --conmon-pidfile /run/manila_init_logs.pid --detach=True --label config_id=tripleo_step2 --label container_name=manila_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/manila_init_logs.log --network none --user root --volume /var/log/containers/manila:/var/log/manila:z --volume /var/log/containers/httpd/manila-api:/var/log/httpd:z registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 /bin/bash -c chown -R manila:manila /var/log/manila Feb 2 08:04:27 np0005604725 systemd[1]: libpod-5187d60c9abb3bf85134f5e2fa0f6c127f004a0468aec83b82b8df576968a37d.scope: Deactivated successfully. Feb 2 08:04:28 np0005604725 podman[64123]: 2026-02-02 08:04:28.018998636 +0000 UTC m=+0.051230460 container died df03213ac1878cd1ccae5c1f11c86daba263846ad5c1261fdacedac9cf3689d7 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_init_logs, distribution-scope=public, maintainer=OpenStack TripleO Team, config_id=tripleo_step2, version=17.1.13, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, config_data={'command': ['/bin/bash', '-c', 'chown -R neutron:neutron /var/log/neutron'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z']}, io.buildah.version=1.41.5, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:57:35Z, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, name=rhosp-rhel9/openstack-neutron-server, description=Red Hat OpenStack Platform 17.1 neutron-server, container_name=neutron_init_logs, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, managed_by=tripleo_ansible, architecture=x86_64, tcib_managed=true, url=https://www.redhat.com, build-date=2026-01-12T22:57:35Z, io.openshift.expose-services=, com.redhat.component=openstack-neutron-server-container, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:04:28 np0005604725 podman[64084]: 2026-02-02 08:04:28.02739862 +0000 UTC m=+0.136334433 container create f933d0e33ce7d701ab942829e00836041acdf6308139f7a7ae1d8d436e6c7dfd (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_wait_bundle, build-date=2026-01-12T22:10:18Z, architecture=x86_64, com.redhat.component=openstack-mariadb-container, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, batch=17.1_20260112.1, tcib_managed=true, container_name=mysql_wait_bundle, name=rhosp-rhel9/openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:18Z, version=17.1.13, managed_by=tripleo_ansible, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, release=1766032510, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'd1309b2578c29eaa98f7da1cd8d204bd'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/mysql:/var/lib/mysql:rw,z', '/var/lib/config-data/puppet-generated/mysql/root:/root:rw']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step2, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:04:28 np0005604725 podman[64149]: 2026-02-02 08:04:28.047673044 +0000 UTC m=+0.048248851 container died 5187d60c9abb3bf85134f5e2fa0f6c127f004a0468aec83b82b8df576968a37d (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_init_logs, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, com.redhat.component=openstack-manila-api-container, name=rhosp-rhel9/openstack-manila-api, container_name=manila_init_logs, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, org.opencontainers.image.created=2026-01-12T22:52:22Z, build-date=2026-01-12T22:52:22Z, config_id=tripleo_step2, vcs-type=git, io.openshift.expose-services=, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 manila-api, tcib_managed=true, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 manila-api, config_data={'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, vendor=Red Hat, Inc., batch=17.1_20260112.1) Feb 2 08:04:28 np0005604725 systemd[1]: Started libpod-conmon-f933d0e33ce7d701ab942829e00836041acdf6308139f7a7ae1d8d436e6c7dfd.scope. Feb 2 08:04:28 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/2eb15d9b1b1852fa6f040d12038de7fff7f6682794f01da741576c21ef93c2bc/merged/root supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/2eb15d9b1b1852fa6f040d12038de7fff7f6682794f01da741576c21ef93c2bc/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:28 np0005604725 podman[64084]: 2026-02-02 08:04:27.978573824 +0000 UTC m=+0.087509657 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Feb 2 08:04:28 np0005604725 podman[64152]: 2026-02-02 08:04:28.107840923 +0000 UTC m=+0.119292018 container cleanup 5187d60c9abb3bf85134f5e2fa0f6c127f004a0468aec83b82b8df576968a37d (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_init_logs, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, container_name=manila_init_logs, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-manila-api, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, config_data={'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, distribution-scope=public, com.redhat.component=openstack-manila-api-container, architecture=x86_64, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:52:22Z, managed_by=tripleo_ansible, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, vendor=Red Hat, Inc., tcib_managed=true, io.openshift.expose-services=, config_id=tripleo_step2, description=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, release=1766032510, build-date=2026-01-12T22:52:22Z, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, vcs-type=git) Feb 2 08:04:28 np0005604725 systemd[1]: libpod-conmon-5187d60c9abb3bf85134f5e2fa0f6c127f004a0468aec83b82b8df576968a37d.scope: Deactivated successfully. Feb 2 08:04:28 np0005604725 podman[64084]: 2026-02-02 08:04:28.136131719 +0000 UTC m=+0.245067532 container init f933d0e33ce7d701ab942829e00836041acdf6308139f7a7ae1d8d436e6c7dfd (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_wait_bundle, org.opencontainers.image.created=2026-01-12T22:10:18Z, vendor=Red Hat, Inc., vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.openshift.expose-services=, config_data={'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'd1309b2578c29eaa98f7da1cd8d204bd'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/mysql:/var/lib/mysql:rw,z', '/var/lib/config-data/puppet-generated/mysql/root:/root:rw']}, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:10:18Z, config_id=tripleo_step2, container_name=mysql_wait_bundle, name=rhosp-rhel9/openstack-mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, tcib_managed=true, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, com.redhat.component=openstack-mariadb-container, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5) Feb 2 08:04:28 np0005604725 podman[64180]: 2026-02-02 08:04:28.143141871 +0000 UTC m=+0.112044439 container create a73a86230ed71cd01d6e000e660a741cbc530f19f0b09408a50f9871842b81aa (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_init_logs, architecture=x86_64, io.openshift.expose-services=, batch=17.1_20260112.1, com.redhat.component=openstack-nova-api-container, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_api_init_logs, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, tcib_managed=true, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z']}, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step2, org.opencontainers.image.created=2026-01-12T23:31:50Z, name=rhosp-rhel9/openstack-nova-api, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, release=1766032510, build-date=2026-01-12T23:31:50Z, distribution-scope=public) Feb 2 08:04:28 np0005604725 podman[64121]: 2026-02-02 08:04:28.150092271 +0000 UTC m=+0.185145340 container cleanup df03213ac1878cd1ccae5c1f11c86daba263846ad5c1261fdacedac9cf3689d7 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_init_logs, release=1766032510, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_step2, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, tcib_managed=true, vcs-type=git, architecture=x86_64, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, config_data={'command': ['/bin/bash', '-c', 'chown -R neutron:neutron /var/log/neutron'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z']}, managed_by=tripleo_ansible, build-date=2026-01-12T22:57:35Z, vendor=Red Hat, Inc., distribution-scope=public, container_name=neutron_init_logs, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:57:35Z, name=rhosp-rhel9/openstack-neutron-server, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, com.redhat.component=openstack-neutron-server-container, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.expose-services=) Feb 2 08:04:28 np0005604725 systemd[1]: libpod-conmon-df03213ac1878cd1ccae5c1f11c86daba263846ad5c1261fdacedac9cf3689d7.scope: Deactivated successfully. Feb 2 08:04:28 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for ip-172.18.0.162 on np0005604725 Feb 2 08:04:28 np0005604725 podman[64180]: 2026-02-02 08:04:28.058121169 +0000 UTC m=+0.027023737 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:04:28 np0005604725 podman[64084]: 2026-02-02 08:04:28.195885617 +0000 UTC m=+0.304821470 container start f933d0e33ce7d701ab942829e00836041acdf6308139f7a7ae1d8d436e6c7dfd (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_wait_bundle, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, architecture=x86_64, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:18Z, tcib_managed=true, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step2, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, container_name=mysql_wait_bundle, config_data={'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'd1309b2578c29eaa98f7da1cd8d204bd'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/mysql:/var/lib/mysql:rw,z', '/var/lib/config-data/puppet-generated/mysql/root:/root:rw']}, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:18Z, com.redhat.component=openstack-mariadb-container, release=1766032510, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible) Feb 2 08:04:28 np0005604725 podman[64084]: 2026-02-02 08:04:28.19633845 +0000 UTC m=+0.305274263 container attach f933d0e33ce7d701ab942829e00836041acdf6308139f7a7ae1d8d436e6c7dfd (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_wait_bundle, org.opencontainers.image.created=2026-01-12T22:10:18Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'd1309b2578c29eaa98f7da1cd8d204bd'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/mysql:/var/lib/mysql:rw,z', '/var/lib/config-data/puppet-generated/mysql/root:/root:rw']}, vcs-type=git, url=https://www.redhat.com, build-date=2026-01-12T22:10:18Z, version=17.1.13, batch=17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-mariadb-container, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, architecture=x86_64, config_id=tripleo_step2, release=1766032510, io.buildah.version=1.41.5, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 mariadb, container_name=mysql_wait_bundle) Feb 2 08:04:28 np0005604725 systemd[1]: Started libpod-conmon-a73a86230ed71cd01d6e000e660a741cbc530f19f0b09408a50f9871842b81aa.scope. Feb 2 08:04:28 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for ip-172.18.0.162 on np0005604725: not running Feb 2 08:04:28 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0879a28fb54cc959bc0b6f229cfa0e5935005878bad0b10b29a784b455e0e503/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0879a28fb54cc959bc0b6f229cfa0e5935005878bad0b10b29a784b455e0e503/merged/var/log/nova supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:28 np0005604725 podman[64180]: 2026-02-02 08:04:28.245591769 +0000 UTC m=+0.214494337 container init a73a86230ed71cd01d6e000e660a741cbc530f19f0b09408a50f9871842b81aa (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_init_logs, url=https://www.redhat.com, vendor=Red Hat, Inc., build-date=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z']}, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, version=17.1.13, org.opencontainers.image.created=2026-01-12T23:31:50Z, name=rhosp-rhel9/openstack-nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=nova_api_init_logs, release=1766032510, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, config_id=tripleo_step2, tcib_managed=true, architecture=x86_64) Feb 2 08:04:28 np0005604725 podman[64180]: 2026-02-02 08:04:28.253901201 +0000 UTC m=+0.222803769 container start a73a86230ed71cd01d6e000e660a741cbc530f19f0b09408a50f9871842b81aa (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_init_logs, name=rhosp-rhel9/openstack-nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, com.redhat.component=openstack-nova-api-container, io.openshift.expose-services=, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, release=1766032510, vendor=Red Hat, Inc., build-date=2026-01-12T23:31:50Z, description=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.created=2026-01-12T23:31:50Z, tcib_managed=true, config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step2, container_name=nova_api_init_logs) Feb 2 08:04:28 np0005604725 python3[63526]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name nova_api_init_logs --conmon-pidfile /run/nova_api_init_logs.pid --detach=True --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --label config_id=tripleo_step2 --label container_name=nova_api_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/nova_api_init_logs.log --network none --privileged=False --user root --volume /var/log/containers/nova:/var/log/nova:z --volume /var/log/containers/httpd/nova-api:/var/log/httpd:z registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 /bin/bash -c chown -R nova:nova /var/log/nova Feb 2 08:04:28 np0005604725 systemd[1]: libpod-a73a86230ed71cd01d6e000e660a741cbc530f19f0b09408a50f9871842b81aa.scope: Deactivated successfully. Feb 2 08:04:28 np0005604725 podman[64330]: 2026-02-02 08:04:28.317094872 +0000 UTC m=+0.044174287 container died a73a86230ed71cd01d6e000e660a741cbc530f19f0b09408a50f9871842b81aa (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_init_logs, org.opencontainers.image.created=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_step2, url=https://www.redhat.com, vcs-type=git, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-nova-api-container, io.openshift.expose-services=, managed_by=tripleo_ansible, tcib_managed=true, io.buildah.version=1.41.5, distribution-scope=public, config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, name=rhosp-rhel9/openstack-nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, release=1766032510, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_api_init_logs, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:31:50Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:04:28 np0005604725 systemd[1]: var-lib-containers-storage-overlay-5a52559da5f04b3efefd4decd1ecb25d3abf2f3c12047121049e90b37101f309-merged.mount: Deactivated successfully. Feb 2 08:04:28 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-dd4a01a9f944274885defff7c80ad28b0a23029096d9d09caa82f65392876b0c-userdata-shm.mount: Deactivated successfully. Feb 2 08:04:28 np0005604725 systemd[1]: var-lib-containers-storage-overlay-e4d6f358bc5417911e0a41b88eef12fa3c4bbbc7e82ae6f0ac348117036a1ef7-merged.mount: Deactivated successfully. Feb 2 08:04:28 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-4f815d4d8a6525b769c3454eedbf02411a36f98a525915c5af8e47a2a1b3f13f-userdata-shm.mount: Deactivated successfully. Feb 2 08:04:28 np0005604725 systemd[1]: var-lib-containers-storage-overlay-a515f78e7e5eac0dff49952d71a150e457ce7d1c1f65d75a0dc20a4599f8fadf-merged.mount: Deactivated successfully. Feb 2 08:04:28 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-da296c8ff6ec9230c335b6d395904daf1a9ea1b5b525aa96da4b48c15396ec58-userdata-shm.mount: Deactivated successfully. Feb 2 08:04:28 np0005604725 podman[64332]: 2026-02-02 08:04:28.393269506 +0000 UTC m=+0.120952379 container cleanup a73a86230ed71cd01d6e000e660a741cbc530f19f0b09408a50f9871842b81aa (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_init_logs, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, config_id=tripleo_step2, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, name=rhosp-rhel9/openstack-nova-api, build-date=2026-01-12T23:31:50Z, version=17.1.13, io.buildah.version=1.41.5, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T23:31:50Z, managed_by=tripleo_ansible, container_name=nova_api_init_logs, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, com.redhat.component=openstack-nova-api-container, config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z']}, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, tcib_managed=true) Feb 2 08:04:28 np0005604725 systemd[1]: libpod-conmon-a73a86230ed71cd01d6e000e660a741cbc530f19f0b09408a50f9871842b81aa.scope: Deactivated successfully. Feb 2 08:04:28 np0005604725 podman[64400]: 2026-02-02 08:04:28.421448128 +0000 UTC m=+0.079076102 container create b075d1446ddb8161832b3e9007665c51c39014480fb58636df12c3b59725da84 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor_init_log, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:32:18Z, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.expose-services=, version=17.1.13, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-conductor-container, architecture=x86_64, batch=17.1_20260112.1, vcs-type=git, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-conductor, config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z']}, release=1766032510, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-conductor, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, container_name=nova_conductor_init_log, config_id=tripleo_step2, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T23:32:18Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, name=rhosp-rhel9/openstack-nova-conductor, managed_by=tripleo_ansible) Feb 2 08:04:28 np0005604725 systemd[1]: Started libpod-conmon-b075d1446ddb8161832b3e9007665c51c39014480fb58636df12c3b59725da84.scope. Feb 2 08:04:28 np0005604725 podman[64401]: 2026-02-02 08:04:28.45951027 +0000 UTC m=+0.113292798 container create fba121e3223ccdbcfd06097e58006fcf9f43197b3863b3ff79c2969ad84ed747 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata_init_logs, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step2, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, url=https://www.redhat.com, tcib_managed=true, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., architecture=x86_64, com.redhat.component=openstack-nova-api-container, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z']}, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.openshift.expose-services=, build-date=2026-01-12T23:31:50Z, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_metadata_init_logs, vcs-type=git, distribution-scope=public, maintainer=OpenStack TripleO Team) Feb 2 08:04:28 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ffd6d5fe343e0380533e0f0168794c4eae0a3d560be5ff19d484e3f879237aea/merged/var/log/nova supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:28 np0005604725 podman[64400]: 2026-02-02 08:04:28.476530714 +0000 UTC m=+0.134158698 container init b075d1446ddb8161832b3e9007665c51c39014480fb58636df12c3b59725da84 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor_init_log, org.opencontainers.image.created=2026-01-12T23:32:18Z, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 nova-conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, distribution-scope=public, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 nova-conductor, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z']}, name=rhosp-rhel9/openstack-nova-conductor, architecture=x86_64, container_name=nova_conductor_init_log, io.openshift.expose-services=, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., config_id=tripleo_step2, build-date=2026-01-12T23:32:18Z, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, batch=17.1_20260112.1, managed_by=tripleo_ansible, io.buildah.version=1.41.5, release=1766032510, com.redhat.component=openstack-nova-conductor-container, vcs-type=git) Feb 2 08:04:28 np0005604725 podman[64400]: 2026-02-02 08:04:28.376745326 +0000 UTC m=+0.034373300 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 Feb 2 08:04:28 np0005604725 podman[64400]: 2026-02-02 08:04:28.482216336 +0000 UTC m=+0.139844310 container start b075d1446ddb8161832b3e9007665c51c39014480fb58636df12c3b59725da84 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor_init_log, io.openshift.expose-services=, architecture=x86_64, container_name=nova_conductor_init_log, config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, vcs-type=git, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, release=1766032510, version=17.1.13, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-conductor, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, build-date=2026-01-12T23:32:18Z, org.opencontainers.image.created=2026-01-12T23:32:18Z, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-nova-conductor, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-conductor-container, managed_by=tripleo_ansible, config_id=tripleo_step2, description=Red Hat OpenStack Platform 17.1 nova-conductor, url=https://www.redhat.com, distribution-scope=public) Feb 2 08:04:28 np0005604725 python3[63526]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name nova_conductor_init_log --conmon-pidfile /run/nova_conductor_init_log.pid --detach=True --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --label config_id=tripleo_step2 --label container_name=nova_conductor_init_log --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/nova_conductor_init_log.log --network none --privileged=False --user root --volume /var/log/containers/nova:/var/log/nova:z registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 /bin/bash -c chown -R nova:nova /var/log/nova Feb 2 08:04:28 np0005604725 systemd[1]: Started libpod-conmon-fba121e3223ccdbcfd06097e58006fcf9f43197b3863b3ff79c2969ad84ed747.scope. Feb 2 08:04:28 np0005604725 systemd[1]: libpod-b075d1446ddb8161832b3e9007665c51c39014480fb58636df12c3b59725da84.scope: Deactivated successfully. Feb 2 08:04:28 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/35bf294d1d9727b945d00c2435b9ff207047dce46bec3b5b989c97a1e2e93487/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/35bf294d1d9727b945d00c2435b9ff207047dce46bec3b5b989c97a1e2e93487/merged/var/log/nova supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:28 np0005604725 podman[64401]: 2026-02-02 08:04:28.509124539 +0000 UTC m=+0.162907067 container init fba121e3223ccdbcfd06097e58006fcf9f43197b3863b3ff79c2969ad84ed747 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata_init_logs, managed_by=tripleo_ansible, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-api, config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, release=1766032510, name=rhosp-rhel9/openstack-nova-api, container_name=nova_metadata_init_logs, build-date=2026-01-12T23:31:50Z, io.buildah.version=1.41.5, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step2, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, distribution-scope=public, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, tcib_managed=true, com.redhat.component=openstack-nova-api-container, url=https://www.redhat.com, vendor=Red Hat, Inc.) Feb 2 08:04:28 np0005604725 podman[64401]: 2026-02-02 08:04:28.514655537 +0000 UTC m=+0.168438065 container start fba121e3223ccdbcfd06097e58006fcf9f43197b3863b3ff79c2969ad84ed747 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata_init_logs, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp-rhel9/openstack-nova-api, build-date=2026-01-12T23:31:50Z, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-nova-api-container, config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z']}, description=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, architecture=x86_64, distribution-scope=public, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, release=1766032510, managed_by=tripleo_ansible, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vcs-type=git, container_name=nova_metadata_init_logs, config_id=tripleo_step2, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, batch=17.1_20260112.1) Feb 2 08:04:28 np0005604725 podman[64401]: 2026-02-02 08:04:28.430684157 +0000 UTC m=+0.084466705 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:04:28 np0005604725 python3[63526]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name nova_metadata_init_logs --conmon-pidfile /run/nova_metadata_init_logs.pid --detach=True --label config_id=tripleo_step2 --label container_name=nova_metadata_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/nova_metadata_init_logs.log --network none --privileged=False --user root --volume /var/log/containers/nova:/var/log/nova:z --volume /var/log/containers/httpd/nova-metadata:/var/log/httpd:z registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 /bin/bash -c chown -R nova:nova /var/log/nova Feb 2 08:04:28 np0005604725 systemd[1]: libpod-fba121e3223ccdbcfd06097e58006fcf9f43197b3863b3ff79c2969ad84ed747.scope: Deactivated successfully. Feb 2 08:04:28 np0005604725 podman[64463]: 2026-02-02 08:04:28.540627283 +0000 UTC m=+0.040181787 container died b075d1446ddb8161832b3e9007665c51c39014480fb58636df12c3b59725da84 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor_init_log, summary=Red Hat OpenStack Platform 17.1 nova-conductor, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-conductor-container, tcib_managed=true, config_id=tripleo_step2, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., container_name=nova_conductor_init_log, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, org.opencontainers.image.created=2026-01-12T23:32:18Z, version=17.1.13, config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z']}, name=rhosp-rhel9/openstack-nova-conductor, vcs-type=git, url=https://www.redhat.com, io.openshift.expose-services=, managed_by=tripleo_ansible, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-conductor, build-date=2026-01-12T23:32:18Z, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, distribution-scope=public) Feb 2 08:04:28 np0005604725 podman[64483]: 2026-02-02 08:04:28.561211195 +0000 UTC m=+0.033266967 container died fba121e3223ccdbcfd06097e58006fcf9f43197b3863b3ff79c2969ad84ed747 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata_init_logs, architecture=x86_64, io.openshift.expose-services=, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z']}, maintainer=OpenStack TripleO Team, config_id=tripleo_step2, com.redhat.component=openstack-nova-api-container, version=17.1.13, name=rhosp-rhel9/openstack-nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_metadata_init_logs, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.buildah.version=1.41.5, distribution-scope=public, build-date=2026-01-12T23:31:50Z, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:04:28 np0005604725 podman[64487]: 2026-02-02 08:04:28.584954403 +0000 UTC m=+0.053162898 container cleanup fba121e3223ccdbcfd06097e58006fcf9f43197b3863b3ff79c2969ad84ed747 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata_init_logs, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, batch=17.1_20260112.1, vendor=Red Hat, Inc., build-date=2026-01-12T23:31:50Z, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_metadata_init_logs, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T23:31:50Z, tcib_managed=true, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-nova-api-container, name=rhosp-rhel9/openstack-nova-api, version=17.1.13, io.buildah.version=1.41.5, config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z']}, config_id=tripleo_step2, url=https://www.redhat.com, architecture=x86_64, distribution-scope=public) Feb 2 08:04:28 np0005604725 systemd[1]: libpod-conmon-fba121e3223ccdbcfd06097e58006fcf9f43197b3863b3ff79c2969ad84ed747.scope: Deactivated successfully. Feb 2 08:04:28 np0005604725 podman[64449]: 2026-02-02 08:04:28.591876573 +0000 UTC m=+0.118569847 container create b288bd57b01a77ad45fe13a1265d05a284c10505f50120faad9d11b335e76bbc (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_wait_bundle, distribution-scope=public, io.openshift.expose-services=, com.redhat.component=openstack-rabbitmq-container, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:14Z, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:14Z, summary=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, release=1766032510, config_data={'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,rabbitmq_policy,rabbitmq_user,rabbitmq_ready', 'include tripleo::profile::pacemaker::rabbitmq_bundle', ''], 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/bin/true:/bin/epmd']}, container_name=rabbitmq_wait_bundle, config_id=tripleo_step2, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp-rhel9/openstack-rabbitmq, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, version=17.1.13) Feb 2 08:04:28 np0005604725 podman[64449]: 2026-02-02 08:04:28.509020906 +0000 UTC m=+0.035714180 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Feb 2 08:04:28 np0005604725 systemd[1]: Started libpod-conmon-b288bd57b01a77ad45fe13a1265d05a284c10505f50120faad9d11b335e76bbc.scope. Feb 2 08:04:28 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d6cf97c485da9aa6dedb51c68c2983691546258f9414ab1360f1ac73f6de507d/merged/usr/lib64/erlang/erts-12.3.2.2/bin/epmd supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:28 np0005604725 podman[64449]: 2026-02-02 08:04:28.630916573 +0000 UTC m=+0.157609837 container init b288bd57b01a77ad45fe13a1265d05a284c10505f50120faad9d11b335e76bbc (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_wait_bundle, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, container_name=rabbitmq_wait_bundle, config_id=tripleo_step2, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 rabbitmq, config_data={'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,rabbitmq_policy,rabbitmq_user,rabbitmq_ready', 'include tripleo::profile::pacemaker::rabbitmq_bundle', ''], 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/bin/true:/bin/epmd']}, summary=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp-rhel9/openstack-rabbitmq, org.opencontainers.image.created=2026-01-12T22:10:14Z, url=https://www.redhat.com, build-date=2026-01-12T22:10:14Z, architecture=x86_64, managed_by=tripleo_ansible, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, com.redhat.component=openstack-rabbitmq-container, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, version=17.1.13, vendor=Red Hat, Inc.) Feb 2 08:04:28 np0005604725 podman[64449]: 2026-02-02 08:04:28.638083959 +0000 UTC m=+0.164777233 container start b288bd57b01a77ad45fe13a1265d05a284c10505f50120faad9d11b335e76bbc (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_wait_bundle, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 rabbitmq, config_id=tripleo_step2, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-rabbitmq, tcib_managed=true, config_data={'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,rabbitmq_policy,rabbitmq_user,rabbitmq_ready', 'include tripleo::profile::pacemaker::rabbitmq_bundle', ''], 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/bin/true:/bin/epmd']}, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, release=1766032510, maintainer=OpenStack TripleO Team, container_name=rabbitmq_wait_bundle, vcs-type=git, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, com.redhat.component=openstack-rabbitmq-container, build-date=2026-01-12T22:10:14Z, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:04:28 np0005604725 podman[64449]: 2026-02-02 08:04:28.638343218 +0000 UTC m=+0.165036502 container attach b288bd57b01a77ad45fe13a1265d05a284c10505f50120faad9d11b335e76bbc (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_wait_bundle, summary=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2026-01-12T22:10:14Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, container_name=rabbitmq_wait_bundle, vcs-type=git, managed_by=tripleo_ansible, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-rabbitmq, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-rabbitmq-container, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:10:14Z, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, version=17.1.13, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, config_data={'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,rabbitmq_policy,rabbitmq_user,rabbitmq_ready', 'include tripleo::profile::pacemaker::rabbitmq_bundle', ''], 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/bin/true:/bin/epmd']}, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step2, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:04:28 np0005604725 podman[64465]: 2026-02-02 08:04:28.719901885 +0000 UTC m=+0.222605284 container cleanup b075d1446ddb8161832b3e9007665c51c39014480fb58636df12c3b59725da84 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor_init_log, distribution-scope=public, release=1766032510, tcib_managed=true, io.buildah.version=1.41.5, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, url=https://www.redhat.com, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 nova-conductor, config_id=tripleo_step2, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, config_data={'command': ['/bin/bash', '-c', 'chown -R nova:nova /var/log/nova'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/nova:/var/log/nova:z']}, build-date=2026-01-12T23:32:18Z, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-nova-conductor-container, managed_by=tripleo_ansible, version=17.1.13, org.opencontainers.image.created=2026-01-12T23:32:18Z, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=nova_conductor_init_log, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-conductor, name=rhosp-rhel9/openstack-nova-conductor, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1) Feb 2 08:04:28 np0005604725 systemd[1]: libpod-conmon-b075d1446ddb8161832b3e9007665c51c39014480fb58636df12c3b59725da84.scope: Deactivated successfully. Feb 2 08:04:29 np0005604725 systemd[1]: var-lib-containers-storage-overlay-ffd6d5fe343e0380533e0f0168794c4eae0a3d560be5ff19d484e3f879237aea-merged.mount: Deactivated successfully. Feb 2 08:04:29 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-b075d1446ddb8161832b3e9007665c51c39014480fb58636df12c3b59725da84-userdata-shm.mount: Deactivated successfully. Feb 2 08:04:30 np0005604725 systemd[1]: libpod-f933d0e33ce7d701ab942829e00836041acdf6308139f7a7ae1d8d436e6c7dfd.scope: Deactivated successfully. Feb 2 08:04:30 np0005604725 systemd[1]: libpod-f933d0e33ce7d701ab942829e00836041acdf6308139f7a7ae1d8d436e6c7dfd.scope: Consumed 2.839s CPU time. Feb 2 08:04:31 np0005604725 podman[64084]: 2026-02-02 08:04:31.001878429 +0000 UTC m=+3.110814262 container died f933d0e33ce7d701ab942829e00836041acdf6308139f7a7ae1d8d436e6c7dfd (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_wait_bundle, build-date=2026-01-12T22:10:18Z, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 mariadb, container_name=mysql_wait_bundle, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, batch=17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, release=1766032510, vcs-type=git, config_id=tripleo_step2, name=rhosp-rhel9/openstack-mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'd1309b2578c29eaa98f7da1cd8d204bd'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/mysql:/var/lib/mysql:rw,z', '/var/lib/config-data/puppet-generated/mysql/root:/root:rw']}) Feb 2 08:04:31 np0005604725 systemd[1]: tmp-crun.bXFD3k.mount: Deactivated successfully. Feb 2 08:04:31 np0005604725 systemd[1]: var-lib-containers-storage-overlay-2eb15d9b1b1852fa6f040d12038de7fff7f6682794f01da741576c21ef93c2bc-merged.mount: Deactivated successfully. Feb 2 08:04:31 np0005604725 podman[64800]: 2026-02-02 08:04:31.104256796 +0000 UTC m=+0.093673235 container cleanup f933d0e33ce7d701ab942829e00836041acdf6308139f7a7ae1d8d436e6c7dfd (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_wait_bundle, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, config_data={'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'd1309b2578c29eaa98f7da1cd8d204bd'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/mysql:/var/lib/mysql:rw,z', '/var/lib/config-data/puppet-generated/mysql/root:/root:rw']}, description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-mariadb, architecture=x86_64, vendor=Red Hat, Inc., io.buildah.version=1.41.5, config_id=tripleo_step2, distribution-scope=public, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, com.redhat.component=openstack-mariadb-container, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:18Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, release=1766032510, build-date=2026-01-12T22:10:18Z, container_name=mysql_wait_bundle, tcib_managed=true) Feb 2 08:04:31 np0005604725 systemd[1]: libpod-conmon-f933d0e33ce7d701ab942829e00836041acdf6308139f7a7ae1d8d436e6c7dfd.scope: Deactivated successfully. Feb 2 08:04:31 np0005604725 python3[63526]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name mysql_wait_bundle --conmon-pidfile /run/mysql_wait_bundle.pid --detach=False --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --env TRIPLEO_CONFIG_HASH=d1309b2578c29eaa98f7da1cd8d204bd --ipc host --label config_id=tripleo_step2 --label container_name=mysql_wait_bundle --label managed_by=tripleo_ansible --label config_data={'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'd1309b2578c29eaa98f7da1cd8d204bd'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/mysql:/var/lib/mysql:rw,z', '/var/lib/config-data/puppet-generated/mysql/root:/root:rw']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/mysql_wait_bundle.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/mysql:/var/lib/mysql:rw,z --volume /var/lib/config-data/puppet-generated/mysql/root:/root:rw registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 /container_puppet_apply.sh 2 file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user include tripleo::profile::pacemaker::database::mysql_bundle Feb 2 08:04:32 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of start operation for ip-172.18.0.162 on np0005604725 Feb 2 08:04:32 np0005604725 IPaddr2(ip-172.18.0.162)[65117]: INFO: Adding inet address 172.18.0.162/32 with broadcast address 172.18.0.255 to device vlan21 Feb 2 08:04:32 np0005604725 IPaddr2(ip-172.18.0.162)[65117]: INFO: Bringing device vlan21 up Feb 2 08:04:32 np0005604725 IPaddr2(ip-172.18.0.162)[65117]: INFO: /usr/libexec/heartbeat/send_arp -i 200 -r 5 -p /run/resource-agents/send_arp-172.18.0.162 vlan21 172.18.0.162 auto not_used not_used Feb 2 08:04:32 np0005604725 pacemaker-controld[51065]: notice: Result of start operation for ip-172.18.0.162 on np0005604725: ok Feb 2 08:04:32 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for ip-172.18.0.162 on np0005604725 Feb 2 08:04:32 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for ip-172.18.0.162 on np0005604725: ok Feb 2 08:04:36 np0005604725 systemd[1]: libpod-b288bd57b01a77ad45fe13a1265d05a284c10505f50120faad9d11b335e76bbc.scope: Deactivated successfully. Feb 2 08:04:36 np0005604725 systemd[1]: libpod-b288bd57b01a77ad45fe13a1265d05a284c10505f50120faad9d11b335e76bbc.scope: Consumed 11.613s CPU time. Feb 2 08:04:36 np0005604725 podman[64449]: 2026-02-02 08:04:36.353760119 +0000 UTC m=+7.880453393 container died b288bd57b01a77ad45fe13a1265d05a284c10505f50120faad9d11b335e76bbc (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_wait_bundle, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 rabbitmq, config_data={'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,rabbitmq_policy,rabbitmq_user,rabbitmq_ready', 'include tripleo::profile::pacemaker::rabbitmq_bundle', ''], 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/bin/true:/bin/epmd']}, name=rhosp-rhel9/openstack-rabbitmq, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, managed_by=tripleo_ansible, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step2, build-date=2026-01-12T22:10:14Z, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., distribution-scope=public, com.redhat.component=openstack-rabbitmq-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, container_name=rabbitmq_wait_bundle, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, maintainer=OpenStack TripleO Team, version=17.1.13, release=1766032510) Feb 2 08:04:36 np0005604725 systemd[1]: var-lib-containers-storage-overlay-d6cf97c485da9aa6dedb51c68c2983691546258f9414ab1360f1ac73f6de507d-merged.mount: Deactivated successfully. Feb 2 08:04:36 np0005604725 podman[65736]: 2026-02-02 08:04:36.45131725 +0000 UTC m=+0.084785756 container cleanup b288bd57b01a77ad45fe13a1265d05a284c10505f50120faad9d11b335e76bbc (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_wait_bundle, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-rabbitmq, container_name=rabbitmq_wait_bundle, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, config_id=tripleo_step2, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, architecture=x86_64, config_data={'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,rabbitmq_policy,rabbitmq_user,rabbitmq_ready', 'include tripleo::profile::pacemaker::rabbitmq_bundle', ''], 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/bin/true:/bin/epmd']}, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20260112.1, release=1766032510, build-date=2026-01-12T22:10:14Z, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 rabbitmq) Feb 2 08:04:36 np0005604725 systemd[1]: libpod-conmon-b288bd57b01a77ad45fe13a1265d05a284c10505f50120faad9d11b335e76bbc.scope: Deactivated successfully. Feb 2 08:04:36 np0005604725 python3[63526]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name rabbitmq_wait_bundle --conmon-pidfile /run/rabbitmq_wait_bundle.pid --detach=False --env KOLLA_BOOTSTRAP=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --ipc host --label config_id=tripleo_step2 --label container_name=rabbitmq_wait_bundle --label managed_by=tripleo_ansible --label config_data={'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,rabbitmq_policy,rabbitmq_user,rabbitmq_ready', 'include tripleo::profile::pacemaker::rabbitmq_bundle', ''], 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/bin/true:/bin/epmd']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/rabbitmq_wait_bundle.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /var/lib/container-config-scripts/container_puppet_apply.sh:/container_puppet_apply.sh:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /bin/true:/bin/epmd registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 /container_puppet_apply.sh 2 file,file_line,concat,augeas,rabbitmq_policy,rabbitmq_user,rabbitmq_ready include tripleo::profile::pacemaker::rabbitmq_bundle Feb 2 08:04:36 np0005604725 IPaddr2(ip-172.18.0.162)[65117]: INFO: ARPING 172.18.0.162 from 172.18.0.162 vlan21#012Sent 5 probes (5 broadcast(s))#012Received 0 response(s) Feb 2 08:04:36 np0005604725 podman[65881]: 2026-02-02 08:04:36.860889936 +0000 UTC m=+0.076201075 container create 8c745d95b093e0dea21a56af74787cc8909c725e240bbebe45b00f27986b6bbf (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_init_log, vendor=Red Hat, Inc., release=1766032510, com.redhat.component=openstack-placement-api-container, vcs-ref=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, config_id=tripleo_step2, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, container_name=placement_init_log, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-placement-api, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, vcs-type=git, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:34:35Z, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 placement-api, version=17.1.13, config_data={'command': ['/bin/bash', '-c', 'chown -R placement:placement /var/log/placement'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z']}, build-date=2026-01-12T22:34:35Z, io.openshift.expose-services=) Feb 2 08:04:36 np0005604725 podman[65889]: 2026-02-02 08:04:36.886674586 +0000 UTC m=+0.086798746 container create 78ba5f54c0b532ee05557c6d667f1c5c9109c2c0dc34c7d63e03ba4ce81829f6 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_init_log, io.buildah.version=1.41.5, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, build-date=2026-01-12T22:33:53Z, release=1766032510, vendor=Red Hat, Inc., tcib_managed=true, name=rhosp-rhel9/openstack-keystone, batch=17.1_20260112.1, architecture=x86_64, com.redhat.component=openstack-keystone-container, container_name=keystone_init_log, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, io.openshift.expose-services=, config_id=tripleo_step2, version=17.1.13) Feb 2 08:04:36 np0005604725 systemd[1]: Started libpod-conmon-8c745d95b093e0dea21a56af74787cc8909c725e240bbebe45b00f27986b6bbf.scope. Feb 2 08:04:36 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:36 np0005604725 podman[65883]: 2026-02-02 08:04:36.902305308 +0000 UTC m=+0.105025887 container create ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, io.openshift.expose-services=, config_id=tripleo_step2, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, name=rhosp-rhel9/openstack-mariadb, release=1766032510, summary=Red Hat OpenStack Platform 17.1 mariadb, container_name=clustercheck, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:18Z, managed_by=tripleo_ansible, build-date=2026-01-12T22:10:18Z, vcs-type=git) Feb 2 08:04:36 np0005604725 systemd[1]: Started libpod-conmon-78ba5f54c0b532ee05557c6d667f1c5c9109c2c0dc34c7d63e03ba4ce81829f6.scope. Feb 2 08:04:36 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/f4f510323614f8c5a49d99708f5d430759f89ae3135d950bfbe48630ed90a6b9/merged/var/log/placement supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:36 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/f4f510323614f8c5a49d99708f5d430759f89ae3135d950bfbe48630ed90a6b9/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:36 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:36 np0005604725 podman[65881]: 2026-02-02 08:04:36.913678983 +0000 UTC m=+0.128990132 container init 8c745d95b093e0dea21a56af74787cc8909c725e240bbebe45b00f27986b6bbf (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_init_log, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, config_data={'command': ['/bin/bash', '-c', 'chown -R placement:placement /var/log/placement'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z']}, name=rhosp-rhel9/openstack-placement-api, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, com.redhat.component=openstack-placement-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=placement_init_log, io.openshift.expose-services=, version=17.1.13, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:34:35Z, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step2, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., release=1766032510, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, build-date=2026-01-12T22:34:35Z) Feb 2 08:04:36 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/45c363b3161044e3ca2b8bddfa2f6fb8230d5caba2c7be3479e75673b5fbb568/merged/var/log/keystone supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:36 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/45c363b3161044e3ca2b8bddfa2f6fb8230d5caba2c7be3479e75673b5fbb568/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:36 np0005604725 podman[65881]: 2026-02-02 08:04:36.920183629 +0000 UTC m=+0.135494768 container start 8c745d95b093e0dea21a56af74787cc8909c725e240bbebe45b00f27986b6bbf (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_init_log, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, distribution-scope=public, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-placement-api-container, version=17.1.13, config_id=tripleo_step2, org.opencontainers.image.created=2026-01-12T22:34:35Z, config_data={'command': ['/bin/bash', '-c', 'chown -R placement:placement /var/log/placement'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z']}, name=rhosp-rhel9/openstack-placement-api, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:35Z, tcib_managed=true, architecture=x86_64, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 placement-api, url=https://www.redhat.com, vcs-type=git, container_name=placement_init_log, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:04:36 np0005604725 podman[65881]: 2026-02-02 08:04:36.821247968 +0000 UTC m=+0.036559117 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Feb 2 08:04:36 np0005604725 podman[65889]: 2026-02-02 08:04:36.922473049 +0000 UTC m=+0.122597219 container init 78ba5f54c0b532ee05557c6d667f1c5c9109c2c0dc34c7d63e03ba4ce81829f6 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_init_log, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, name=rhosp-rhel9/openstack-keystone, architecture=x86_64, url=https://www.redhat.com, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, release=1766032510, org.opencontainers.image.created=2026-01-12T22:33:53Z, com.redhat.component=openstack-keystone-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step2, version=17.1.13, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:33:53Z, container_name=keystone_init_log, maintainer=OpenStack TripleO Team, config_data={'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git) Feb 2 08:04:36 np0005604725 systemd[1]: libpod-8c745d95b093e0dea21a56af74787cc8909c725e240bbebe45b00f27986b6bbf.scope: Deactivated successfully. Feb 2 08:04:36 np0005604725 systemd[1]: Started libpod-conmon-ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.scope. Feb 2 08:04:36 np0005604725 python3[63526]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name placement_init_log --conmon-pidfile /run/placement_init_log.pid --detach=True --label config_id=tripleo_step2 --label container_name=placement_init_log --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R placement:placement /var/log/placement'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/placement_init_log.log --network none --user root --volume /var/log/containers/placement:/var/log/placement:z --volume /var/log/containers/httpd/placement:/var/log/httpd:z registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 /bin/bash -c chown -R placement:placement /var/log/placement Feb 2 08:04:36 np0005604725 podman[65889]: 2026-02-02 08:04:36.927887173 +0000 UTC m=+0.128011333 container start 78ba5f54c0b532ee05557c6d667f1c5c9109c2c0dc34c7d63e03ba4ce81829f6 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_init_log, url=https://www.redhat.com, config_id=tripleo_step2, org.opencontainers.image.created=2026-01-12T22:33:53Z, description=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:33:53Z, io.buildah.version=1.41.5, managed_by=tripleo_ansible, tcib_managed=true, name=rhosp-rhel9/openstack-keystone, container_name=keystone_init_log, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, release=1766032510, io.openshift.expose-services=, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-keystone-container, maintainer=OpenStack TripleO Team, config_data={'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']}, summary=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:04:36 np0005604725 podman[65889]: 2026-02-02 08:04:36.83622245 +0000 UTC m=+0.036346640 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Feb 2 08:04:36 np0005604725 python3[63526]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name keystone_init_log --conmon-pidfile /run/keystone_init_log.pid --detach=True --label config_id=tripleo_step2 --label container_name=keystone_init_log --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/keystone_init_log.log --network none --user root --volume /var/log/containers/keystone:/var/log/keystone:z --volume /var/log/containers/httpd/keystone:/var/log/httpd:z registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 /bin/bash -c chown -R keystone:keystone /var/log/keystone Feb 2 08:04:36 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:36 np0005604725 systemd[1]: libpod-78ba5f54c0b532ee05557c6d667f1c5c9109c2c0dc34c7d63e03ba4ce81829f6.scope: Deactivated successfully. Feb 2 08:04:36 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/91ceb5f6a2ca46bb138b87a37d1d0b2425ade9251125cac2a02827e9d4ad02bd/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:36 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/91ceb5f6a2ca46bb138b87a37d1d0b2425ade9251125cac2a02827e9d4ad02bd/merged/var/lib/kolla/config_files/config.json supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:36 np0005604725 podman[65883]: 2026-02-02 08:04:36.837125657 +0000 UTC m=+0.039846236 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Feb 2 08:04:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:04:36 np0005604725 podman[65883]: 2026-02-02 08:04:36.958771027 +0000 UTC m=+0.161491616 container init ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, release=1766032510, distribution-scope=public, version=17.1.13, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, vcs-type=git, url=https://www.redhat.com, vendor=Red Hat, Inc., config_id=tripleo_step2, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=clustercheck, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, build-date=2026-01-12T22:10:18Z, io.openshift.expose-services=, name=rhosp-rhel9/openstack-mariadb, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:04:36 np0005604725 podman[65939]: 2026-02-02 08:04:36.976595275 +0000 UTC m=+0.041015691 container died 8c745d95b093e0dea21a56af74787cc8909c725e240bbebe45b00f27986b6bbf (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_init_log, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., release=1766032510, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 placement-api, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-placement-api, org.opencontainers.image.created=2026-01-12T22:34:35Z, architecture=x86_64, config_id=tripleo_step2, build-date=2026-01-12T22:34:35Z, config_data={'command': ['/bin/bash', '-c', 'chown -R placement:placement /var/log/placement'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z']}, vcs-ref=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, io.openshift.expose-services=, distribution-scope=public, container_name=placement_init_log, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-placement-api-container, summary=Red Hat OpenStack Platform 17.1 placement-api) Feb 2 08:04:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:04:36 np0005604725 podman[65939]: 2026-02-02 08:04:36.995979372 +0000 UTC m=+0.060399768 container cleanup 8c745d95b093e0dea21a56af74787cc8909c725e240bbebe45b00f27986b6bbf (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_init_log, description=Red Hat OpenStack Platform 17.1 placement-api, name=rhosp-rhel9/openstack-placement-api, com.redhat.component=openstack-placement-api-container, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:34:35Z, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, url=https://www.redhat.com, tcib_managed=true, managed_by=tripleo_ansible, distribution-scope=public, container_name=placement_init_log, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:34:35Z, config_id=tripleo_step2, vcs-type=git, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, config_data={'command': ['/bin/bash', '-c', 'chown -R placement:placement /var/log/placement'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, architecture=x86_64) Feb 2 08:04:36 np0005604725 systemd[1]: libpod-conmon-8c745d95b093e0dea21a56af74787cc8909c725e240bbebe45b00f27986b6bbf.scope: Deactivated successfully. Feb 2 08:04:37 np0005604725 podman[65883]: 2026-02-02 08:04:37.03526076 +0000 UTC m=+0.237981319 container start ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, name=rhosp-rhel9/openstack-mariadb, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, release=1766032510, url=https://www.redhat.com, io.buildah.version=1.41.5, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, build-date=2026-01-12T22:10:18Z, org.opencontainers.image.created=2026-01-12T22:10:18Z, com.redhat.component=openstack-mariadb-container, architecture=x86_64, tcib_managed=true, config_id=tripleo_step2, container_name=clustercheck, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., version=17.1.13) Feb 2 08:04:37 np0005604725 python3[63526]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name clustercheck --conmon-pidfile /run/clustercheck.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=194706b4cbbff1d0d528056ff0c9c800 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step2 --label container_name=clustercheck --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/clustercheck.log --network host --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json --volume /var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro --volume /var/lib/mysql:/var/lib/mysql registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Feb 2 08:04:37 np0005604725 podman[65983]: 2026-02-02 08:04:37.05642787 +0000 UTC m=+0.069246025 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=starting, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, release=1766032510, name=rhosp-rhel9/openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, config_id=tripleo_step2, container_name=clustercheck, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, build-date=2026-01-12T22:10:18Z, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, com.redhat.component=openstack-mariadb-container, distribution-scope=public, io.openshift.expose-services=, tcib_managed=true, maintainer=OpenStack TripleO Team, version=17.1.13, url=https://www.redhat.com, batch=17.1_20260112.1, managed_by=tripleo_ansible, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5) Feb 2 08:04:37 np0005604725 podman[65941]: 2026-02-02 08:04:37.081407245 +0000 UTC m=+0.139463118 container died 78ba5f54c0b532ee05557c6d667f1c5c9109c2c0dc34c7d63e03ba4ce81829f6 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_init_log, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, name=rhosp-rhel9/openstack-keystone, distribution-scope=public, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, version=17.1.13, release=1766032510, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, build-date=2026-01-12T22:33:53Z, config_data={'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']}, config_id=tripleo_step2, description=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, batch=17.1_20260112.1, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=keystone_init_log, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-keystone-container, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:04:37 np0005604725 podman[65958]: 2026-02-02 08:04:37.150943818 +0000 UTC m=+0.197308278 container cleanup 78ba5f54c0b532ee05557c6d667f1c5c9109c2c0dc34c7d63e03ba4ce81829f6 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_init_log, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, managed_by=tripleo_ansible, container_name=keystone_init_log, config_data={'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']}, summary=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step2, io.openshift.expose-services=, url=https://www.redhat.com, vcs-type=git, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, architecture=x86_64, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-keystone-container, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:33:53Z, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:33:53Z, vendor=Red Hat, Inc.) Feb 2 08:04:37 np0005604725 systemd[1]: libpod-conmon-78ba5f54c0b532ee05557c6d667f1c5c9109c2c0dc34c7d63e03ba4ce81829f6.scope: Deactivated successfully. Feb 2 08:04:37 np0005604725 podman[65983]: 2026-02-02 08:04:37.185807543 +0000 UTC m=+0.198625758 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, com.redhat.component=openstack-mariadb-container, config_id=tripleo_step2, url=https://www.redhat.com, architecture=x86_64, distribution-scope=public, version=17.1.13, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, name=rhosp-rhel9/openstack-mariadb, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:18Z, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, container_name=clustercheck) Feb 2 08:04:37 np0005604725 podman[65983]: unhealthy Feb 2 08:04:37 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:04:37 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Failed with result 'exit-code'. Feb 2 08:04:37 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-78ba5f54c0b532ee05557c6d667f1c5c9109c2c0dc34c7d63e03ba4ce81829f6-userdata-shm.mount: Deactivated successfully. Feb 2 08:04:37 np0005604725 systemd[1]: var-lib-containers-storage-overlay-f4f510323614f8c5a49d99708f5d430759f89ae3135d950bfbe48630ed90a6b9-merged.mount: Deactivated successfully. Feb 2 08:04:37 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-8c745d95b093e0dea21a56af74787cc8909c725e240bbebe45b00f27986b6bbf-userdata-shm.mount: Deactivated successfully. Feb 2 08:04:37 np0005604725 python3[66092]: ansible-file Invoked with path=/etc/systemd/system/tripleo_clustercheck.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:04:38 np0005604725 python3[66108]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_clustercheck_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:04:38 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for ip-172.20.0.221 on np0005604725 Feb 2 08:04:38 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for ip-172.20.0.221 on np0005604725: not running Feb 2 08:04:38 np0005604725 python3[66169]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019478.0880525-124113-57487381576661/source dest=/etc/systemd/system/tripleo_clustercheck.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:04:39 np0005604725 python3[66227]: ansible-systemd Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Feb 2 08:04:39 np0005604725 systemd[1]: Reloading. Feb 2 08:04:39 np0005604725 systemd-rc-local-generator[66252]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:04:39 np0005604725 systemd-sysv-generator[66257]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:04:39 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:04:39 np0005604725 python3[66279]: ansible-systemd Invoked with state=restarted name=tripleo_clustercheck.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:04:39 np0005604725 systemd[1]: Reloading. Feb 2 08:04:40 np0005604725 systemd-rc-local-generator[66309]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:04:40 np0005604725 systemd-sysv-generator[66313]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:04:40 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:04:40 np0005604725 systemd[1]: Starting clustercheck container... Feb 2 08:04:40 np0005604725 systemd[1]: Started clustercheck container. Feb 2 08:04:40 np0005604725 python3[66358]: ansible-file Invoked with path=/var/lib/container-puppet/container-puppet-tasks2.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:04:42 np0005604725 python3[66521]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=True puppet_config=/var/lib/container-puppet/container-puppet-tasks2.json short_hostname=np0005604725 step=2 update_config_hash_only=False Feb 2 08:04:42 np0005604725 python3[66545]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:04:43 np0005604725 python3[66595]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_2 config_pattern=container-puppet-*.json config_overrides={} debug=True Feb 2 08:04:44 np0005604725 sshd[66596]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:04:47 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for haproxy-bundle-podman-0 on np0005604725 Feb 2 08:04:47 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for haproxy-bundle-podman-1 on np0005604725 Feb 2 08:04:47 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for haproxy-bundle-podman-2 on np0005604725 Feb 2 08:04:47 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for haproxy-bundle-podman-0 on np0005604725: not running Feb 2 08:04:48 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for haproxy-bundle-podman-1 on np0005604725: not running Feb 2 08:04:48 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for haproxy-bundle-podman-2 on np0005604725: not running Feb 2 08:04:48 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:04:48 np0005604725 systemd[1]: tmp-crun.DCuwjS.mount: Deactivated successfully. Feb 2 08:04:48 np0005604725 podman[66651]: 2026-02-02 08:04:48.799317574 +0000 UTC m=+0.087841638 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, name=rhosp-rhel9/openstack-memcached, summary=Red Hat OpenStack Platform 17.1 memcached, description=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:12:26Z, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:12:26Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, vendor=Red Hat, Inc., url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-memcached-container, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, managed_by=tripleo_ansible, container_name=memcached, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, batch=17.1_20260112.1, distribution-scope=public, vcs-type=git, io.buildah.version=1.41.5) Feb 2 08:04:48 np0005604725 podman[66651]: 2026-02-02 08:04:48.822927908 +0000 UTC m=+0.111452042 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, batch=17.1_20260112.1, url=https://www.redhat.com, managed_by=tripleo_ansible, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, release=1766032510, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:12:26Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., container_name=memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, tcib_managed=true, vcs-type=git, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, com.redhat.component=openstack-memcached-container, version=17.1.13, name=rhosp-rhel9/openstack-memcached, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:04:48 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:04:50 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:04:50 np0005604725 podman[66675]: 2026-02-02 08:04:50.308666141 +0000 UTC m=+0.060677816 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, container_name=metrics_qdr, vendor=Red Hat, Inc., managed_by=tripleo_ansible, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-qdrouterd, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-qdrouterd-container, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.13, batch=17.1_20260112.1, build-date=2026-01-12T22:10:14Z, io.buildah.version=1.41.5) Feb 2 08:04:50 np0005604725 podman[66675]: 2026-02-02 08:04:50.493972195 +0000 UTC m=+0.245983890 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr, org.opencontainers.image.created=2026-01-12T22:10:14Z, url=https://www.redhat.com, com.redhat.component=openstack-qdrouterd-container, build-date=2026-01-12T22:10:14Z, name=rhosp-rhel9/openstack-qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, distribution-scope=public, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, vendor=Red Hat, Inc., io.openshift.expose-services=, version=17.1.13) Feb 2 08:04:50 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:04:52 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of start operation for haproxy-bundle-podman-1 on np0005604725 Feb 2 08:04:52 np0005604725 podman(haproxy-bundle-podman-1)[66750]: INFO: running container haproxy-bundle-podman-1 for the first time Feb 2 08:04:52 np0005604725 podman[66797]: 2026-02-02 08:04:52.747749738 +0000 UTC m=+0.077215297 container create 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, vcs-type=git, vendor=Red Hat, Inc., version=17.1.13, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 haproxy, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, build-date=2026-01-12T22:10:12Z, architecture=x86_64, com.redhat.component=openstack-haproxy-container, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:12Z, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 haproxy) Feb 2 08:04:52 np0005604725 systemd[1]: tmp-crun.ISRJqD.mount: Deactivated successfully. Feb 2 08:04:52 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:04:52 np0005604725 podman[66797]: 2026-02-02 08:04:52.712515412 +0000 UTC m=+0.041980991 image pull cluster.common.tag/haproxy:pcmklatest Feb 2 08:04:52 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ef6a27d541850d87aad661cdfd3ac93897e174b96624d1d99b02609b91cf7381/merged/var/lib/haproxy supports timestamps until 2038 (0x7fffffff) Feb 2 08:04:52 np0005604725 podman[66797]: 2026-02-02 08:04:52.824347944 +0000 UTC m=+0.153813503 container init 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:12Z, url=https://www.redhat.com, name=rhosp-rhel9/openstack-haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, build-date=2026-01-12T22:10:12Z, description=Red Hat OpenStack Platform 17.1 haproxy, vendor=Red Hat, Inc., io.openshift.expose-services=, com.redhat.component=openstack-haproxy-container, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, distribution-scope=public, tcib_managed=true, version=17.1.13, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:04:52 np0005604725 podman[66797]: 2026-02-02 08:04:52.832552022 +0000 UTC m=+0.162017581 container start 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, batch=17.1_20260112.1, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-haproxy-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, distribution-scope=public, name=rhosp-rhel9/openstack-haproxy, url=https://www.redhat.com, tcib_managed=true, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:12Z, build-date=2026-01-12T22:10:12Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, vendor=Red Hat, Inc., architecture=x86_64, description=Red Hat OpenStack Platform 17.1 haproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy) Feb 2 08:04:52 np0005604725 podman(haproxy-bundle-podman-1)[66750]: INFO: 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 Feb 2 08:04:52 np0005604725 podman(haproxy-bundle-podman-1)[66750]: INFO: Creating drop-in dependency for "haproxy-bundle-podman-1" (7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65) Feb 2 08:04:52 np0005604725 systemd[1]: Reloading. Feb 2 08:04:53 np0005604725 systemd-rc-local-generator[66929]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:04:53 np0005604725 systemd-sysv-generator[66932]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:04:53 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:04:53 np0005604725 podman[66939]: 2026-02-02 08:04:53.349056333 +0000 UTC m=+0.092175938 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, summary=Red Hat OpenStack Platform 17.1 haproxy, architecture=x86_64, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, name=rhosp-rhel9/openstack-haproxy, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:12Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, vendor=Red Hat, Inc., io.openshift.expose-services=, release=1766032510, description=Red Hat OpenStack Platform 17.1 haproxy, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-haproxy-container) Feb 2 08:04:53 np0005604725 podman[66939]: 2026-02-02 08:04:53.377860305 +0000 UTC m=+0.120979920 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, description=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, com.redhat.component=openstack-haproxy-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:12Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, vcs-type=git, build-date=2026-01-12T22:10:12Z, summary=Red Hat OpenStack Platform 17.1 haproxy, version=17.1.13, vendor=Red Hat, Inc., io.buildah.version=1.41.5, io.openshift.expose-services=, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-haproxy, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:04:53 np0005604725 podman[66968]: 2026-02-02 08:04:53.466944378 +0000 UTC m=+0.067464431 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, url=https://www.redhat.com, architecture=x86_64, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, com.redhat.component=openstack-haproxy-container, distribution-scope=public, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 haproxy, maintainer=OpenStack TripleO Team, tcib_managed=true, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, build-date=2026-01-12T22:10:12Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-haproxy, description=Red Hat OpenStack Platform 17.1 haproxy, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:12Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:04:53 np0005604725 podman[66968]: 2026-02-02 08:04:53.49443382 +0000 UTC m=+0.094953853 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 haproxy, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.created=2026-01-12T22:10:12Z, batch=17.1_20260112.1, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-haproxy, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, io.openshift.expose-services=, tcib_managed=true, com.redhat.component=openstack-haproxy-container, architecture=x86_64, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:12Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:04:53 np0005604725 podman(haproxy-bundle-podman-1)[66750]: NOTICE: Container haproxy-bundle-podman-1 started successfully Feb 2 08:04:53 np0005604725 pacemaker-controld[51065]: notice: Result of start operation for haproxy-bundle-podman-1 on np0005604725: ok Feb 2 08:04:53 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for haproxy-bundle-podman-1 on np0005604725 Feb 2 08:04:53 np0005604725 podman[67010]: 2026-02-02 08:04:53.611727307 +0000 UTC m=+0.071697689 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 haproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, architecture=x86_64, com.redhat.component=openstack-haproxy-container, name=rhosp-rhel9/openstack-haproxy, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.created=2026-01-12T22:10:12Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, io.buildah.version=1.41.5, io.openshift.expose-services=, tcib_managed=true, release=1766032510, version=17.1.13, build-date=2026-01-12T22:10:12Z) Feb 2 08:04:53 np0005604725 podman[67010]: 2026-02-02 08:04:53.642868839 +0000 UTC m=+0.102839191 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, io.openshift.expose-services=, io.buildah.version=1.41.5, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, org.opencontainers.image.created=2026-01-12T22:10:12Z, vendor=Red Hat, Inc., version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:10:12Z, summary=Red Hat OpenStack Platform 17.1 haproxy, name=rhosp-rhel9/openstack-haproxy, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, description=Red Hat OpenStack Platform 17.1 haproxy, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com) Feb 2 08:04:53 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for haproxy-bundle-podman-1 on np0005604725: ok Feb 2 08:05:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:05:07 np0005604725 systemd[1]: tmp-crun.Z7EhTf.mount: Deactivated successfully. Feb 2 08:05:07 np0005604725 podman[67479]: 2026-02-02 08:05:07.347333891 +0000 UTC m=+0.089904320 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=starting, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-mariadb, com.redhat.component=openstack-mariadb-container, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:18Z, container_name=clustercheck, summary=Red Hat OpenStack Platform 17.1 mariadb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, config_id=tripleo_step2, distribution-scope=public, managed_by=tripleo_ansible, release=1766032510, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:18Z, vendor=Red Hat, Inc.) Feb 2 08:05:07 np0005604725 podman[67479]: 2026-02-02 08:05:07.407046718 +0000 UTC m=+0.149617147 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:18Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-mariadb, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step2, vcs-type=git, io.openshift.expose-services=, tcib_managed=true, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, container_name=clustercheck, summary=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, managed_by=tripleo_ansible, build-date=2026-01-12T22:10:18Z, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:05:07 np0005604725 podman[67479]: unhealthy Feb 2 08:05:07 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:05:07 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Failed with result 'exit-code'. Feb 2 08:05:19 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:05:19 np0005604725 systemd[1]: tmp-crun.pjm15T.mount: Deactivated successfully. Feb 2 08:05:19 np0005604725 podman[67895]: 2026-02-02 08:05:19.339350014 +0000 UTC m=+0.087761918 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, distribution-scope=public, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, io.openshift.expose-services=, com.redhat.component=openstack-memcached-container, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:12:26Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, tcib_managed=true, url=https://www.redhat.com, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team) Feb 2 08:05:19 np0005604725 podman[67895]: 2026-02-02 08:05:19.362049655 +0000 UTC m=+0.110461569 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public, build-date=2026-01-12T22:12:26Z, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:12:26Z, tcib_managed=true, url=https://www.redhat.com, release=1766032510, batch=17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 memcached, version=17.1.13, io.openshift.expose-services=, config_id=tripleo_step1, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, architecture=x86_64, container_name=memcached, name=rhosp-rhel9/openstack-memcached, com.redhat.component=openstack-memcached-container, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, maintainer=OpenStack TripleO Team) Feb 2 08:05:19 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:05:21 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:05:21 np0005604725 systemd[1]: tmp-crun.3iH8GL.mount: Deactivated successfully. Feb 2 08:05:21 np0005604725 podman[68009]: 2026-02-02 08:05:21.332624147 +0000 UTC m=+0.085938277 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, build-date=2026-01-12T22:10:14Z, io.openshift.expose-services=, com.redhat.component=openstack-qdrouterd-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., container_name=metrics_qdr, summary=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, name=rhosp-rhel9/openstack-qdrouterd, batch=17.1_20260112.1, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, org.opencontainers.image.created=2026-01-12T22:10:14Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step1, maintainer=OpenStack TripleO Team, release=1766032510) Feb 2 08:05:21 np0005604725 podman[68009]: 2026-02-02 08:05:21.520537972 +0000 UTC m=+0.273852082 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, batch=17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, name=rhosp-rhel9/openstack-qdrouterd, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, build-date=2026-01-12T22:10:14Z, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5, container_name=metrics_qdr, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, vcs-type=git, tcib_managed=true, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-qdrouterd-container, io.openshift.expose-services=) Feb 2 08:05:21 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:05:37 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:05:38 np0005604725 podman[68592]: 2026-02-02 08:05:38.085603167 +0000 UTC m=+0.086686529 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=starting, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, io.buildah.version=1.41.5, io.openshift.expose-services=, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 mariadb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, config_id=tripleo_step2, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:18Z, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, vcs-type=git, container_name=clustercheck, url=https://www.redhat.com, name=rhosp-rhel9/openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:05:38 np0005604725 podman[68592]: 2026-02-02 08:05:38.143984801 +0000 UTC m=+0.145068163 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, batch=17.1_20260112.1, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step2, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=clustercheck, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:18Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:18Z, release=1766032510, description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}) Feb 2 08:05:38 np0005604725 podman[68592]: unhealthy Feb 2 08:05:38 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:05:38 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Failed with result 'exit-code'. Feb 2 08:05:50 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:05:50 np0005604725 podman[69020]: 2026-02-02 08:05:50.322669852 +0000 UTC m=+0.071500801 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, tcib_managed=true, release=1766032510, summary=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:12:26Z, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vendor=Red Hat, Inc., com.redhat.component=openstack-memcached-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, config_id=tripleo_step1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:12:26Z, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, vcs-type=git, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, url=https://www.redhat.com, name=rhosp-rhel9/openstack-memcached) Feb 2 08:05:50 np0005604725 podman[69020]: 2026-02-02 08:05:50.336488369 +0000 UTC m=+0.085319268 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, release=1766032510, summary=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, container_name=memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, tcib_managed=true, build-date=2026-01-12T22:12:26Z, com.redhat.component=openstack-memcached-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, vcs-type=git, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:05:50 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:05:52 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:05:52 np0005604725 podman[69137]: 2026-02-02 08:05:52.334517558 +0000 UTC m=+0.086445692 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, release=1766032510, batch=17.1_20260112.1, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, container_name=metrics_qdr, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, url=https://www.redhat.com, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:14Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step1, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, com.redhat.component=openstack-qdrouterd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, version=17.1.13) Feb 2 08:05:52 np0005604725 podman[69137]: 2026-02-02 08:05:52.523464036 +0000 UTC m=+0.275392210 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, summary=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, release=1766032510, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=metrics_qdr, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-qdrouterd, vendor=Red Hat, Inc., distribution-scope=public, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, maintainer=OpenStack TripleO Team, config_id=tripleo_step1, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, url=https://www.redhat.com, com.redhat.component=openstack-qdrouterd-container, org.opencontainers.image.created=2026-01-12T22:10:14Z, build-date=2026-01-12T22:10:14Z, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5, architecture=x86_64) Feb 2 08:05:52 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:05:53 np0005604725 podman[69238]: 2026-02-02 08:05:53.821684504 +0000 UTC m=+0.086338918 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, release=1766032510, name=rhosp-rhel9/openstack-haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vcs-type=git, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, url=https://www.redhat.com, com.redhat.component=openstack-haproxy-container, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 haproxy, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:12Z, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, description=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, maintainer=OpenStack TripleO Team) Feb 2 08:05:53 np0005604725 podman[69238]: 2026-02-02 08:05:53.856074706 +0000 UTC m=+0.120729140 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, summary=Red Hat OpenStack Platform 17.1 haproxy, build-date=2026-01-12T22:10:12Z, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, url=https://www.redhat.com, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, tcib_managed=true, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, com.redhat.component=openstack-haproxy-container, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-haproxy, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13) Feb 2 08:06:00 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for galera-bundle-podman-0 on np0005604725 Feb 2 08:06:00 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for galera-bundle-podman-1 on np0005604725 Feb 2 08:06:00 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for galera-bundle-podman-2 on np0005604725 Feb 2 08:06:00 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for galera-bundle-podman-2 on np0005604725: not running Feb 2 08:06:00 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for galera-bundle-podman-0 on np0005604725: not running Feb 2 08:06:00 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for galera-bundle-podman-1 on np0005604725: not running Feb 2 08:06:04 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of start operation for galera-bundle-podman-1 on np0005604725 Feb 2 08:06:05 np0005604725 podman(galera-bundle-podman-1)[69678]: INFO: running container galera-bundle-podman-1 for the first time Feb 2 08:06:05 np0005604725 podman[69734]: 2026-02-02 08:06:05.331627065 +0000 UTC m=+0.093461189 container create 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:18Z, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, distribution-scope=public, version=17.1.13, name=rhosp-rhel9/openstack-mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, io.openshift.expose-services=, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:18Z, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, com.redhat.component=openstack-mariadb-container) Feb 2 08:06:05 np0005604725 systemd[1]: tmp-crun.pvNsNw.mount: Deactivated successfully. Feb 2 08:06:05 np0005604725 podman[69734]: 2026-02-02 08:06:05.288964576 +0000 UTC m=+0.050798700 image pull cluster.common.tag/mariadb:pcmklatest Feb 2 08:06:05 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:06:05 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7c5623cded196b3c49d4ceae2e975dcfc09f18770c4c5aba06f8b114d9ca4939/merged/var/log/mariadb supports timestamps until 2038 (0x7fffffff) Feb 2 08:06:05 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7c5623cded196b3c49d4ceae2e975dcfc09f18770c4c5aba06f8b114d9ca4939/merged/var/log/mysql supports timestamps until 2038 (0x7fffffff) Feb 2 08:06:05 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7c5623cded196b3c49d4ceae2e975dcfc09f18770c4c5aba06f8b114d9ca4939/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Feb 2 08:06:05 np0005604725 podman[69734]: 2026-02-02 08:06:05.40915152 +0000 UTC m=+0.170985644 container init 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, url=https://www.redhat.com, build-date=2026-01-12T22:10:18Z, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, name=rhosp-rhel9/openstack-mariadb, com.redhat.component=openstack-mariadb-container, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=) Feb 2 08:06:05 np0005604725 podman[69734]: 2026-02-02 08:06:05.417605291 +0000 UTC m=+0.179439415 container start 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, distribution-scope=public, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, tcib_managed=true, vcs-type=git, name=rhosp-rhel9/openstack-mariadb, url=https://www.redhat.com, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-mariadb-container, summary=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, architecture=x86_64, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5) Feb 2 08:06:05 np0005604725 podman(galera-bundle-podman-1)[69678]: INFO: 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 Feb 2 08:06:05 np0005604725 pacemaker-remoted[2]: notice: Additional logging available in /var/log/pacemaker/pacemaker.log Feb 2 08:06:05 np0005604725 pacemaker-remoted[2]: notice: Starting Pacemaker remote executor Feb 2 08:06:05 np0005604725 podman(galera-bundle-podman-1)[69678]: INFO: Creating drop-in dependency for "galera-bundle-podman-1" (9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9) Feb 2 08:06:05 np0005604725 systemd[1]: Reloading. Feb 2 08:06:05 np0005604725 systemd-rc-local-generator[69834]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:06:05 np0005604725 systemd-sysv-generator[69837]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:06:05 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:06:05 np0005604725 podman[69843]: 2026-02-02 08:06:05.977353634 +0000 UTC m=+0.094184550 container exec 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, name=rhosp-rhel9/openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, version=17.1.13, architecture=x86_64, batch=17.1_20260112.1, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, vcs-type=git, url=https://www.redhat.com, io.buildah.version=1.41.5, com.redhat.component=openstack-mariadb-container, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.openshift.expose-services=, maintainer=OpenStack TripleO Team) Feb 2 08:06:06 np0005604725 podman[69843]: 2026-02-02 08:06:06.011056166 +0000 UTC m=+0.127887072 container exec_died 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, build-date=2026-01-12T22:10:18Z, release=1766032510, name=rhosp-rhel9/openstack-mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-mariadb-container, tcib_managed=true, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.buildah.version=1.41.5, architecture=x86_64, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:06:06 np0005604725 podman[69871]: 2026-02-02 08:06:06.13161467 +0000 UTC m=+0.096652656 container exec 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, batch=17.1_20260112.1, io.openshift.expose-services=, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:18Z, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, io.buildah.version=1.41.5, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510) Feb 2 08:06:06 np0005604725 podman[69871]: 2026-02-02 08:06:06.16495665 +0000 UTC m=+0.129994646 container exec_died 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, com.redhat.component=openstack-mariadb-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, vendor=Red Hat, Inc., architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, name=rhosp-rhel9/openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:18Z, batch=17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:06:06 np0005604725 podman(galera-bundle-podman-1)[69678]: NOTICE: Container galera-bundle-podman-1 started successfully Feb 2 08:06:06 np0005604725 pacemaker-controld[51065]: notice: Result of start operation for galera-bundle-podman-1 on np0005604725: ok Feb 2 08:06:06 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for galera-bundle-podman-1 on np0005604725 Feb 2 08:06:06 np0005604725 podman[69921]: 2026-02-02 08:06:06.295756922 +0000 UTC m=+0.077841716 container exec 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, com.redhat.component=openstack-mariadb-container, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, io.openshift.expose-services=, vendor=Red Hat, Inc., batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, tcib_managed=true, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:18Z, org.opencontainers.image.created=2026-01-12T22:10:18Z, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:06:06 np0005604725 podman[69921]: 2026-02-02 08:06:06.324311274 +0000 UTC m=+0.106396068 container exec_died 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, description=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, com.redhat.component=openstack-mariadb-container, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, release=1766032510, io.buildah.version=1.41.5, vendor=Red Hat, Inc., distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-mariadb, build-date=2026-01-12T22:10:18Z, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-type=git, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:06:06 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for galera-bundle-podman-1 on np0005604725: ok Feb 2 08:06:06 np0005604725 pacemaker-remoted[2]: warning: Could not read Pacemaker Remote key from default location /etc/pacemaker/authkey (or fallback location /etc/corosync/authkey): No such file or directory Feb 2 08:06:06 np0005604725 pacemaker-remoted[2]: warning: A cluster connection will not be possible until the key is available Feb 2 08:06:06 np0005604725 pacemaker-remoted[2]: notice: Pacemaker remote executor successfully started and accepting connections Feb 2 08:06:06 np0005604725 pacemaker-remoted[2]: notice: OCF resource agent search path is /usr/lib/ocf/resource.d Feb 2 08:06:08 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:06:08 np0005604725 systemd[1]: tmp-crun.keeFON.mount: Deactivated successfully. Feb 2 08:06:08 np0005604725 podman[69994]: 2026-02-02 08:06:08.345432596 +0000 UTC m=+0.095448110 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=unhealthy, release=1766032510, url=https://www.redhat.com, io.buildah.version=1.41.5, version=17.1.13, vendor=Red Hat, Inc., io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:18Z, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, architecture=x86_64, config_id=tripleo_step2, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, name=rhosp-rhel9/openstack-mariadb, managed_by=tripleo_ansible, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, container_name=clustercheck, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-mariadb-container, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:18Z, distribution-scope=public) Feb 2 08:06:08 np0005604725 podman[69994]: 2026-02-02 08:06:08.400949851 +0000 UTC m=+0.150965345 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, batch=17.1_20260112.1, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, managed_by=tripleo_ansible, architecture=x86_64, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, io.openshift.expose-services=, com.redhat.component=openstack-mariadb-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, version=17.1.13, config_id=tripleo_step2, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:18Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, vendor=Red Hat, Inc., container_name=clustercheck, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:18Z, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:06:08 np0005604725 podman[69994]: unhealthy Feb 2 08:06:08 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:06:08 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Failed with result 'exit-code'. Feb 2 08:06:10 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of stop operation for galera-bundle-podman-1 on np0005604725 Feb 2 08:06:10 np0005604725 podman[70088]: 2026-02-02 08:06:10.266346472 +0000 UTC m=+0.086417451 container exec 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, architecture=x86_64, build-date=2026-01-12T22:10:18Z, name=rhosp-rhel9/openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, version=17.1.13, com.redhat.component=openstack-mariadb-container, vcs-type=git, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc.) Feb 2 08:06:10 np0005604725 podman[70088]: 2026-02-02 08:06:10.298849617 +0000 UTC m=+0.118920536 container exec_died 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:18Z, tcib_managed=true, name=rhosp-rhel9/openstack-mariadb, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, release=1766032510, architecture=x86_64, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, io.openshift.expose-services=, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z) Feb 2 08:06:10 np0005604725 pacemaker-remoted[2]: notice: Caught 'Terminated' signal Feb 2 08:06:10 np0005604725 systemd[1]: libpod-9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9.scope: Deactivated successfully. Feb 2 08:06:10 np0005604725 systemd[1]: libpod-9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9.scope: Consumed 1.024s CPU time. Feb 2 08:06:10 np0005604725 podman[70118]: 2026-02-02 08:06:10.373512943 +0000 UTC m=+0.056363652 container died 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, batch=17.1_20260112.1, tcib_managed=true, io.openshift.expose-services=, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, distribution-scope=public, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-mariadb, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:18Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb) Feb 2 08:06:10 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9-userdata-shm.mount: Deactivated successfully. Feb 2 08:06:10 np0005604725 systemd[1]: var-lib-containers-storage-overlay-7c5623cded196b3c49d4ceae2e975dcfc09f18770c4c5aba06f8b114d9ca4939-merged.mount: Deactivated successfully. Feb 2 08:06:10 np0005604725 podman[70118]: 2026-02-02 08:06:10.408880926 +0000 UTC m=+0.091731635 container cleanup 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, distribution-scope=public, com.redhat.component=openstack-mariadb-container, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, build-date=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:18Z, name=rhosp-rhel9/openstack-mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, tcib_managed=true, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:06:10 np0005604725 podman[70145]: 2026-02-02 08:06:10.415761749 +0000 UTC m=+0.034522288 container cleanup 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, tcib_managed=true, name=rhosp-rhel9/openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, maintainer=OpenStack TripleO Team, version=17.1.13, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-mariadb-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:18Z, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:18Z, release=1766032510) Feb 2 08:06:10 np0005604725 podman(galera-bundle-podman-1)[70085]: INFO: galera-bundle-podman-1 Feb 2 08:06:10 np0005604725 podman(galera-bundle-podman-1)[70085]: NOTICE: Cleaning up inactive container, galera-bundle-podman-1. Feb 2 08:06:10 np0005604725 podman[70198]: 2026-02-02 08:06:10.599213746 +0000 UTC m=+0.080449727 container remove 9b63387befd6de4c41c992e98b6171ff81c11d97f26db0b232a41f31ee2c9ef9 (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, version=17.1.13, name=rhosp-rhel9/openstack-mariadb, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, build-date=2026-01-12T22:10:18Z) Feb 2 08:06:10 np0005604725 podman(galera-bundle-podman-1)[70085]: INFO: galera-bundle-podman-1 Feb 2 08:06:10 np0005604725 pacemaker-controld[51065]: notice: Result of stop operation for galera-bundle-podman-1 on np0005604725: ok Feb 2 08:06:10 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of start operation for galera-bundle-podman-1 on np0005604725 Feb 2 08:06:10 np0005604725 podman(galera-bundle-podman-1)[70222]: INFO: running container galera-bundle-podman-1 for the first time Feb 2 08:06:10 np0005604725 podman[70272]: 2026-02-02 08:06:10.938307532 +0000 UTC m=+0.084516812 container create 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, tcib_managed=true, batch=17.1_20260112.1, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, name=rhosp-rhel9/openstack-mariadb, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, io.buildah.version=1.41.5, version=17.1.13, build-date=2026-01-12T22:10:18Z, description=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.openshift.expose-services=) Feb 2 08:06:10 np0005604725 podman[70272]: 2026-02-02 08:06:10.890872957 +0000 UTC m=+0.037082237 image pull cluster.common.tag/mariadb:pcmklatest Feb 2 08:06:10 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:06:10 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/492de0472ef29c5344bb54e79c2f7633c50e79329cb1b310dcc36890b4534c25/merged/var/log supports timestamps until 2038 (0x7fffffff) Feb 2 08:06:10 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/492de0472ef29c5344bb54e79c2f7633c50e79329cb1b310dcc36890b4534c25/merged/var/log/mariadb supports timestamps until 2038 (0x7fffffff) Feb 2 08:06:10 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/492de0472ef29c5344bb54e79c2f7633c50e79329cb1b310dcc36890b4534c25/merged/var/log/mysql supports timestamps until 2038 (0x7fffffff) Feb 2 08:06:10 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/492de0472ef29c5344bb54e79c2f7633c50e79329cb1b310dcc36890b4534c25/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Feb 2 08:06:10 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/492de0472ef29c5344bb54e79c2f7633c50e79329cb1b310dcc36890b4534c25/merged/etc/pacemaker/authkey supports timestamps until 2038 (0x7fffffff) Feb 2 08:06:11 np0005604725 podman[70272]: 2026-02-02 08:06:11.005774157 +0000 UTC m=+0.151983407 container init 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, com.redhat.component=openstack-mariadb-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:18Z, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, release=1766032510, build-date=2026-01-12T22:10:18Z, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, distribution-scope=public) Feb 2 08:06:11 np0005604725 podman[70272]: 2026-02-02 08:06:11.013751733 +0000 UTC m=+0.159961013 container start 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, org.opencontainers.image.created=2026-01-12T22:10:18Z, vendor=Red Hat, Inc., url=https://www.redhat.com, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, io.openshift.expose-services=, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, release=1766032510, build-date=2026-01-12T22:10:18Z) Feb 2 08:06:11 np0005604725 podman(galera-bundle-podman-1)[70222]: INFO: 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f Feb 2 08:06:11 np0005604725 pacemaker-remoted[2]: warning: Logging to '/var/log/pacemaker/pacemaker.log' is disabled: No such file or directory Feb 2 08:06:11 np0005604725 pacemaker-remoted[2]: notice: Starting Pacemaker remote executor Feb 2 08:06:11 np0005604725 podman(galera-bundle-podman-1)[70222]: INFO: Creating drop-in dependency for "galera-bundle-podman-1" (760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f) Feb 2 08:06:11 np0005604725 systemd[1]: Reloading. Feb 2 08:06:11 np0005604725 pacemaker-remoted[2]: notice: Pacemaker remote executor successfully started and accepting connections Feb 2 08:06:11 np0005604725 pacemaker-remoted[2]: notice: OCF resource agent search path is /usr/lib/ocf/resource.d Feb 2 08:06:11 np0005604725 systemd-rc-local-generator[70347]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:06:11 np0005604725 systemd-sysv-generator[70350]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:06:11 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:06:11 np0005604725 podman[70420]: 2026-02-02 08:06:11.519915132 +0000 UTC m=+0.076385032 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.openshift.expose-services=, vendor=Red Hat, Inc., version=17.1.13, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, com.redhat.component=openstack-mariadb-container, name=rhosp-rhel9/openstack-mariadb, url=https://www.redhat.com, vcs-type=git, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, release=1766032510, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:06:11 np0005604725 podman[70420]: 2026-02-02 08:06:11.54869675 +0000 UTC m=+0.105166660 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, version=17.1.13, description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, architecture=x86_64, distribution-scope=public, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-mariadb, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:18Z, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, build-date=2026-01-12T22:10:18Z) Feb 2 08:06:11 np0005604725 podman[70458]: 2026-02-02 08:06:11.6587563 +0000 UTC m=+0.087871135 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, com.redhat.component=openstack-mariadb-container, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, release=1766032510, name=rhosp-rhel9/openstack-mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, architecture=x86_64, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, build-date=2026-01-12T22:10:18Z, vcs-type=git, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, tcib_managed=true, version=17.1.13, description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:06:11 np0005604725 podman[70458]: 2026-02-02 08:06:11.690974876 +0000 UTC m=+0.120089731 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, version=17.1.13, description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, architecture=x86_64, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, build-date=2026-01-12T22:10:18Z, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git) Feb 2 08:06:11 np0005604725 podman(galera-bundle-podman-1)[70222]: NOTICE: Container galera-bundle-podman-1 started successfully Feb 2 08:06:11 np0005604725 pacemaker-controld[51065]: notice: Result of start operation for galera-bundle-podman-1 on np0005604725: ok Feb 2 08:06:11 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for galera-bundle-podman-1 on np0005604725 Feb 2 08:06:11 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for galera-bundle-1 on np0005604725 Feb 2 08:06:11 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for galera-bundle-1 on np0005604725: not running (Remote connection inactive) Feb 2 08:06:11 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of start operation for galera-bundle-1 on np0005604725 Feb 2 08:06:11 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for galera-bundle-0 on np0005604725 Feb 2 08:06:11 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for galera-bundle-0 on np0005604725: not running (Remote connection inactive) Feb 2 08:06:11 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for galera-bundle-2 on np0005604725 Feb 2 08:06:11 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for galera-bundle-2 on np0005604725: not running (Remote connection inactive) Feb 2 08:06:11 np0005604725 podman[70506]: 2026-02-02 08:06:11.85876632 +0000 UTC m=+0.100374922 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:18Z, description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, vcs-type=git, com.redhat.component=openstack-mariadb-container, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.openshift.expose-services=, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, release=1766032510, name=rhosp-rhel9/openstack-mariadb, maintainer=OpenStack TripleO Team) Feb 2 08:06:11 np0005604725 podman[70506]: 2026-02-02 08:06:11.89208852 +0000 UTC m=+0.133697082 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, build-date=2026-01-12T22:10:18Z, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, url=https://www.redhat.com, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-mariadb-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, version=17.1.13, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, vendor=Red Hat, Inc.) Feb 2 08:06:11 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for galera-bundle-podman-1 on np0005604725: ok Feb 2 08:06:12 np0005604725 pacemaker-remoted[2]: notice: Remote client connection accepted Feb 2 08:06:12 np0005604725 pacemaker-controld[51065]: notice: Node galera-bundle-1 state is now member Feb 2 08:06:12 np0005604725 pacemaker-controld[51065]: notice: Result of start operation for galera-bundle-1 on np0005604725: ok Feb 2 08:06:12 np0005604725 pacemaker-attrd[51063]: notice: Removing all galera-bundle-1 attributes for peer np0005604725 Feb 2 08:06:12 np0005604725 pacemaker-fenced[51061]: notice: Node galera-bundle-1 state is now member Feb 2 08:06:12 np0005604725 pacemaker-attrd[51063]: notice: Removing all galera-bundle-0 attributes for peer np0005604723 Feb 2 08:06:12 np0005604725 pacemaker-fenced[51061]: notice: Node galera-bundle-0 state is now member Feb 2 08:06:12 np0005604725 pacemaker-attrd[51063]: notice: Removing all galera-bundle-2 attributes for peer np0005604726 Feb 2 08:06:12 np0005604725 pacemaker-fenced[51061]: notice: Node galera-bundle-2 state is now member Feb 2 08:06:12 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for galera-bundle-1 on np0005604725 Feb 2 08:06:12 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for galera on galera-bundle-1 Feb 2 08:06:12 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for galera-bundle-1 on np0005604725: ok Feb 2 08:06:12 np0005604725 galera(galera)[9]: INFO: MySQL is not running Feb 2 08:06:13 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for galera on galera-bundle-1: not running Feb 2 08:06:14 np0005604725 pacemaker-attrd[51063]: notice: Setting galera-no-grastate[np0005604723]: (unset) -> true Feb 2 08:06:15 np0005604725 pacemaker-attrd[51063]: notice: Setting galera-last-committed[np0005604723]: (unset) -> -1 Feb 2 08:06:18 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of start operation for galera on galera-bundle-1 Feb 2 08:06:18 np0005604725 galera(galera)[56]: ERROR: MySQL is not running Feb 2 08:06:18 np0005604725 galera(galera)[56]: INFO: Creating PID dir: /var/run/mysql Feb 2 08:06:19 np0005604725 galera(galera)[56]: INFO: attempting to detect last commit version by reading /var/lib/mysql/grastate.dat Feb 2 08:06:19 np0005604725 pacemaker-attrd[51063]: notice: Setting galera-no-grastate[np0005604725]: (unset) -> true Feb 2 08:06:19 np0005604725 galera(galera)[56]: INFO: now attempting to detect last commit version using 'mysqld_safe --wsrep-recover' Feb 2 08:06:20 np0005604725 galera(galera)[56]: INFO: Last commit version found: -1 Feb 2 08:06:20 np0005604725 pacemaker-attrd[51063]: notice: Setting galera-last-committed[np0005604725]: (unset) -> -1 Feb 2 08:06:21 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:06:21 np0005604725 systemd[1]: tmp-crun.uCwsJq.mount: Deactivated successfully. Feb 2 08:06:21 np0005604725 podman[71374]: 2026-02-02 08:06:21.34441847 +0000 UTC m=+0.094239543 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, description=Red Hat OpenStack Platform 17.1 memcached, build-date=2026-01-12T22:12:26Z, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, architecture=x86_64, io.buildah.version=1.41.5, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, release=1766032510, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, batch=17.1_20260112.1, url=https://www.redhat.com, version=17.1.13, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, config_id=tripleo_step1, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, summary=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible) Feb 2 08:06:21 np0005604725 podman[71374]: 2026-02-02 08:06:21.362286311 +0000 UTC m=+0.112107394 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, url=https://www.redhat.com, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, summary=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, name=rhosp-rhel9/openstack-memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:12:26Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, vendor=Red Hat, Inc., io.openshift.expose-services=, managed_by=tripleo_ansible, config_id=tripleo_step1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:12:26Z, description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, version=17.1.13) Feb 2 08:06:21 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:06:23 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:06:23 np0005604725 systemd[1]: tmp-crun.nRvUva.mount: Deactivated successfully. Feb 2 08:06:23 np0005604725 podman[71547]: 2026-02-02 08:06:23.316562779 +0000 UTC m=+0.072859202 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-qdrouterd-container, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, build-date=2026-01-12T22:10:14Z, batch=17.1_20260112.1, release=1766032510, distribution-scope=public, container_name=metrics_qdr, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, config_id=tripleo_step1, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp-rhel9/openstack-qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:06:23 np0005604725 podman[71547]: 2026-02-02 08:06:23.548988487 +0000 UTC m=+0.305284910 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, build-date=2026-01-12T22:10:14Z, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=metrics_qdr, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, config_id=tripleo_step1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, managed_by=tripleo_ansible, io.buildah.version=1.41.5, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, name=rhosp-rhel9/openstack-qdrouterd, release=1766032510, vendor=Red Hat, Inc., vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public) Feb 2 08:06:23 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:06:23 np0005604725 galera(galera)[56]: INFO: Waiting on node to report database status before Master instances can start. Feb 2 08:06:23 np0005604725 pacemaker-controld[51065]: notice: Result of start operation for galera on galera-bundle-1: ok Feb 2 08:06:24 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for galera on galera-bundle-1 Feb 2 08:06:24 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for galera on galera-bundle-1 Feb 2 08:06:24 np0005604725 galera(galera)[632]: ERROR: MySQL is not running Feb 2 08:06:25 np0005604725 pacemaker-attrd[51063]: notice: Setting galera-no-grastate[np0005604726]: (unset) -> true Feb 2 08:06:26 np0005604725 pacemaker-attrd[51063]: notice: Setting galera-last-committed[np0005604726]: (unset) -> -1 Feb 2 08:06:27 np0005604725 galera(galera)[632]: INFO: Promoting np0005604726 to be our bootstrap node Feb 2 08:06:27 np0005604725 pacemaker-attrd[51063]: notice: Setting galera-bootstrap[np0005604726]: (unset) -> true Feb 2 08:06:27 np0005604725 pacemaker-attrd[51063]: notice: Setting master-galera[np0005604726]: (unset) -> 100 Feb 2 08:06:27 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for galera on galera-bundle-1: ok Feb 2 08:06:27 np0005604725 galera(galera)[775]: ERROR: MySQL is not running Feb 2 08:06:30 np0005604725 galera(galera)[775]: INFO: Promoting np0005604726 to be our bootstrap node Feb 2 08:06:30 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for galera on galera-bundle-1: ok Feb 2 08:06:35 np0005604725 pacemaker-attrd[51063]: notice: Setting galera-last-committed[np0005604726]: -1 -> (unset) Feb 2 08:06:39 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:06:39 np0005604725 podman[72402]: 2026-02-02 08:06:39.34304653 +0000 UTC m=+0.090258991 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=unhealthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, com.redhat.component=openstack-mariadb-container, io.openshift.expose-services=, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step2, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, distribution-scope=public, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, container_name=clustercheck, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, vcs-type=git, build-date=2026-01-12T22:10:18Z, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, architecture=x86_64) Feb 2 08:06:39 np0005604725 podman[72402]: 2026-02-02 08:06:39.399954056 +0000 UTC m=+0.147166517 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, managed_by=tripleo_ansible, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-mariadb, config_id=tripleo_step2, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, container_name=clustercheck, org.opencontainers.image.created=2026-01-12T22:10:18Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, vcs-type=git, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, distribution-scope=public, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, version=17.1.13, build-date=2026-01-12T22:10:18Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, architecture=x86_64, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:06:39 np0005604725 podman[72402]: unhealthy Feb 2 08:06:39 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:06:39 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Failed with result 'exit-code'. Feb 2 08:06:39 np0005604725 pacemaker-attrd[51063]: notice: Setting master-galera[np0005604723]: (unset) -> 100 Feb 2 08:06:40 np0005604725 pacemaker-attrd[51063]: notice: Setting master-galera[np0005604725]: (unset) -> 100 Feb 2 08:06:40 np0005604725 pacemaker-attrd[51063]: notice: Setting galera-bootstrap[np0005604726]: true -> (unset) Feb 2 08:06:40 np0005604725 pacemaker-attrd[51063]: notice: Setting galera-no-grastate[np0005604726]: true -> (unset) Feb 2 08:06:41 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for rabbitmq-bundle-podman-0 on np0005604725 Feb 2 08:06:41 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for rabbitmq-bundle-podman-1 on np0005604725 Feb 2 08:06:41 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for rabbitmq-bundle-podman-2 on np0005604725 Feb 2 08:06:41 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for rabbitmq-bundle-podman-2 on np0005604725: not running Feb 2 08:06:41 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for rabbitmq-bundle-podman-0 on np0005604725: not running Feb 2 08:06:41 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for rabbitmq-bundle-podman-1 on np0005604725: not running Feb 2 08:06:42 np0005604725 pacemaker-attrd[51063]: notice: Setting galera-last-committed[np0005604723]: -1 -> (unset) Feb 2 08:06:45 np0005604725 sshd[72702]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:06:52 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:06:52 np0005604725 systemd[1]: tmp-crun.KaTl5b.mount: Deactivated successfully. Feb 2 08:06:52 np0005604725 podman[72925]: 2026-02-02 08:06:52.338678815 +0000 UTC m=+0.086897598 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, config_id=tripleo_step1, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, maintainer=OpenStack TripleO Team, vcs-type=git, io.buildah.version=1.41.5, io.openshift.expose-services=, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:12:26Z, distribution-scope=public, container_name=memcached, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, name=rhosp-rhel9/openstack-memcached, release=1766032510, build-date=2026-01-12T22:12:26Z, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-memcached-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached) Feb 2 08:06:52 np0005604725 podman[72925]: 2026-02-02 08:06:52.381871305 +0000 UTC m=+0.130090078 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, com.redhat.component=openstack-memcached-container, build-date=2026-01-12T22:12:26Z, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 memcached, version=17.1.13, architecture=x86_64, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 memcached, name=rhosp-rhel9/openstack-memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1) Feb 2 08:06:52 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:06:53 np0005604725 pacemaker-attrd[51063]: notice: Setting galera-no-grastate[np0005604723]: true -> (unset) Feb 2 08:06:53 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of promote operation for galera on galera-bundle-1 Feb 2 08:06:53 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of start operation for rabbitmq-bundle-podman-1 on np0005604725 Feb 2 08:06:53 np0005604725 podman(rabbitmq-bundle-podman-1)[72990]: INFO: running container rabbitmq-bundle-podman-1 for the first time Feb 2 08:06:53 np0005604725 galera(galera)[918]: ERROR: MySQL is not running Feb 2 08:06:53 np0005604725 podman[73153]: 2026-02-02 08:06:53.825700214 +0000 UTC m=+0.101533362 container create 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, version=17.1.13, release=1766032510, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, tcib_managed=true, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:14Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-rabbitmq, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2026-01-12T22:10:14Z) Feb 2 08:06:53 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:06:53 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:06:53 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5bc56ceeb0b52f0a180d679075863515d2029b0af8e577cd3691538a520add0d/merged/var/log supports timestamps until 2038 (0x7fffffff) Feb 2 08:06:53 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5bc56ceeb0b52f0a180d679075863515d2029b0af8e577cd3691538a520add0d/merged/var/lib/rabbitmq supports timestamps until 2038 (0x7fffffff) Feb 2 08:06:53 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5bc56ceeb0b52f0a180d679075863515d2029b0af8e577cd3691538a520add0d/merged/etc/pacemaker/authkey supports timestamps until 2038 (0x7fffffff) Feb 2 08:06:53 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5bc56ceeb0b52f0a180d679075863515d2029b0af8e577cd3691538a520add0d/merged/var/log/rabbitmq supports timestamps until 2038 (0x7fffffff) Feb 2 08:06:53 np0005604725 podman[73153]: 2026-02-02 08:06:53.777298405 +0000 UTC m=+0.053131613 image pull cluster.common.tag/rabbitmq:pcmklatest Feb 2 08:06:53 np0005604725 podman[73153]: 2026-02-02 08:06:53.878930669 +0000 UTC m=+0.154763857 container init 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, name=rhosp-rhel9/openstack-rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2026-01-12T22:10:14Z, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:14Z, release=1766032510, io.openshift.expose-services=, com.redhat.component=openstack-rabbitmq-container, vendor=Red Hat, Inc., version=17.1.13, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:06:53 np0005604725 podman[73153]: 2026-02-02 08:06:53.92344878 +0000 UTC m=+0.199281928 container start 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.created=2026-01-12T22:10:14Z, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.41.5, version=17.1.13, architecture=x86_64, tcib_managed=true, release=1766032510, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp-rhel9/openstack-rabbitmq, distribution-scope=public, com.redhat.component=openstack-rabbitmq-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, vendor=Red Hat, Inc., vcs-type=git, build-date=2026-01-12T22:10:14Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:06:53 np0005604725 podman(rabbitmq-bundle-podman-1)[72990]: INFO: 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec Feb 2 08:06:53 np0005604725 podman[73189]: 2026-02-02 08:06:53.960810264 +0000 UTC m=+0.066180269 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, vendor=Red Hat, Inc., architecture=x86_64, com.redhat.component=openstack-haproxy-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, name=rhosp-rhel9/openstack-haproxy, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 haproxy, build-date=2026-01-12T22:10:12Z, org.opencontainers.image.created=2026-01-12T22:10:12Z, vcs-type=git, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team) Feb 2 08:06:53 np0005604725 pacemaker-remoted[2]: warning: Logging to '/var/log/pacemaker/pacemaker.log' is disabled: No such file or directory Feb 2 08:06:53 np0005604725 pacemaker-remoted[2]: notice: Starting Pacemaker remote executor Feb 2 08:06:54 np0005604725 podman[73172]: 2026-02-02 08:06:54.074526764 +0000 UTC m=+0.215127609 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, com.redhat.component=openstack-qdrouterd-container, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, name=rhosp-rhel9/openstack-qdrouterd, build-date=2026-01-12T22:10:14Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, io.openshift.expose-services=, vcs-type=git, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, vendor=Red Hat, Inc., io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:14Z, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, url=https://www.redhat.com, container_name=metrics_qdr) Feb 2 08:06:54 np0005604725 podman[73189]: 2026-02-02 08:06:54.098811711 +0000 UTC m=+0.204181746 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, release=1766032510, build-date=2026-01-12T22:10:12Z, summary=Red Hat OpenStack Platform 17.1 haproxy, architecture=x86_64, com.redhat.component=openstack-haproxy-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, name=rhosp-rhel9/openstack-haproxy, org.opencontainers.image.created=2026-01-12T22:10:12Z, version=17.1.13, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 haproxy, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, vendor=Red Hat, Inc.) Feb 2 08:06:54 np0005604725 podman(rabbitmq-bundle-podman-1)[72990]: INFO: Creating drop-in dependency for "rabbitmq-bundle-podman-1" (0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec) Feb 2 08:06:54 np0005604725 systemd[1]: Reloading. Feb 2 08:06:54 np0005604725 systemd-rc-local-generator[73319]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:06:54 np0005604725 systemd-sysv-generator[73323]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:06:54 np0005604725 podman[73172]: 2026-02-02 08:06:54.268038765 +0000 UTC m=+0.408639630 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, architecture=x86_64, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:10:14Z, description=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-qdrouterd, tcib_managed=true, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_step1, url=https://www.redhat.com, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=metrics_qdr, build-date=2026-01-12T22:10:14Z) Feb 2 08:06:54 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:06:54 np0005604725 pacemaker-remoted[2]: notice: Pacemaker remote executor successfully started and accepting connections Feb 2 08:06:54 np0005604725 pacemaker-remoted[2]: notice: OCF resource agent search path is /usr/lib/ocf/resource.d Feb 2 08:06:54 np0005604725 systemd[1]: tmp-crun.71GYrk.mount: Deactivated successfully. Feb 2 08:06:54 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:06:54 np0005604725 podman[73343]: 2026-02-02 08:06:54.509675558 +0000 UTC m=+0.076225245 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, name=rhosp-rhel9/openstack-rabbitmq, io.buildah.version=1.41.5, release=1766032510, distribution-scope=public, vcs-type=git, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:10:14Z, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, architecture=x86_64, io.openshift.expose-services=, tcib_managed=true, com.redhat.component=openstack-rabbitmq-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 rabbitmq, version=17.1.13, batch=17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:10:14Z, description=Red Hat OpenStack Platform 17.1 rabbitmq) Feb 2 08:06:54 np0005604725 podman[73343]: 2026-02-02 08:06:54.543300758 +0000 UTC m=+0.109850415 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2026-01-12T22:10:14Z, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-rabbitmq, io.openshift.expose-services=, architecture=x86_64, batch=17.1_20260112.1, release=1766032510, distribution-scope=public, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, com.redhat.component=openstack-rabbitmq-container) Feb 2 08:06:54 np0005604725 podman[73381]: 2026-02-02 08:06:54.645775197 +0000 UTC m=+0.078886075 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:14Z, tcib_managed=true, distribution-scope=public, build-date=2026-01-12T22:10:14Z, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp-rhel9/openstack-rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, vcs-type=git, com.redhat.component=openstack-rabbitmq-container, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq) Feb 2 08:06:54 np0005604725 podman[73381]: 2026-02-02 08:06:54.679132399 +0000 UTC m=+0.112243247 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, io.buildah.version=1.41.5, release=1766032510, io.openshift.expose-services=, build-date=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, tcib_managed=true, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:14Z) Feb 2 08:06:54 np0005604725 podman(rabbitmq-bundle-podman-1)[72990]: NOTICE: Container rabbitmq-bundle-podman-1 started successfully Feb 2 08:06:54 np0005604725 pacemaker-controld[51065]: notice: Result of start operation for rabbitmq-bundle-podman-1 on np0005604725: ok Feb 2 08:06:54 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for rabbitmq-bundle-2 on np0005604725 Feb 2 08:06:54 np0005604725 pacemaker-attrd[51063]: notice: Setting galera-last-committed[np0005604725]: -1 -> (unset) Feb 2 08:06:54 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for rabbitmq-bundle-2 on np0005604725: not running (Remote connection inactive) Feb 2 08:06:54 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for rabbitmq-bundle-podman-1 on np0005604725 Feb 2 08:06:54 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for rabbitmq-bundle-1 on np0005604725 Feb 2 08:06:54 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for rabbitmq-bundle-1 on np0005604725: not running (Remote connection inactive) Feb 2 08:06:54 np0005604725 podman[73432]: 2026-02-02 08:06:54.856100068 +0000 UTC m=+0.100448519 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, build-date=2026-01-12T22:10:14Z, io.openshift.expose-services=, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.created=2026-01-12T22:10:14Z, tcib_managed=true, name=rhosp-rhel9/openstack-rabbitmq, com.redhat.component=openstack-rabbitmq-container, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, distribution-scope=public, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team) Feb 2 08:06:54 np0005604725 podman[73432]: 2026-02-02 08:06:54.8901197 +0000 UTC m=+0.134468131 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 rabbitmq, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.41.5, io.openshift.expose-services=, com.redhat.component=openstack-rabbitmq-container, tcib_managed=true, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-type=git, batch=17.1_20260112.1, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://www.redhat.com, name=rhosp-rhel9/openstack-rabbitmq, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, version=17.1.13) Feb 2 08:06:54 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for rabbitmq-bundle-podman-1 on np0005604725: ok Feb 2 08:06:55 np0005604725 galera(galera)[918]: INFO: MySQL is not running Feb 2 08:06:57 np0005604725 galera(galera)[918]: INFO: MySQL is not running Feb 2 08:06:57 np0005604725 rsyncd[1513]: rsyncd version 3.2.3 starting, listening on port 4444 Feb 2 08:06:57 np0005604725 sshd[74046]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:06:58 np0005604725 rsyncd[1533]: connect from localhost (127.0.0.1) Feb 2 08:06:58 np0005604725 rsyncd[1533]: rsync allowed access on module rsync_tunnel_sst from localhost (127.0.0.1) Feb 2 08:06:58 np0005604725 rsyncd[1533]: rsync to rsync_tunnel_sst/ from localhost (127.0.0.1) Feb 2 08:06:58 np0005604725 rsyncd[1533]: receiving file list Feb 2 08:06:58 np0005604725 rsyncd[1533]: sent 44 bytes received 12586315 bytes total size 12582912 Feb 2 08:06:58 np0005604725 rsyncd[1536]: connect from localhost (127.0.0.1) Feb 2 08:06:58 np0005604725 rsyncd[1536]: rsync allowed access on module rsync_tunnel_sst-log_dir from localhost (127.0.0.1) Feb 2 08:06:58 np0005604725 rsyncd[1536]: rsync to rsync_tunnel_sst-log_dir/ from localhost (127.0.0.1) Feb 2 08:06:58 np0005604725 rsyncd[1536]: receiving file list Feb 2 08:06:59 np0005604725 rsyncd[1536]: sent 44 bytes received 100688057 bytes total size 100663296 Feb 2 08:06:59 np0005604725 rsyncd[1546]: connect from localhost (127.0.0.1) Feb 2 08:06:59 np0005604725 rsyncd[1546]: rsync allowed access on module rsync_tunnel_sst from localhost (127.0.0.1) Feb 2 08:06:59 np0005604725 rsyncd[1547]: connect from localhost (127.0.0.1) Feb 2 08:06:59 np0005604725 rsyncd[1547]: rsync allowed access on module rsync_tunnel_sst from localhost (127.0.0.1) Feb 2 08:06:59 np0005604725 rsyncd[1546]: rsync to rsync_tunnel_sst/./performance_schema from localhost (127.0.0.1) Feb 2 08:06:59 np0005604725 rsyncd[1546]: receiving file list Feb 2 08:06:59 np0005604725 rsyncd[1547]: rsync to rsync_tunnel_sst/./mysql from localhost (127.0.0.1) Feb 2 08:06:59 np0005604725 rsyncd[1547]: receiving file list Feb 2 08:06:59 np0005604725 galera(galera)[918]: INFO: MySQL is not running Feb 2 08:06:59 np0005604725 rsyncd[1546]: sent 48 bytes received 219 bytes total size 61 Feb 2 08:06:59 np0005604725 rsyncd[1547]: sent 1815 bytes received 3516620 bytes total size 3510061 Feb 2 08:06:59 np0005604725 rsyncd[1556]: connect from localhost (127.0.0.1) Feb 2 08:06:59 np0005604725 rsyncd[1556]: rsync allowed access on module rsync_tunnel_sst from localhost (127.0.0.1) Feb 2 08:06:59 np0005604725 rsyncd[1556]: rsync to rsync_tunnel_sst/ from localhost (127.0.0.1) Feb 2 08:06:59 np0005604725 rsyncd[1556]: receiving file list Feb 2 08:06:59 np0005604725 rsyncd[1556]: sent 48 bytes received 197 bytes total size 41 Feb 2 08:07:01 np0005604725 galera(galera)[918]: INFO: MySQL is not running Feb 2 08:07:01 np0005604725 rsyncd[1513]: sent 0 bytes received 0 bytes total size 0 Feb 2 08:07:05 np0005604725 galera(galera)[918]: INFO: Waiting for database to sync with the cluster. Feb 2 08:07:05 np0005604725 galera(galera)[918]: INFO: Database synced. Feb 2 08:07:05 np0005604725 pacemaker-attrd[51063]: notice: Setting galera-no-grastate[np0005604725]: true -> (unset) Feb 2 08:07:05 np0005604725 galera(galera)[918]: INFO: Galera started Feb 2 08:07:05 np0005604725 pacemaker-controld[51065]: notice: Result of promote operation for galera on galera-bundle-1: ok Feb 2 08:07:05 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for galera on galera-bundle-1 Feb 2 08:07:05 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for rabbitmq-bundle-0 on np0005604725 Feb 2 08:07:05 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for rabbitmq-bundle-0 on np0005604725: not running (Remote connection inactive) Feb 2 08:07:05 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of start operation for rabbitmq-bundle-1 on np0005604725 Feb 2 08:07:05 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for galera on galera-bundle-1: promoted Feb 2 08:07:06 np0005604725 pacemaker-attrd[51063]: notice: Removing all rabbitmq-bundle-2 attributes for peer np0005604726 Feb 2 08:07:06 np0005604725 pacemaker-fenced[51061]: notice: Node rabbitmq-bundle-2 state is now member Feb 2 08:07:06 np0005604725 pacemaker-remoted[2]: notice: Remote client connection accepted Feb 2 08:07:06 np0005604725 pacemaker-controld[51065]: notice: Node rabbitmq-bundle-1 state is now member Feb 2 08:07:06 np0005604725 pacemaker-controld[51065]: notice: Result of start operation for rabbitmq-bundle-1 on np0005604725: ok Feb 2 08:07:06 np0005604725 pacemaker-attrd[51063]: notice: Removing all rabbitmq-bundle-1 attributes for peer np0005604725 Feb 2 08:07:06 np0005604725 pacemaker-fenced[51061]: notice: Node rabbitmq-bundle-1 state is now member Feb 2 08:07:06 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for rabbitmq-bundle-1 on np0005604725 Feb 2 08:07:06 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for rabbitmq on rabbitmq-bundle-1 Feb 2 08:07:06 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for rabbitmq-bundle-1 on np0005604725: ok Feb 2 08:07:07 np0005604725 pacemaker-attrd[51063]: notice: Removing all rabbitmq-bundle-0 attributes for peer np0005604723 Feb 2 08:07:07 np0005604725 pacemaker-fenced[51061]: notice: Node rabbitmq-bundle-0 state is now member Feb 2 08:07:07 np0005604725 rabbitmq-cluster(rabbitmq)[9]: INFO: RabbitMQ server could not get cluster status from mnesia Feb 2 08:07:08 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for rabbitmq on rabbitmq-bundle-1: not running Feb 2 08:07:10 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:07:10 np0005604725 podman[74717]: 2026-02-02 08:07:10.349243889 +0000 UTC m=+0.093975472 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=unhealthy, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, release=1766032510, summary=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-mariadb-container, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, vendor=Red Hat, Inc., io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:18Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step2, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, batch=17.1_20260112.1, url=https://www.redhat.com, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-type=git, container_name=clustercheck, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, version=17.1.13) Feb 2 08:07:10 np0005604725 podman[74717]: 2026-02-02 08:07:10.406035542 +0000 UTC m=+0.150767145 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, vendor=Red Hat, Inc., io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step2, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:10:18Z, name=rhosp-rhel9/openstack-mariadb, vcs-type=git, managed_by=tripleo_ansible, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, tcib_managed=true, distribution-scope=public, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-mariadb-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, container_name=clustercheck, maintainer=OpenStack TripleO Team, release=1766032510, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:07:10 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:07:12 np0005604725 podman[74845]: 2026-02-02 08:07:12.009019149 +0000 UTC m=+0.080845224 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, release=1766032510, batch=17.1_20260112.1, architecture=x86_64, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, build-date=2026-01-12T22:10:18Z, name=rhosp-rhel9/openstack-mariadb, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:18Z, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:07:12 np0005604725 podman[74845]: 2026-02-02 08:07:12.041897707 +0000 UTC m=+0.113723782 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, tcib_managed=true, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., batch=17.1_20260112.1, vcs-type=git, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:18Z, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-mariadb-container, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:18Z) Feb 2 08:07:19 np0005604725 pacemaker-attrd[51063]: notice: Setting rmq-node-attr-rabbitmq[np0005604723]: (unset) -> rabbit@np0005604723.internalapi.ooo.test Feb 2 08:07:22 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for redis-bundle-podman-0 on np0005604725 Feb 2 08:07:22 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for redis-bundle-podman-1 on np0005604725 Feb 2 08:07:22 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for redis-bundle-podman-2 on np0005604725 Feb 2 08:07:22 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for redis-bundle-podman-2 on np0005604725: not running Feb 2 08:07:22 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of start operation for rabbitmq on rabbitmq-bundle-1 Feb 2 08:07:22 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for redis-bundle-podman-1 on np0005604725: not running Feb 2 08:07:22 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for redis-bundle-podman-0 on np0005604725: not running Feb 2 08:07:23 np0005604725 rabbitmq-cluster(rabbitmq)[107]: INFO: RabbitMQ server could not get cluster status from mnesia Feb 2 08:07:23 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:07:23 np0005604725 podman[75397]: 2026-02-02 08:07:23.35307286 +0000 UTC m=+0.095206000 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:12:26Z, name=rhosp-rhel9/openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, url=https://www.redhat.com, managed_by=tripleo_ansible, config_id=tripleo_step1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, build-date=2026-01-12T22:12:26Z, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, distribution-scope=public, container_name=memcached, summary=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, architecture=x86_64, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, version=17.1.13) Feb 2 08:07:23 np0005604725 podman[75397]: 2026-02-02 08:07:23.403064646 +0000 UTC m=+0.145197816 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, container_name=memcached, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, config_id=tripleo_step1, batch=17.1_20260112.1, url=https://www.redhat.com, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., vcs-type=git, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-memcached-container, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:12:26Z, description=Red Hat OpenStack Platform 17.1 memcached, name=rhosp-rhel9/openstack-memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, summary=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:12:26Z, io.buildah.version=1.41.5, architecture=x86_64) Feb 2 08:07:23 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:07:23 np0005604725 rabbitmq-cluster(rabbitmq)[107]: INFO: wiping data directory before joining Feb 2 08:07:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:07:25 np0005604725 systemd[1]: tmp-crun.1RjFqA.mount: Deactivated successfully. Feb 2 08:07:25 np0005604725 podman[75619]: 2026-02-02 08:07:25.333295953 +0000 UTC m=+0.078827213 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, com.redhat.component=openstack-qdrouterd-container, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:14Z, container_name=metrics_qdr, url=https://www.redhat.com, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp-rhel9/openstack-qdrouterd, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, release=1766032510, tcib_managed=true, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., config_id=tripleo_step1, build-date=2026-01-12T22:10:14Z, summary=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64) Feb 2 08:07:25 np0005604725 podman[75619]: 2026-02-02 08:07:25.498235668 +0000 UTC m=+0.243766928 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=metrics_qdr, name=rhosp-rhel9/openstack-qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, version=17.1.13, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:14Z, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-qdrouterd-container, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, batch=17.1_20260112.1, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2026-01-12T22:10:14Z, managed_by=tripleo_ansible, distribution-scope=public, vcs-type=git, description=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}) Feb 2 08:07:25 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:07:25 np0005604725 rabbitmq-cluster(rabbitmq)[107]: INFO: Forgetting via nodes [ rabbit@np0005604723.internalapi.ooo.test ]. Feb 2 08:07:26 np0005604725 rabbitmq-cluster(rabbitmq)[107]: ERROR: Failed to forget node via rabbit@np0005604723.internalapi.ooo.test. Feb 2 08:07:26 np0005604725 rabbitmq-cluster(rabbitmq)[107]: INFO: Joining existing cluster with [ rabbit@np0005604723.internalapi.ooo.test ] nodes. Feb 2 08:07:26 np0005604725 rabbitmq-cluster(rabbitmq)[107]: INFO: Waiting for server to start Feb 2 08:07:35 np0005604725 rabbitmq-cluster(rabbitmq)[107]: INFO: Attempting to join cluster with target node rabbit@np0005604723.internalapi.ooo.test Feb 2 08:07:37 np0005604725 rabbitmq-cluster(rabbitmq)[107]: INFO: Joined cluster by connecting to node rabbit@np0005604723.internalapi.ooo.test, starting app Feb 2 08:07:39 np0005604725 rabbitmq-cluster(rabbitmq)[107]: INFO: Successfully joined existing rabbitmq cluster Feb 2 08:07:40 np0005604725 pacemaker-controld[51065]: notice: Result of start operation for rabbitmq on rabbitmq-bundle-1: ok Feb 2 08:07:40 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of notify operation for rabbitmq on rabbitmq-bundle-1 Feb 2 08:07:40 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of start operation for redis-bundle-podman-1 on np0005604725 Feb 2 08:07:40 np0005604725 pacemaker-controld[51065]: notice: Result of notify operation for rabbitmq on rabbitmq-bundle-1: ok Feb 2 08:07:40 np0005604725 podman(redis-bundle-podman-1)[76778]: INFO: running container redis-bundle-podman-1 for the first time Feb 2 08:07:40 np0005604725 podman[76838]: 2026-02-02 08:07:40.892638603 +0000 UTC m=+0.081299489 container create 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, vendor=Red Hat, Inc., tcib_managed=true, build-date=2026-01-12T22:10:16Z, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, org.opencontainers.image.created=2026-01-12T22:10:16Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, maintainer=OpenStack TripleO Team, vcs-type=git, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 redis, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-redis-container, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 redis, io.buildah.version=1.41.5, distribution-scope=public, name=rhosp-rhel9/openstack-redis) Feb 2 08:07:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:07:40 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:07:40 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1b7c941f273e21dec7f0afdd90062400311056b2dc5ec0645f980f83ae37ac53/merged/var/log supports timestamps until 2038 (0x7fffffff) Feb 2 08:07:40 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1b7c941f273e21dec7f0afdd90062400311056b2dc5ec0645f980f83ae37ac53/merged/var/lib/redis supports timestamps until 2038 (0x7fffffff) Feb 2 08:07:40 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1b7c941f273e21dec7f0afdd90062400311056b2dc5ec0645f980f83ae37ac53/merged/etc/pacemaker/authkey supports timestamps until 2038 (0x7fffffff) Feb 2 08:07:40 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1b7c941f273e21dec7f0afdd90062400311056b2dc5ec0645f980f83ae37ac53/merged/var/log/redis supports timestamps until 2038 (0x7fffffff) Feb 2 08:07:40 np0005604725 podman[76838]: 2026-02-02 08:07:40.949667124 +0000 UTC m=+0.138328030 container init 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, summary=Red Hat OpenStack Platform 17.1 redis, build-date=2026-01-12T22:10:16Z, batch=17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, name=rhosp-rhel9/openstack-redis, com.redhat.component=openstack-redis-container, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:16Z, maintainer=OpenStack TripleO Team, tcib_managed=true, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, url=https://www.redhat.com, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 redis, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, vcs-type=git) Feb 2 08:07:40 np0005604725 podman[76838]: 2026-02-02 08:07:40.858813487 +0000 UTC m=+0.047474363 image pull cluster.common.tag/redis:pcmklatest Feb 2 08:07:40 np0005604725 podman[76838]: 2026-02-02 08:07:40.962228455 +0000 UTC m=+0.150889341 container start 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:16Z, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-redis-container, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 redis, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:16Z, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, io.buildah.version=1.41.5, architecture=x86_64, vcs-type=git, name=rhosp-rhel9/openstack-redis) Feb 2 08:07:40 np0005604725 podman(redis-bundle-podman-1)[76778]: INFO: 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 Feb 2 08:07:41 np0005604725 podman[76856]: 2026-02-02 08:07:41.028390773 +0000 UTC m=+0.102658157 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, vcs-type=git, config_id=tripleo_step2, org.opencontainers.image.created=2026-01-12T22:10:18Z, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:18Z, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, name=rhosp-rhel9/openstack-mariadb, release=1766032510, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, container_name=clustercheck, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, managed_by=tripleo_ansible, com.redhat.component=openstack-mariadb-container, batch=17.1_20260112.1) Feb 2 08:07:41 np0005604725 pacemaker-remoted[2]: warning: Logging to '/var/log/pacemaker/pacemaker.log' is disabled: No such file or directory Feb 2 08:07:41 np0005604725 pacemaker-remoted[2]: notice: Starting Pacemaker remote executor Feb 2 08:07:41 np0005604725 podman(redis-bundle-podman-1)[76778]: INFO: Creating drop-in dependency for "redis-bundle-podman-1" (8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689) Feb 2 08:07:41 np0005604725 podman[76856]: 2026-02-02 08:07:41.081728172 +0000 UTC m=+0.155995546 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:18Z, container_name=clustercheck, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, build-date=2026-01-12T22:10:18Z, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, vcs-type=git, architecture=x86_64, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, config_id=tripleo_step2, com.redhat.component=openstack-mariadb-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, vendor=Red Hat, Inc., distribution-scope=public, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13) Feb 2 08:07:41 np0005604725 systemd[1]: Reloading. Feb 2 08:07:41 np0005604725 systemd-sysv-generator[76959]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:07:41 np0005604725 systemd-rc-local-generator[76954]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:07:41 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:07:41 np0005604725 pacemaker-remoted[2]: notice: Pacemaker remote executor successfully started and accepting connections Feb 2 08:07:41 np0005604725 pacemaker-remoted[2]: notice: OCF resource agent search path is /usr/lib/ocf/resource.d Feb 2 08:07:41 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:07:41 np0005604725 podman[76970]: 2026-02-02 08:07:41.461693196 +0000 UTC m=+0.077423112 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, summary=Red Hat OpenStack Platform 17.1 redis, architecture=x86_64, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., io.buildah.version=1.41.5, vcs-type=git, release=1766032510, distribution-scope=public, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 redis, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:16Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, name=rhosp-rhel9/openstack-redis, build-date=2026-01-12T22:10:16Z, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, tcib_managed=true, com.redhat.component=openstack-redis-container, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:07:41 np0005604725 podman[76970]: 2026-02-02 08:07:41.493930654 +0000 UTC m=+0.109660580 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, com.redhat.component=openstack-redis-container, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:16Z, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, org.opencontainers.image.created=2026-01-12T22:10:16Z, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 redis, description=Red Hat OpenStack Platform 17.1 redis, tcib_managed=true, release=1766032510, url=https://www.redhat.com, name=rhosp-rhel9/openstack-redis, batch=17.1_20260112.1, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:07:41 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for redis-bundle-2 on np0005604725 Feb 2 08:07:41 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for redis-bundle-2 on np0005604725: not running (Remote connection inactive) Feb 2 08:07:41 np0005604725 podman[77008]: 2026-02-02 08:07:41.608978465 +0000 UTC m=+0.088252319 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:16Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 redis, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, tcib_managed=true, io.openshift.expose-services=, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:16Z, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, url=https://www.redhat.com, name=rhosp-rhel9/openstack-redis, architecture=x86_64, com.redhat.component=openstack-redis-container, summary=Red Hat OpenStack Platform 17.1 redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git) Feb 2 08:07:41 np0005604725 podman[77008]: 2026-02-02 08:07:41.640949536 +0000 UTC m=+0.120223390 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, build-date=2026-01-12T22:10:16Z, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, release=1766032510, description=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, io.buildah.version=1.41.5, version=17.1.13, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, tcib_managed=true, batch=17.1_20260112.1, io.openshift.expose-services=, name=rhosp-rhel9/openstack-redis, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:16Z, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:07:41 np0005604725 podman(redis-bundle-podman-1)[76778]: NOTICE: Container redis-bundle-podman-1 started successfully Feb 2 08:07:41 np0005604725 pacemaker-controld[51065]: notice: Result of start operation for redis-bundle-podman-1 on np0005604725: ok Feb 2 08:07:41 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for redis-bundle-podman-1 on np0005604725 Feb 2 08:07:41 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for redis-bundle-1 on np0005604725 Feb 2 08:07:41 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for redis-bundle-1 on np0005604725: not running (Remote connection inactive) Feb 2 08:07:41 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of start operation for redis-bundle-1 on np0005604725 Feb 2 08:07:41 np0005604725 podman[77055]: 2026-02-02 08:07:41.777310455 +0000 UTC m=+0.068200141 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, org.opencontainers.image.created=2026-01-12T22:10:16Z, build-date=2026-01-12T22:10:16Z, com.redhat.component=openstack-redis-container, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 redis, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, io.openshift.expose-services=, tcib_managed=true, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, name=rhosp-rhel9/openstack-redis, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 redis) Feb 2 08:07:41 np0005604725 podman[77055]: 2026-02-02 08:07:41.805926894 +0000 UTC m=+0.096816620 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, build-date=2026-01-12T22:10:16Z, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, vcs-type=git, name=rhosp-rhel9/openstack-redis, release=1766032510, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, version=17.1.13, io.openshift.expose-services=, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, org.opencontainers.image.created=2026-01-12T22:10:16Z, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 redis, io.buildah.version=1.41.5, com.redhat.component=openstack-redis-container, summary=Red Hat OpenStack Platform 17.1 redis, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, distribution-scope=public) Feb 2 08:07:41 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for redis-bundle-podman-1 on np0005604725: ok Feb 2 08:07:41 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for redis-bundle-0 on np0005604725 Feb 2 08:07:41 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for redis-bundle-0 on np0005604725: not running (Remote connection inactive) Feb 2 08:07:42 np0005604725 pacemaker-attrd[51063]: notice: Removing all redis-bundle-2 attributes for peer np0005604726 Feb 2 08:07:42 np0005604725 pacemaker-fenced[51061]: notice: Node redis-bundle-2 state is now member Feb 2 08:07:42 np0005604725 pacemaker-remoted[2]: notice: Remote client connection accepted Feb 2 08:07:42 np0005604725 pacemaker-controld[51065]: notice: Node redis-bundle-1 state is now member Feb 2 08:07:42 np0005604725 pacemaker-controld[51065]: notice: Result of start operation for redis-bundle-1 on np0005604725: ok Feb 2 08:07:42 np0005604725 pacemaker-attrd[51063]: notice: Removing all redis-bundle-1 attributes for peer np0005604725 Feb 2 08:07:42 np0005604725 pacemaker-fenced[51061]: notice: Node redis-bundle-1 state is now member Feb 2 08:07:42 np0005604725 pacemaker-attrd[51063]: notice: Removing all redis-bundle-0 attributes for peer np0005604723 Feb 2 08:07:42 np0005604725 pacemaker-fenced[51061]: notice: Node redis-bundle-0 state is now member Feb 2 08:07:54 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:07:54 np0005604725 podman[77630]: 2026-02-02 08:07:54.253808995 +0000 UTC m=+0.108880696 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., batch=17.1_20260112.1, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, build-date=2026-01-12T22:10:12Z, summary=Red Hat OpenStack Platform 17.1 haproxy, description=Red Hat OpenStack Platform 17.1 haproxy, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-haproxy-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, release=1766032510, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:12Z, name=rhosp-rhel9/openstack-haproxy, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:07:54 np0005604725 podman[77630]: 2026-02-02 08:07:54.29022185 +0000 UTC m=+0.145293591 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, build-date=2026-01-12T22:10:12Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, batch=17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, vendor=Red Hat, Inc., version=17.1.13, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:12Z, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 haproxy, tcib_managed=true, distribution-scope=public, com.redhat.component=openstack-haproxy-container, name=rhosp-rhel9/openstack-haproxy, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, release=1766032510, description=Red Hat OpenStack Platform 17.1 haproxy) Feb 2 08:07:54 np0005604725 podman[77647]: 2026-02-02 08:07:54.349826899 +0000 UTC m=+0.089514738 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, summary=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, vcs-type=git, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:12:26Z, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, description=Red Hat OpenStack Platform 17.1 memcached, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, container_name=memcached, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, build-date=2026-01-12T22:12:26Z, name=rhosp-rhel9/openstack-memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step1, vendor=Red Hat, Inc., com.redhat.component=openstack-memcached-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached) Feb 2 08:07:54 np0005604725 podman[77647]: 2026-02-02 08:07:54.395035901 +0000 UTC m=+0.134723750 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, container_name=memcached, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, build-date=2026-01-12T22:12:26Z, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:12:26Z, version=17.1.13, description=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, vcs-type=git, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, config_id=tripleo_step1, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, distribution-scope=public, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:07:54 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:07:54 np0005604725 podman[77692]: 2026-02-02 08:07:54.994225248 +0000 UTC m=+0.072376297 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, summary=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:14Z, name=rhosp-rhel9/openstack-rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:14Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, com.redhat.component=openstack-rabbitmq-container, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, tcib_managed=true, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://www.redhat.com, architecture=x86_64) Feb 2 08:07:55 np0005604725 podman[77692]: 2026-02-02 08:07:55.022982171 +0000 UTC m=+0.101133250 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:14Z, description=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, version=17.1.13, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-rabbitmq-container, name=rhosp-rhel9/openstack-rabbitmq, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:14Z, tcib_managed=true, architecture=x86_64) Feb 2 08:07:56 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:07:56 np0005604725 podman[77766]: 2026-02-02 08:07:56.321099513 +0000 UTC m=+0.070289245 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, url=https://www.redhat.com, managed_by=tripleo_ansible, com.redhat.component=openstack-qdrouterd-container, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=metrics_qdr, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, vcs-type=git, io.openshift.expose-services=, architecture=x86_64, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, config_id=tripleo_step1, build-date=2026-01-12T22:10:14Z, version=17.1.13, release=1766032510, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:07:56 np0005604725 podman[77766]: 2026-02-02 08:07:56.511928685 +0000 UTC m=+0.261118467 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, release=1766032510, batch=17.1_20260112.1, container_name=metrics_qdr, summary=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:14Z, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.openshift.expose-services=, config_id=tripleo_step1, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., vcs-type=git, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, name=rhosp-rhel9/openstack-qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, com.redhat.component=openstack-qdrouterd-container, maintainer=OpenStack TripleO Team) Feb 2 08:07:56 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:08:00 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of notify operation for rabbitmq on rabbitmq-bundle-1 Feb 2 08:08:00 np0005604725 pacemaker-controld[51065]: notice: Result of notify operation for rabbitmq on rabbitmq-bundle-1: ok Feb 2 08:08:00 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for haproxy-bundle-podman-1 on np0005604725 Feb 2 08:08:00 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for galera-bundle-podman-1 on np0005604725 Feb 2 08:08:00 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for rabbitmq on rabbitmq-bundle-1 Feb 2 08:08:00 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for rabbitmq-bundle-podman-1 on np0005604725 Feb 2 08:08:00 np0005604725 podman[77962]: 2026-02-02 08:08:00.981687106 +0000 UTC m=+0.066225882 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-type=git, io.openshift.expose-services=, url=https://www.redhat.com, build-date=2026-01-12T22:10:18Z, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, batch=17.1_20260112.1, tcib_managed=true, architecture=x86_64, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:08:01 np0005604725 systemd[1]: tmp-crun.rU4irC.mount: Deactivated successfully. Feb 2 08:08:01 np0005604725 podman[77988]: 2026-02-02 08:08:01.038229772 +0000 UTC m=+0.080244497 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, summary=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-rabbitmq, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2026-01-12T22:10:14Z, url=https://www.redhat.com, release=1766032510, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.openshift.expose-services=, maintainer=OpenStack TripleO Team, distribution-scope=public, tcib_managed=true, com.redhat.component=openstack-rabbitmq-container, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:08:01 np0005604725 podman[77962]: 2026-02-02 08:08:01.063314973 +0000 UTC m=+0.147853769 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, version=17.1.13, distribution-scope=public, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, batch=17.1_20260112.1, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-mariadb-container, org.opencontainers.image.created=2026-01-12T22:10:18Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-mariadb) Feb 2 08:08:01 np0005604725 systemd[1]: tmp-crun.3ykshi.mount: Deactivated successfully. Feb 2 08:08:01 np0005604725 podman[77960]: 2026-02-02 08:08:01.173962291 +0000 UTC m=+0.258613001 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, distribution-scope=public, url=https://www.redhat.com, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-haproxy-container, io.buildah.version=1.41.5, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, vcs-type=git, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.created=2026-01-12T22:10:12Z, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 haproxy, name=rhosp-rhel9/openstack-haproxy, build-date=2026-01-12T22:10:12Z) Feb 2 08:08:01 np0005604725 podman[77960]: 2026-02-02 08:08:01.20585727 +0000 UTC m=+0.290507909 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, summary=Red Hat OpenStack Platform 17.1 haproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.openshift.expose-services=, batch=17.1_20260112.1, architecture=x86_64, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:12Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, tcib_managed=true, name=rhosp-rhel9/openstack-haproxy, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, vcs-type=git, build-date=2026-01-12T22:10:12Z, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy) Feb 2 08:08:01 np0005604725 podman[78046]: 2026-02-02 08:08:01.225796865 +0000 UTC m=+0.178078926 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, release=1766032510, com.redhat.component=openstack-rabbitmq-container, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:14Z, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:14Z, tcib_managed=true, distribution-scope=public, name=rhosp-rhel9/openstack-rabbitmq, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.41.5, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc.) Feb 2 08:08:01 np0005604725 podman[77988]: 2026-02-02 08:08:01.229853358 +0000 UTC m=+0.271868063 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, name=rhosp-rhel9/openstack-rabbitmq, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, com.redhat.component=openstack-rabbitmq-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:14Z, build-date=2026-01-12T22:10:14Z, url=https://www.redhat.com, vendor=Red Hat, Inc., io.buildah.version=1.41.5, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-type=git, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, description=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510) Feb 2 08:08:01 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for galera-bundle-podman-1 on np0005604725: ok Feb 2 08:08:01 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for haproxy-bundle-podman-1 on np0005604725: ok Feb 2 08:08:01 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for redis-bundle-podman-1 on np0005604725 Feb 2 08:08:01 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for redis-bundle-1 on np0005604725 Feb 2 08:08:01 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for rabbitmq-bundle-podman-1 on np0005604725: ok Feb 2 08:08:01 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for redis on redis-bundle-1 Feb 2 08:08:01 np0005604725 podman[78122]: 2026-02-02 08:08:01.346747326 +0000 UTC m=+0.084796904 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, vcs-type=git, distribution-scope=public, io.openshift.expose-services=, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 redis, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:16Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, release=1766032510, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:16Z, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, architecture=x86_64, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-redis, com.redhat.component=openstack-redis-container) Feb 2 08:08:01 np0005604725 podman[78122]: 2026-02-02 08:08:01.374590622 +0000 UTC m=+0.112640200 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, version=17.1.13, tcib_managed=true, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:16Z, batch=17.1_20260112.1, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-redis-container, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:16Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, release=1766032510, summary=Red Hat OpenStack Platform 17.1 redis, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, architecture=x86_64) Feb 2 08:08:01 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for redis-bundle-podman-1 on np0005604725: ok Feb 2 08:08:01 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for redis-bundle-1 on np0005604725: ok Feb 2 08:08:01 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for redis on redis-bundle-1: not running Feb 2 08:08:02 np0005604725 pacemaker-attrd[51063]: notice: Setting master-redis[np0005604723]: (unset) -> 1 Feb 2 08:08:04 np0005604725 pacemaker-attrd[51063]: notice: Setting rmq-node-attr-rabbitmq[np0005604725]: (unset) -> rabbit@np0005604725.internalapi.ooo.test Feb 2 08:08:05 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for rabbitmq on rabbitmq-bundle-1: ok Feb 2 08:08:05 np0005604725 pacemaker-attrd[51063]: notice: Setting rmq-node-attr-rabbitmq[np0005604726]: (unset) -> rabbit@np0005604726.internalapi.ooo.test Feb 2 08:08:05 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of start operation for redis on redis-bundle-1 Feb 2 08:08:06 np0005604725 redis(redis)[56]: INFO: start: /usr/bin/redis-server --daemonize yes --unixsocket '/var/run/redis/redis.sock' --pidfile '/var/run/redis/redis-server.pid' Feb 2 08:08:06 np0005604725 su[78638]: (to redis) root on none Feb 2 08:08:07 np0005604725 pacemaker-attrd[51063]: notice: Setting master-redis[np0005604725]: (unset) -> 1 Feb 2 08:08:10 np0005604725 pacemaker-controld[51065]: notice: Result of start operation for redis on redis-bundle-1: ok Feb 2 08:08:10 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of notify operation for redis on redis-bundle-1 Feb 2 08:08:10 np0005604725 pacemaker-controld[51065]: notice: Result of notify operation for redis on redis-bundle-1: ok Feb 2 08:08:11 np0005604725 pacemaker-attrd[51063]: notice: Setting master-redis[np0005604726]: (unset) -> 1 Feb 2 08:08:12 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:08:12 np0005604725 podman[79029]: 2026-02-02 08:08:12.350815622 +0000 UTC m=+0.094845740 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, distribution-scope=public, name=rhosp-rhel9/openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, vendor=Red Hat, Inc., io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-type=git, container_name=clustercheck, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step2, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:18Z, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, maintainer=OpenStack TripleO Team, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z) Feb 2 08:08:12 np0005604725 podman[79029]: 2026-02-02 08:08:12.417898308 +0000 UTC m=+0.161928466 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, url=https://www.redhat.com, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, build-date=2026-01-12T22:10:18Z, com.redhat.component=openstack-mariadb-container, config_id=tripleo_step2, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, vcs-type=git, version=17.1.13, container_name=clustercheck, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, io.openshift.expose-services=, managed_by=tripleo_ansible) Feb 2 08:08:12 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:08:14 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of notify operation for redis on redis-bundle-1 Feb 2 08:08:14 np0005604725 pacemaker-controld[51065]: notice: Result of notify operation for redis on redis-bundle-1: ok Feb 2 08:08:14 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of notify operation for redis on redis-bundle-1 Feb 2 08:08:14 np0005604725 pacemaker-controld[51065]: notice: Result of notify operation for redis on redis-bundle-1: ok Feb 2 08:08:15 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of notify operation for redis on redis-bundle-1 Feb 2 08:08:16 np0005604725 redis(redis)[359]: INFO: monitor: Slave mode link has not yet been established (link=down) Feb 2 08:08:16 np0005604725 redis(redis)[359]: INFO: demote: Setting master to 'np0005604723' via local tunnel '127.0.0.1' on port '6660' Feb 2 08:08:19 np0005604725 pacemaker-controld[51065]: notice: Result of notify operation for redis on redis-bundle-1: ok Feb 2 08:08:19 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for redis on redis-bundle-1 Feb 2 08:08:19 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for redis on redis-bundle-1 Feb 2 08:08:20 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for redis on redis-bundle-1: ok Feb 2 08:08:20 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for redis on redis-bundle-1: ok Feb 2 08:08:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:08:25 np0005604725 podman[80102]: 2026-02-02 08:08:25.328690429 +0000 UTC m=+0.080527926 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, version=17.1.13, container_name=memcached, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:12:26Z, release=1766032510, tcib_managed=true, com.redhat.component=openstack-memcached-container, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, build-date=2026-01-12T22:12:26Z, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-memcached, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.41.5, vcs-type=git, config_id=tripleo_step1, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., batch=17.1_20260112.1) Feb 2 08:08:25 np0005604725 podman[80102]: 2026-02-02 08:08:25.371320573 +0000 UTC m=+0.123158070 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, vcs-type=git, url=https://www.redhat.com, config_id=tripleo_step1, container_name=memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, name=rhosp-rhel9/openstack-memcached, distribution-scope=public, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:12:26Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, summary=Red Hat OpenStack Platform 17.1 memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., batch=17.1_20260112.1, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, build-date=2026-01-12T22:12:26Z, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510) Feb 2 08:08:25 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:08:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:08:27 np0005604725 podman[80226]: 2026-02-02 08:08:27.326671264 +0000 UTC m=+0.078892305 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, name=rhosp-rhel9/openstack-qdrouterd, architecture=x86_64, com.redhat.component=openstack-qdrouterd-container, container_name=metrics_qdr, url=https://www.redhat.com, vcs-type=git, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:14Z, vendor=Red Hat, Inc., config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, build-date=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, release=1766032510, summary=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:08:27 np0005604725 podman[80226]: 2026-02-02 08:08:27.526680624 +0000 UTC m=+0.278901715 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, managed_by=tripleo_ansible, batch=17.1_20260112.1, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, build-date=2026-01-12T22:10:14Z, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:14Z, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, com.redhat.component=openstack-qdrouterd-container, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step1, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, architecture=x86_64, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, name=rhosp-rhel9/openstack-qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public) Feb 2 08:08:27 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:08:34 np0005604725 python3[80734]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/config_step.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:08:34 np0005604725 python3[80779]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/config_step.json force=True mode=0600 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019714.0711973-128545-249249646672659/source _original_basename=tmpwffz3k3o follow=False checksum=62439dd24dde40c90e7a39f6a1b31cc6061fe59b backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:08:36 np0005604725 python3[80849]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_3 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:08:38 np0005604725 ansible-async_wrapper.py[81122]: Invoked with 246365024675 3600 /home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019717.6329918-128939-187187056813024/AnsiballZ_command.py _ Feb 2 08:08:38 np0005604725 ansible-async_wrapper.py[81128]: Starting module and watcher Feb 2 08:08:38 np0005604725 ansible-async_wrapper.py[81128]: Start watching 81130 (3600) Feb 2 08:08:38 np0005604725 ansible-async_wrapper.py[81130]: Start module (81130) Feb 2 08:08:38 np0005604725 ansible-async_wrapper.py[81122]: Return async_wrapper task started. Feb 2 08:08:38 np0005604725 python3[81154]: ansible-ansible.legacy.async_status Invoked with jid=246365024675.81122 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:08:43 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:08:43 np0005604725 ansible-async_wrapper.py[81128]: 81130 still running (3600) Feb 2 08:08:43 np0005604725 systemd[1]: tmp-crun.jon2EG.mount: Deactivated successfully. Feb 2 08:08:43 np0005604725 podman[81408]: 2026-02-02 08:08:43.324659621 +0000 UTC m=+0.075136861 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, batch=17.1_20260112.1, com.redhat.component=openstack-mariadb-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, io.buildah.version=1.41.5, container_name=clustercheck, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step2, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:18Z, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, build-date=2026-01-12T22:10:18Z, managed_by=tripleo_ansible, url=https://www.redhat.com, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, vendor=Red Hat, Inc., release=1766032510, name=rhosp-rhel9/openstack-mariadb) Feb 2 08:08:43 np0005604725 podman[81408]: 2026-02-02 08:08:43.392847591 +0000 UTC m=+0.143324781 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, version=17.1.13, container_name=clustercheck, name=rhosp-rhel9/openstack-mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, distribution-scope=public, release=1766032510, com.redhat.component=openstack-mariadb-container, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, build-date=2026-01-12T22:10:18Z, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step2, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., batch=17.1_20260112.1, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-type=git, url=https://www.redhat.com) Feb 2 08:08:43 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:08:44 np0005604725 puppet-user[81153]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:08:44 np0005604725 puppet-user[81153]: (file: /etc/puppet/hiera.yaml) Feb 2 08:08:44 np0005604725 puppet-user[81153]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:08:44 np0005604725 puppet-user[81153]: (file & line not available) Feb 2 08:08:44 np0005604725 puppet-user[81153]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:08:44 np0005604725 puppet-user[81153]: (file & line not available) Feb 2 08:08:44 np0005604725 puppet-user[81153]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/database/mysql/client.pp, line: 89, column: 8) Feb 2 08:08:45 np0005604725 puppet-user[81153]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/packages.pp, line: 39, column: 69) Feb 2 08:08:45 np0005604725 puppet-user[81153]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.41 seconds Feb 2 08:08:46 np0005604725 puppet-user[81153]: Notice: Applied catalog in 1.44 seconds Feb 2 08:08:46 np0005604725 puppet-user[81153]: Application: Feb 2 08:08:46 np0005604725 puppet-user[81153]: Initial environment: production Feb 2 08:08:46 np0005604725 puppet-user[81153]: Converged environment: production Feb 2 08:08:46 np0005604725 puppet-user[81153]: Run mode: user Feb 2 08:08:46 np0005604725 puppet-user[81153]: Changes: Feb 2 08:08:46 np0005604725 puppet-user[81153]: Events: Feb 2 08:08:46 np0005604725 puppet-user[81153]: Resources: Feb 2 08:08:46 np0005604725 puppet-user[81153]: Total: 23 Feb 2 08:08:46 np0005604725 puppet-user[81153]: Time: Feb 2 08:08:46 np0005604725 puppet-user[81153]: Schedule: 0.00 Feb 2 08:08:46 np0005604725 puppet-user[81153]: File line: 0.00 Feb 2 08:08:46 np0005604725 puppet-user[81153]: Package: 0.00 Feb 2 08:08:46 np0005604725 puppet-user[81153]: File: 0.00 Feb 2 08:08:46 np0005604725 puppet-user[81153]: User: 0.01 Feb 2 08:08:46 np0005604725 puppet-user[81153]: Augeas: 0.01 Feb 2 08:08:46 np0005604725 puppet-user[81153]: Service: 0.06 Feb 2 08:08:46 np0005604725 puppet-user[81153]: Config retrieval: 0.47 Feb 2 08:08:46 np0005604725 puppet-user[81153]: Exec: 1.24 Feb 2 08:08:46 np0005604725 puppet-user[81153]: Transaction evaluation: 1.43 Feb 2 08:08:46 np0005604725 puppet-user[81153]: Catalog application: 1.44 Feb 2 08:08:46 np0005604725 puppet-user[81153]: Last run: 1770019726 Feb 2 08:08:46 np0005604725 puppet-user[81153]: Filebucket: 0.00 Feb 2 08:08:46 np0005604725 puppet-user[81153]: Total: 1.44 Feb 2 08:08:46 np0005604725 puppet-user[81153]: Version: Feb 2 08:08:46 np0005604725 puppet-user[81153]: Config: 1770019724 Feb 2 08:08:46 np0005604725 puppet-user[81153]: Puppet: 7.10.0 Feb 2 08:08:46 np0005604725 ansible-async_wrapper.py[81130]: Module complete (81130) Feb 2 08:08:48 np0005604725 ansible-async_wrapper.py[81128]: Done in kid B. Feb 2 08:08:48 np0005604725 python3[81957]: ansible-ansible.legacy.async_status Invoked with jid=246365024675.81122 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:08:49 np0005604725 python3[81999]: ansible-file Invoked with path=/var/lib/container-puppet/puppetlabs state=directory setype=svirt_sandbox_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Feb 2 08:08:50 np0005604725 python3[82015]: ansible-stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:08:50 np0005604725 python3[82089]: ansible-ansible.legacy.stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:08:51 np0005604725 python3[82107]: ansible-ansible.legacy.file Invoked with setype=svirt_sandbox_file_t selevel=s0 dest=/var/lib/container-puppet/puppetlabs/facter.conf _original_basename=tmpw4qkq_dg recurse=False state=file path=/var/lib/container-puppet/puppetlabs/facter.conf force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Feb 2 08:08:51 np0005604725 python3[82153]: ansible-file Invoked with path=/opt/puppetlabs/facter state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:08:52 np0005604725 python3[82329]: ansible-ansible.posix.synchronize Invoked with src=/opt/puppetlabs/ dest=/var/lib/container-puppet/puppetlabs/ _local_rsync_path=rsync _local_rsync_password=NOT_LOGGING_PARAMETER rsync_path=None delete=False _substitute_controller=False archive=True checksum=False compress=True existing_only=False dirs=False copy_links=False set_remote_user=True rsync_timeout=0 rsync_opts=[] ssh_connection_multiplexing=False partial=False verify_host=False mode=push dest_port=None private_key=None recursive=None links=None perms=None times=None owner=None group=None ssh_args=None link_dest=None Feb 2 08:08:53 np0005604725 python3[82363]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:08:54 np0005604725 python3[82461]: ansible-stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:08:55 np0005604725 python3[82519]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-container-shutdown follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:08:55 np0005604725 python3[82537]: ansible-ansible.legacy.file Invoked with mode=0700 owner=root group=root dest=/usr/libexec/tripleo-container-shutdown _original_basename=tripleo-container-shutdown recurse=False state=file path=/usr/libexec/tripleo-container-shutdown force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:08:55 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:08:56 np0005604725 podman[82624]: 2026-02-02 08:08:55.998150701 +0000 UTC m=+0.062495219 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, io.openshift.expose-services=, container_name=memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, build-date=2026-01-12T22:12:26Z, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, config_id=tripleo_step1, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vcs-type=git, com.redhat.component=openstack-memcached-container, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.buildah.version=1.41.5, managed_by=tripleo_ansible, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 memcached, name=rhosp-rhel9/openstack-memcached) Feb 2 08:08:56 np0005604725 podman[82624]: 2026-02-02 08:08:56.01691027 +0000 UTC m=+0.081254808 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, summary=Red Hat OpenStack Platform 17.1 memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, description=Red Hat OpenStack Platform 17.1 memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, name=rhosp-rhel9/openstack-memcached, com.redhat.component=openstack-memcached-container, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:12:26Z, io.buildah.version=1.41.5, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:12:26Z, config_id=tripleo_step1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, managed_by=tripleo_ansible, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vcs-type=git, io.openshift.expose-services=, tcib_managed=true, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:08:56 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:08:56 np0005604725 python3[82623]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-start-podman-container follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:08:56 np0005604725 python3[82661]: ansible-ansible.legacy.file Invoked with mode=0700 owner=root group=root dest=/usr/libexec/tripleo-start-podman-container _original_basename=tripleo-start-podman-container recurse=False state=file path=/usr/libexec/tripleo-start-podman-container force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:08:56 np0005604725 python3[82747]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/tripleo-container-shutdown.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:08:57 np0005604725 python3[82818]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system/tripleo-container-shutdown.service _original_basename=tripleo-container-shutdown-service recurse=False state=file path=/usr/lib/systemd/system/tripleo-container-shutdown.service force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:08:57 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:08:57 np0005604725 systemd[1]: tmp-crun.Aa7IBc.mount: Deactivated successfully. Feb 2 08:08:57 np0005604725 podman[82897]: 2026-02-02 08:08:57.736708241 +0000 UTC m=+0.069583173 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, container_name=metrics_qdr, summary=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp-rhel9/openstack-qdrouterd, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step1, managed_by=tripleo_ansible, build-date=2026-01-12T22:10:14Z, com.redhat.component=openstack-qdrouterd-container, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-type=git, io.buildah.version=1.41.5, tcib_managed=true, vendor=Red Hat, Inc.) Feb 2 08:08:57 np0005604725 python3[82896]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:08:57 np0005604725 podman[82897]: 2026-02-02 08:08:57.91983078 +0000 UTC m=+0.252705762 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-qdrouterd-container, config_id=tripleo_step1, tcib_managed=true, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr, org.opencontainers.image.created=2026-01-12T22:10:14Z, release=1766032510, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, name=rhosp-rhel9/openstack-qdrouterd, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, build-date=2026-01-12T22:10:14Z, io.buildah.version=1.41.5) Feb 2 08:08:57 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:08:58 np0005604725 python3[82966]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset _original_basename=91-tripleo-container-shutdown-preset recurse=False state=file path=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:08:58 np0005604725 python3[83034]: ansible-systemd Invoked with name=tripleo-container-shutdown state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:08:58 np0005604725 systemd[1]: Reloading. Feb 2 08:08:58 np0005604725 systemd-rc-local-generator[83076]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:08:58 np0005604725 systemd-sysv-generator[83082]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:08:58 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:08:59 np0005604725 python3[83206]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/netns-placeholder.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:08:59 np0005604725 python3[83224]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system/netns-placeholder.service _original_basename=netns-placeholder-service recurse=False state=file path=/usr/lib/systemd/system/netns-placeholder.service force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:00 np0005604725 python3[83317]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-netns-placeholder.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:09:00 np0005604725 python3[83351]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system-preset/91-netns-placeholder.preset _original_basename=91-netns-placeholder-preset recurse=False state=file path=/usr/lib/systemd/system-preset/91-netns-placeholder.preset force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:01 np0005604725 podman[83426]: 2026-02-02 08:09:01.166751083 +0000 UTC m=+0.066631874 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, vendor=Red Hat, Inc., vcs-type=git, com.redhat.component=openstack-mariadb-container, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:18Z, io.buildah.version=1.41.5, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb) Feb 2 08:09:01 np0005604725 podman[83426]: 2026-02-02 08:09:01.171008702 +0000 UTC m=+0.070889453 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., distribution-scope=public, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:10:18Z, version=17.1.13, name=rhosp-rhel9/openstack-mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.openshift.expose-services=, com.redhat.component=openstack-mariadb-container, summary=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1) Feb 2 08:09:01 np0005604725 systemd[1]: tmp-crun.6Hj6Oa.mount: Deactivated successfully. Feb 2 08:09:01 np0005604725 podman[83474]: 2026-02-02 08:09:01.299896234 +0000 UTC m=+0.066643324 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, tcib_managed=true, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:12Z, summary=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, io.buildah.version=1.41.5, io.openshift.expose-services=, version=17.1.13, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 haproxy, url=https://www.redhat.com, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:12Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, name=rhosp-rhel9/openstack-haproxy) Feb 2 08:09:01 np0005604725 podman[83474]: 2026-02-02 08:09:01.330172113 +0000 UTC m=+0.096919203 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, distribution-scope=public, build-date=2026-01-12T22:10:12Z, url=https://www.redhat.com, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, batch=17.1_20260112.1, tcib_managed=true, name=rhosp-rhel9/openstack-haproxy, com.redhat.component=openstack-haproxy-container, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team) Feb 2 08:09:01 np0005604725 podman[83488]: 2026-02-02 08:09:01.377366615 +0000 UTC m=+0.107894366 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:14Z, distribution-scope=public, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, url=https://www.redhat.com, io.openshift.expose-services=, release=1766032510, com.redhat.component=openstack-rabbitmq-container, architecture=x86_64, version=17.1.13, io.buildah.version=1.41.5, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:14Z, name=rhosp-rhel9/openstack-rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq) Feb 2 08:09:01 np0005604725 podman[83488]: 2026-02-02 08:09:01.405350505 +0000 UTC m=+0.135878226 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, name=rhosp-rhel9/openstack-rabbitmq, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-rabbitmq-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 rabbitmq, release=1766032510, vcs-type=git, io.buildah.version=1.41.5, build-date=2026-01-12T22:10:14Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://www.redhat.com) Feb 2 08:09:01 np0005604725 podman[83535]: 2026-02-02 08:09:01.504934737 +0000 UTC m=+0.103346848 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, vendor=Red Hat, Inc., io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 redis, batch=17.1_20260112.1, build-date=2026-01-12T22:10:16Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, maintainer=OpenStack TripleO Team, vcs-type=git, name=rhosp-rhel9/openstack-redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, com.redhat.component=openstack-redis-container, org.opencontainers.image.created=2026-01-12T22:10:16Z, summary=Red Hat OpenStack Platform 17.1 redis, tcib_managed=true) Feb 2 08:09:01 np0005604725 python3[83480]: ansible-systemd Invoked with name=netns-placeholder state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:09:01 np0005604725 systemd[1]: Reloading. Feb 2 08:09:01 np0005604725 podman[83535]: 2026-02-02 08:09:01.537727762 +0000 UTC m=+0.136139893 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, build-date=2026-01-12T22:10:16Z, release=1766032510, io.buildah.version=1.41.5, tcib_managed=true, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:16Z, vcs-type=git, name=rhosp-rhel9/openstack-redis, com.redhat.component=openstack-redis-container, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 redis, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, summary=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, architecture=x86_64) Feb 2 08:09:01 np0005604725 systemd-rc-local-generator[83597]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:09:01 np0005604725 systemd-sysv-generator[83600]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:09:01 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:09:01 np0005604725 systemd[1]: tmp-crun.0tmGNe.mount: Deactivated successfully. Feb 2 08:09:02 np0005604725 systemd[1]: Starting Create netns directory... Feb 2 08:09:02 np0005604725 systemd[1]: run-netns-placeholder.mount: Deactivated successfully. Feb 2 08:09:02 np0005604725 systemd[1]: netns-placeholder.service: Deactivated successfully. Feb 2 08:09:02 np0005604725 systemd[1]: Finished Create netns directory. Feb 2 08:09:03 np0005604725 python3[83737]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Feb 2 08:09:06 np0005604725 python3[83943]: ansible-tripleo_container_manage Invoked with config_id=tripleo_step3 config_dir=/var/lib/tripleo-config/container-startup-config/step_3 config_patterns=*.json config_overrides={} concurrency=5 log_base_path=/var/log/containers/stdouts debug=False Feb 2 08:09:06 np0005604725 podman[84108]: 2026-02-02 08:09:06.41659209 +0000 UTC m=+0.079346670 container create 7f713137b874e7ac5b459bafa96ce4d371ba5ad472fcacd72966acecb73887d0 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_db_sync, name=rhosp-rhel9/openstack-cinder-api, com.redhat.component=openstack-cinder-api-container, batch=17.1_20260112.1, architecture=x86_64, io.openshift.expose-services=, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, tcib_managed=true, container_name=cinder_api_db_sync, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, io.buildah.version=1.41.5, vcs-type=git, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, config_id=tripleo_step3, distribution-scope=public, build-date=2026-01-12T22:58:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 cinder-api) Feb 2 08:09:06 np0005604725 podman[84105]: 2026-02-02 08:09:06.440577637 +0000 UTC m=+0.105608345 container create 995bceadea8bd85ce9eac4694264d6165444c0533bb6d931044f2d7fe436ca61 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1, name=cinder_backup_init_logs, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-backup, managed_by=tripleo_ansible, vendor=Red Hat, Inc., url=https://www.redhat.com, config_id=tripleo_step3, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-backup, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 cinder-backup, batch=17.1_20260112.1, distribution-scope=public, container_name=cinder_backup_init_logs, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-backup, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 cinder-backup, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, release=1766032510, build-date=2026-01-12T22:57:28Z, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:57:28Z, version=17.1.13, vcs-type=git, name=rhosp-rhel9/openstack-cinder-backup, architecture=x86_64, com.redhat.component=openstack-cinder-backup-container, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:09:06 np0005604725 systemd[1]: Started libpod-conmon-7f713137b874e7ac5b459bafa96ce4d371ba5ad472fcacd72966acecb73887d0.scope. Feb 2 08:09:06 np0005604725 podman[84114]: 2026-02-02 08:09:06.461191834 +0000 UTC m=+0.111754813 container create 8ef072866506af69df8328c99b84754898361120a403a502fe84c5b14f2e38eb (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1, name=cinder_volume_init_logs, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder']}, io.openshift.expose-services=, name=rhosp-rhel9/openstack-cinder-volume, org.opencontainers.image.created=2026-01-12T22:58:35Z, batch=17.1_20260112.1, version=17.1.13, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, summary=Red Hat OpenStack Platform 17.1 cinder-volume, io.buildah.version=1.41.5, architecture=x86_64, container_name=cinder_volume_init_logs, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., tcib_managed=true, url=https://www.redhat.com, build-date=2026-01-12T22:58:35Z, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 cinder-volume, com.redhat.component=openstack-cinder-volume-container, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, config_id=tripleo_step3, maintainer=OpenStack TripleO Team, vcs-type=git, release=1766032510) Feb 2 08:09:06 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:06 np0005604725 systemd[1]: Started libpod-conmon-995bceadea8bd85ce9eac4694264d6165444c0533bb6d931044f2d7fe436ca61.scope. Feb 2 08:09:06 np0005604725 podman[84108]: 2026-02-02 08:09:06.375191833 +0000 UTC m=+0.037946443 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Feb 2 08:09:06 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/dd2495b91082993b6fc8cfbbcbb05acd7e7f33ed0c312a342fb3bfab0b3c2fbd/merged/var/log/cinder supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:06 np0005604725 systemd[1]: Started libpod-conmon-8ef072866506af69df8328c99b84754898361120a403a502fe84c5b14f2e38eb.scope. Feb 2 08:09:06 np0005604725 podman[84114]: 2026-02-02 08:09:06.379652298 +0000 UTC m=+0.030215287 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 Feb 2 08:09:06 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:06 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/850bef250b055e076678ec9a701218a79acc183c439996df243863e1a117d07d/merged/var/log/cinder supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:06 np0005604725 podman[84105]: 2026-02-02 08:09:06.387559438 +0000 UTC m=+0.052590136 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 Feb 2 08:09:06 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:06 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d3fc54cb53ae9fdadb3214e0b459f632bf9bba5e6e28646810bd500da8fb2439/merged/var/log/cinder supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:06 np0005604725 podman[84165]: 2026-02-02 08:09:06.492835554 +0000 UTC m=+0.082444864 container create aeb70b7e73200fa21de1583b798fa28a5ae845304b58a1b7f63200984949892c (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_init_log, com.redhat.component=openstack-ceilometer-notification-container, architecture=x86_64, name=rhosp-rhel9/openstack-ceilometer-notification, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, version=17.1.13, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T23:07:25Z, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, managed_by=tripleo_ansible, tcib_managed=true, vcs-type=git, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, vendor=Red Hat, Inc., org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'command': ['/bin/bash', '-c', 'chown -R ceilometer:ceilometer /var/log/ceilometer'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'none', 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/ceilometer:/var/log/ceilometer:z']}, config_id=tripleo_step3, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T23:07:25Z, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, container_name=ceilometer_init_log, io.buildah.version=1.41.5, distribution-scope=public) Feb 2 08:09:06 np0005604725 podman[84114]: 2026-02-02 08:09:06.500369743 +0000 UTC m=+0.150932722 container init 8ef072866506af69df8328c99b84754898361120a403a502fe84c5b14f2e38eb (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1, name=cinder_volume_init_logs, io.buildah.version=1.41.5, vendor=Red Hat, Inc., vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, version=17.1.13, description=Red Hat OpenStack Platform 17.1 cinder-volume, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:58:35Z, batch=17.1_20260112.1, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 cinder-volume, com.redhat.component=openstack-cinder-volume-container, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-cinder-volume, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, maintainer=OpenStack TripleO Team, container_name=cinder_volume_init_logs, release=1766032510, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, build-date=2026-01-12T22:58:35Z, distribution-scope=public, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder']}) Feb 2 08:09:06 np0005604725 systemd[1]: libpod-8ef072866506af69df8328c99b84754898361120a403a502fe84c5b14f2e38eb.scope: Deactivated successfully. Feb 2 08:09:06 np0005604725 podman[84133]: 2026-02-02 08:09:06.512886702 +0000 UTC m=+0.149847258 container create 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, org.opencontainers.image.created=2026-01-12T22:10:15Z, release=1766032510, summary=Red Hat OpenStack Platform 17.1 collectd, config_id=tripleo_step3, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:15Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, com.redhat.component=openstack-collectd-container, io.buildah.version=1.41.5, container_name=collectd, vcs-type=git, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, io.openshift.expose-services=, distribution-scope=public, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, url=https://www.redhat.com) Feb 2 08:09:06 np0005604725 podman[84133]: 2026-02-02 08:09:06.416435585 +0000 UTC m=+0.053396161 image pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Feb 2 08:09:06 np0005604725 systemd[1]: Started libpod-conmon-aeb70b7e73200fa21de1583b798fa28a5ae845304b58a1b7f63200984949892c.scope. Feb 2 08:09:06 np0005604725 systemd[1]: Started libpod-conmon-3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.scope. Feb 2 08:09:06 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:06 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/df401e5b7f56f3f6e4aea814141e5e6a0d316af4df7e1386f729345e52455019/merged/var/log/ceilometer supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:06 np0005604725 podman[84105]: 2026-02-02 08:09:06.54675557 +0000 UTC m=+0.211786278 container init 995bceadea8bd85ce9eac4694264d6165444c0533bb6d931044f2d7fe436ca61 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1, name=cinder_backup_init_logs, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vendor=Red Hat, Inc., distribution-scope=public, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, com.redhat.component=openstack-cinder-backup-container, container_name=cinder_backup_init_logs, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-backup, config_id=tripleo_step3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-backup, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 cinder-backup, name=rhosp-rhel9/openstack-cinder-backup, release=1766032510, maintainer=OpenStack TripleO Team, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-backup, tcib_managed=true, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, build-date=2026-01-12T22:57:28Z, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 cinder-backup, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:57:28Z) Feb 2 08:09:06 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:06 np0005604725 podman[84108]: 2026-02-02 08:09:06.550802644 +0000 UTC m=+0.213557224 container init 7f713137b874e7ac5b459bafa96ce4d371ba5ad472fcacd72966acecb73887d0 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_db_sync, io.openshift.expose-services=, tcib_managed=true, vcs-type=git, architecture=x86_64, build-date=2026-01-12T22:58:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 cinder-api, distribution-scope=public, release=1766032510, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, config_id=tripleo_step3, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=cinder_api_db_sync, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, summary=Red Hat OpenStack Platform 17.1 cinder-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc.) Feb 2 08:09:06 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/aad27a77cdfd73b2b675c7348904c919c78c90252a197dc1674df2423ecf6f95/merged/scripts supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:06 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/aad27a77cdfd73b2b675c7348904c919c78c90252a197dc1674df2423ecf6f95/merged/var/log/collectd supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:06 np0005604725 podman[84165]: 2026-02-02 08:09:06.453410787 +0000 UTC m=+0.043020117 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 Feb 2 08:09:06 np0005604725 podman[84105]: 2026-02-02 08:09:06.55363395 +0000 UTC m=+0.218664658 container start 995bceadea8bd85ce9eac4694264d6165444c0533bb6d931044f2d7fe436ca61 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1, name=cinder_backup_init_logs, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-backup, io.openshift.expose-services=, name=rhosp-rhel9/openstack-cinder-backup, architecture=x86_64, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-backup, com.redhat.component=openstack-cinder-backup-container, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 cinder-backup, config_id=tripleo_step3, vcs-type=git, distribution-scope=public, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-backup, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-backup, build-date=2026-01-12T22:57:28Z, url=https://www.redhat.com, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, container_name=cinder_backup_init_logs, managed_by=tripleo_ansible, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:57:28Z, version=17.1.13, vendor=Red Hat, Inc.) Feb 2 08:09:06 np0005604725 podman[84108]: 2026-02-02 08:09:06.557216578 +0000 UTC m=+0.219971168 container start 7f713137b874e7ac5b459bafa96ce4d371ba5ad472fcacd72966acecb73887d0 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_db_sync, vcs-type=git, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, architecture=x86_64, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, io.buildah.version=1.41.5, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=cinder_api_db_sync, config_id=tripleo_step3, vendor=Red Hat, Inc., org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, url=https://www.redhat.com, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, com.redhat.component=openstack-cinder-api-container, distribution-scope=public, build-date=2026-01-12T22:58:44Z, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:09:06 np0005604725 systemd[1]: libpod-995bceadea8bd85ce9eac4694264d6165444c0533bb6d931044f2d7fe436ca61.scope: Deactivated successfully. Feb 2 08:09:06 np0005604725 podman[84108]: 2026-02-02 08:09:06.557906329 +0000 UTC m=+0.220660919 container attach 7f713137b874e7ac5b459bafa96ce4d371ba5ad472fcacd72966acecb73887d0 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_db_sync, batch=17.1_20260112.1, url=https://www.redhat.com, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, architecture=x86_64, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, release=1766032510, container_name=cinder_api_db_sync, vcs-type=git, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:58:44Z, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, version=17.1.13, config_id=tripleo_step3, vendor=Red Hat, Inc., build-date=2026-01-12T22:58:44Z) Feb 2 08:09:06 np0005604725 podman[84114]: 2026-02-02 08:09:06.559023913 +0000 UTC m=+0.209586892 container start 8ef072866506af69df8328c99b84754898361120a403a502fe84c5b14f2e38eb (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1, name=cinder_volume_init_logs, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, config_id=tripleo_step3, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=cinder_volume_init_logs, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, vendor=Red Hat, Inc., url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 cinder-volume, com.redhat.component=openstack-cinder-volume-container, managed_by=tripleo_ansible, version=17.1.13, release=1766032510, build-date=2026-01-12T22:58:35Z, name=rhosp-rhel9/openstack-cinder-volume, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, batch=17.1_20260112.1, tcib_managed=true, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 cinder-volume, org.opencontainers.image.created=2026-01-12T22:58:35Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64) Feb 2 08:09:06 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name cinder_backup_init_logs --conmon-pidfile /run/cinder_backup_init_logs.pid --detach=True --label config_id=tripleo_step3 --label container_name=cinder_backup_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/cinder_backup_init_logs.log --network none --privileged=False --user root --volume /var/log/containers/cinder:/var/log/cinder:z registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 /bin/bash -c chown -R cinder:cinder /var/log/cinder Feb 2 08:09:06 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name cinder_volume_init_logs --conmon-pidfile /run/cinder_volume_init_logs.pid --detach=True --label config_id=tripleo_step3 --label container_name=cinder_volume_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/cinder_volume_init_logs.log --network none --privileged=False --user root --volume /var/log/containers/cinder:/var/log/cinder registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 /bin/bash -c chown -R cinder:cinder /var/log/cinder Feb 2 08:09:06 np0005604725 podman[84226]: 2026-02-02 08:09:06.602790881 +0000 UTC m=+0.035882150 container died 995bceadea8bd85ce9eac4694264d6165444c0533bb6d931044f2d7fe436ca61 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1, name=cinder_backup_init_logs, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-backup, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:57:28Z, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-backup, build-date=2026-01-12T22:57:28Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-backup, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-cinder-backup, io.openshift.expose-services=, managed_by=tripleo_ansible, url=https://www.redhat.com, io.buildah.version=1.41.5, config_id=tripleo_step3, distribution-scope=public, version=17.1.13, release=1766032510, summary=Red Hat OpenStack Platform 17.1 cinder-backup, description=Red Hat OpenStack Platform 17.1 cinder-backup, tcib_managed=true, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, maintainer=OpenStack TripleO Team, container_name=cinder_backup_init_logs, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.component=openstack-cinder-backup-container, vcs-type=git) Feb 2 08:09:06 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:09:06 np0005604725 podman[84133]: 2026-02-02 08:09:06.62417023 +0000 UTC m=+0.261130796 container init 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, description=Red Hat OpenStack Platform 17.1 collectd, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:15Z, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:15Z, summary=Red Hat OpenStack Platform 17.1 collectd, config_id=tripleo_step3, tcib_managed=true, batch=17.1_20260112.1, release=1766032510, container_name=collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, vcs-type=git, version=17.1.13, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-collectd-container, io.openshift.expose-services=, url=https://www.redhat.com, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-collectd, architecture=x86_64, vendor=Red Hat, Inc.) Feb 2 08:09:06 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:09:06 np0005604725 systemd-logind[36465]: Existing logind session ID 15 used by new audit session, ignoring. Feb 2 08:09:06 np0005604725 podman[84133]: 2026-02-02 08:09:06.652283934 +0000 UTC m=+0.289244480 container start 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, release=1766032510, summary=Red Hat OpenStack Platform 17.1 collectd, description=Red Hat OpenStack Platform 17.1 collectd, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, name=rhosp-rhel9/openstack-collectd, url=https://www.redhat.com, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:15Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, distribution-scope=public, com.redhat.component=openstack-collectd-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, io.openshift.expose-services=, build-date=2026-01-12T22:10:15Z, architecture=x86_64, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, batch=17.1_20260112.1, config_id=tripleo_step3, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team) Feb 2 08:09:06 np0005604725 systemd[1]: Created slice User Slice of UID 0. Feb 2 08:09:06 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name collectd --cap-add IPC_LOCK --conmon-pidfile /run/collectd.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=0a0af6a6a39e15fddd775e0090d092bc --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step3 --label container_name=collectd --label managed_by=tripleo_ansible --label config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/collectd.log --memory 512m --network host --pid host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro --volume /var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro --volume /var/log/containers/collectd:/var/log/collectd:rw,z --volume /var/lib/container-config-scripts:/config-scripts:ro --volume /var/lib/container-user-scripts:/scripts:z --volume /run:/run:rw --volume /sys/fs/cgroup:/sys/fs/cgroup:ro registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Feb 2 08:09:06 np0005604725 systemd[1]: Starting User Runtime Directory /run/user/0... Feb 2 08:09:06 np0005604725 systemd[1]: Finished User Runtime Directory /run/user/0. Feb 2 08:09:06 np0005604725 podman[84228]: 2026-02-02 08:09:06.672977841 +0000 UTC m=+0.101770799 container died 8ef072866506af69df8328c99b84754898361120a403a502fe84c5b14f2e38eb (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1, name=cinder_volume_init_logs, build-date=2026-01-12T22:58:35Z, distribution-scope=public, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, batch=17.1_20260112.1, vcs-type=git, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, org.opencontainers.image.created=2026-01-12T22:58:35Z, architecture=x86_64, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, managed_by=tripleo_ansible, container_name=cinder_volume_init_logs, description=Red Hat OpenStack Platform 17.1 cinder-volume, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-volume, vendor=Red Hat, Inc., com.redhat.component=openstack-cinder-volume-container, summary=Red Hat OpenStack Platform 17.1 cinder-volume, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder']}, config_id=tripleo_step3, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:09:06 np0005604725 systemd[1]: Starting User Manager for UID 0... Feb 2 08:09:06 np0005604725 podman[84165]: 2026-02-02 08:09:06.7025716 +0000 UTC m=+0.292180920 container init aeb70b7e73200fa21de1583b798fa28a5ae845304b58a1b7f63200984949892c (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_init_log, batch=17.1_20260112.1, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, config_id=tripleo_step3, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, url=https://www.redhat.com, build-date=2026-01-12T23:07:25Z, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, version=17.1.13, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, container_name=ceilometer_init_log, com.redhat.component=openstack-ceilometer-notification-container, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, config_data={'command': ['/bin/bash', '-c', 'chown -R ceilometer:ceilometer /var/log/ceilometer'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'none', 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/ceilometer:/var/log/ceilometer:z']}, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T23:07:25Z, name=rhosp-rhel9/openstack-ceilometer-notification, vendor=Red Hat, Inc.) Feb 2 08:09:06 np0005604725 podman[84165]: 2026-02-02 08:09:06.710087928 +0000 UTC m=+0.299697248 container start aeb70b7e73200fa21de1583b798fa28a5ae845304b58a1b7f63200984949892c (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_init_log, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'command': ['/bin/bash', '-c', 'chown -R ceilometer:ceilometer /var/log/ceilometer'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'none', 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/ceilometer:/var/log/ceilometer:z']}, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vcs-type=git, managed_by=tripleo_ansible, version=17.1.13, name=rhosp-rhel9/openstack-ceilometer-notification, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.openshift.expose-services=, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, com.redhat.component=openstack-ceilometer-notification-container, architecture=x86_64, container_name=ceilometer_init_log, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T23:07:25Z, batch=17.1_20260112.1, build-date=2026-01-12T23:07:25Z, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification) Feb 2 08:09:06 np0005604725 systemd[1]: libpod-aeb70b7e73200fa21de1583b798fa28a5ae845304b58a1b7f63200984949892c.scope: Deactivated successfully. Feb 2 08:09:06 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name ceilometer_init_log --conmon-pidfile /run/ceilometer_init_log.pid --detach=True --label config_id=tripleo_step3 --label container_name=ceilometer_init_log --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R ceilometer:ceilometer /var/log/ceilometer'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'none', 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/ceilometer:/var/log/ceilometer:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/ceilometer_init_log.log --network none --user root --volume /var/log/containers/ceilometer:/var/log/ceilometer:z registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 /bin/bash -c chown -R ceilometer:ceilometer /var/log/ceilometer Feb 2 08:09:06 np0005604725 podman[84200]: 2026-02-02 08:09:06.750702621 +0000 UTC m=+0.234822679 container cleanup 8ef072866506af69df8328c99b84754898361120a403a502fe84c5b14f2e38eb (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1, name=cinder_volume_init_logs, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:58:35Z, vcs-type=git, release=1766032510, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 cinder-volume, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder']}, batch=17.1_20260112.1, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, distribution-scope=public, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 cinder-volume, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=cinder_volume_init_logs, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, version=17.1.13, tcib_managed=true, com.redhat.component=openstack-cinder-volume-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, architecture=x86_64, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, name=rhosp-rhel9/openstack-cinder-volume, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, org.opencontainers.image.created=2026-01-12T22:58:35Z, io.openshift.expose-services=) Feb 2 08:09:06 np0005604725 systemd[1]: libpod-conmon-8ef072866506af69df8328c99b84754898361120a403a502fe84c5b14f2e38eb.scope: Deactivated successfully. Feb 2 08:09:06 np0005604725 systemd[1]: libpod-7f713137b874e7ac5b459bafa96ce4d371ba5ad472fcacd72966acecb73887d0.scope: Deactivated successfully. Feb 2 08:09:06 np0005604725 systemd[84281]: Queued start job for default target Main User Target. Feb 2 08:09:06 np0005604725 systemd[84281]: Created slice User Application Slice. Feb 2 08:09:06 np0005604725 systemd[84281]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Feb 2 08:09:06 np0005604725 systemd[84281]: Started Daily Cleanup of User's Temporary Directories. Feb 2 08:09:06 np0005604725 systemd[84281]: Reached target Paths. Feb 2 08:09:06 np0005604725 systemd[84281]: Reached target Timers. Feb 2 08:09:06 np0005604725 podman[84298]: 2026-02-02 08:09:06.824885362 +0000 UTC m=+0.097185410 container died aeb70b7e73200fa21de1583b798fa28a5ae845304b58a1b7f63200984949892c (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_init_log, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vendor=Red Hat, Inc., container_name=ceilometer_init_log, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:07:25Z, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, name=rhosp-rhel9/openstack-ceilometer-notification, vcs-type=git, version=17.1.13, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, managed_by=tripleo_ansible, build-date=2026-01-12T23:07:25Z, architecture=x86_64, release=1766032510, distribution-scope=public, config_data={'command': ['/bin/bash', '-c', 'chown -R ceilometer:ceilometer /var/log/ceilometer'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'none', 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/ceilometer:/var/log/ceilometer:z']}, com.redhat.component=openstack-ceilometer-notification-container, io.buildah.version=1.41.5, batch=17.1_20260112.1) Feb 2 08:09:06 np0005604725 systemd[84281]: Starting D-Bus User Message Bus Socket... Feb 2 08:09:06 np0005604725 systemd[84281]: Starting Create User's Volatile Files and Directories... Feb 2 08:09:06 np0005604725 podman[84226]: 2026-02-02 08:09:06.8382972 +0000 UTC m=+0.271388439 container cleanup 995bceadea8bd85ce9eac4694264d6165444c0533bb6d931044f2d7fe436ca61 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1, name=cinder_backup_init_logs, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-backup, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-backup, com.redhat.component=openstack-cinder-backup-container, summary=Red Hat OpenStack Platform 17.1 cinder-backup, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, build-date=2026-01-12T22:57:28Z, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, vcs-type=git, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 cinder-backup, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vendor=Red Hat, Inc., distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-backup, architecture=x86_64, release=1766032510, config_data={'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, name=rhosp-rhel9/openstack-cinder-backup, tcib_managed=true, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:57:28Z, config_id=tripleo_step3, batch=17.1_20260112.1, container_name=cinder_backup_init_logs, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e) Feb 2 08:09:06 np0005604725 podman[84298]: 2026-02-02 08:09:06.841717563 +0000 UTC m=+0.114017601 container cleanup aeb70b7e73200fa21de1583b798fa28a5ae845304b58a1b7f63200984949892c (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_init_log, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, container_name=ceilometer_init_log, architecture=x86_64, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step3, config_data={'command': ['/bin/bash', '-c', 'chown -R ceilometer:ceilometer /var/log/ceilometer'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'none', 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/ceilometer:/var/log/ceilometer:z']}, version=17.1.13, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 ceilometer-notification, release=1766032510, build-date=2026-01-12T23:07:25Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, tcib_managed=true, org.opencontainers.image.created=2026-01-12T23:07:25Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, batch=17.1_20260112.1, url=https://www.redhat.com, distribution-scope=public, io.openshift.expose-services=, name=rhosp-rhel9/openstack-ceilometer-notification, com.redhat.component=openstack-ceilometer-notification-container, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:09:06 np0005604725 systemd[1]: libpod-conmon-995bceadea8bd85ce9eac4694264d6165444c0533bb6d931044f2d7fe436ca61.scope: Deactivated successfully. Feb 2 08:09:06 np0005604725 systemd[84281]: Finished Create User's Volatile Files and Directories. Feb 2 08:09:06 np0005604725 systemd[1]: libpod-conmon-aeb70b7e73200fa21de1583b798fa28a5ae845304b58a1b7f63200984949892c.scope: Deactivated successfully. Feb 2 08:09:06 np0005604725 systemd[84281]: Listening on D-Bus User Message Bus Socket. Feb 2 08:09:06 np0005604725 systemd[84281]: Reached target Sockets. Feb 2 08:09:06 np0005604725 systemd[84281]: Reached target Basic System. Feb 2 08:09:06 np0005604725 systemd[84281]: Reached target Main User Target. Feb 2 08:09:06 np0005604725 systemd[84281]: Startup finished in 117ms. Feb 2 08:09:06 np0005604725 systemd[1]: Started User Manager for UID 0. Feb 2 08:09:06 np0005604725 systemd[1]: Started Session c1 of User root. Feb 2 08:09:06 np0005604725 podman[84263]: 2026-02-02 08:09:06.902337063 +0000 UTC m=+0.245998858 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=starting, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-collectd-container, name=rhosp-rhel9/openstack-collectd, maintainer=OpenStack TripleO Team, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, org.opencontainers.image.created=2026-01-12T22:10:15Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, version=17.1.13, distribution-scope=public, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, batch=17.1_20260112.1, vcs-type=git, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 collectd, config_id=tripleo_step3, description=Red Hat OpenStack Platform 17.1 collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=collectd, tcib_managed=true, build-date=2026-01-12T22:10:15Z, io.openshift.expose-services=, io.buildah.version=1.41.5, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd) Feb 2 08:09:06 np0005604725 podman[84263]: 2026-02-02 08:09:06.909034916 +0000 UTC m=+0.252696691 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.created=2026-01-12T22:10:15Z, name=rhosp-rhel9/openstack-collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, distribution-scope=public, managed_by=tripleo_ansible, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, io.buildah.version=1.41.5, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:15Z, com.redhat.component=openstack-collectd-container, vcs-type=git, container_name=collectd, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, config_id=tripleo_step3, summary=Red Hat OpenStack Platform 17.1 collectd) Feb 2 08:09:06 np0005604725 podman[84263]: unhealthy Feb 2 08:09:06 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:09:06 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Failed with result 'exit-code'. Feb 2 08:09:06 np0005604725 systemd[1]: session-c1.scope: Deactivated successfully. Feb 2 08:09:06 np0005604725 podman[84108]: 2026-02-02 08:09:06.964963134 +0000 UTC m=+0.627717734 container died 7f713137b874e7ac5b459bafa96ce4d371ba5ad472fcacd72966acecb73887d0 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_db_sync, summary=Red Hat OpenStack Platform 17.1 cinder-api, release=1766032510, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-api, architecture=x86_64, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, vendor=Red Hat, Inc., build-date=2026-01-12T22:58:44Z, com.redhat.component=openstack-cinder-api-container, url=https://www.redhat.com, distribution-scope=public, batch=17.1_20260112.1, managed_by=tripleo_ansible, container_name=cinder_api_db_sync, vcs-type=git, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5) Feb 2 08:09:06 np0005604725 podman[84346]: 2026-02-02 08:09:06.991425268 +0000 UTC m=+0.214277476 container cleanup 7f713137b874e7ac5b459bafa96ce4d371ba5ad472fcacd72966acecb73887d0 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_db_sync, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, maintainer=OpenStack TripleO Team, architecture=x86_64, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, distribution-scope=public, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, batch=17.1_20260112.1, build-date=2026-01-12T22:58:44Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:58:44Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.13, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, container_name=cinder_api_db_sync, url=https://www.redhat.com, vendor=Red Hat, Inc.) Feb 2 08:09:06 np0005604725 systemd[1]: libpod-conmon-7f713137b874e7ac5b459bafa96ce4d371ba5ad472fcacd72966acecb73887d0.scope: Deactivated successfully. Feb 2 08:09:06 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name cinder_api_db_sync --cap-add AUDIT_WRITE --conmon-pidfile /run/cinder_api_db_sync.pid --detach=False --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --env TRIPLEO_CONFIG_HASH=bb6b8a5d9470c5e09d1e4beb6638faa7 --label config_id=tripleo_step3 --label container_name=cinder_api_db_sync --label managed_by=tripleo_ansible --label config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/cinder_api_db_sync.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/cinder_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro --volume /var/log/containers/cinder:/var/log/cinder:z --volume /etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro --volume /etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Feb 2 08:09:07 np0005604725 podman[84542]: 2026-02-02 08:09:07.112277096 +0000 UTC m=+0.081567017 container create db385ffda360bf43afccca06e10514e74a1716d46a27756d24623a756020cd2a (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_db_sync, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, container_name=glance_api_db_sync, summary=Red Hat OpenStack Platform 17.1 glance-api, config_data={'cap_add': ['AUDIT_WRITE'], 'command': "/usr/bin/bootstrap_host_exec glance_api su glance -s /bin/bash -c '/usr/local/bin/kolla_start'", 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, managed_by=tripleo_ansible, build-date=2026-01-12T22:34:42Z, distribution-scope=public, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., com.redhat.component=openstack-glance-api-container, org.opencontainers.image.created=2026-01-12T22:34:42Z, url=https://www.redhat.com, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, config_id=tripleo_step3, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp-rhel9/openstack-glance-api, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:09:07 np0005604725 systemd[1]: Started libpod-conmon-db385ffda360bf43afccca06e10514e74a1716d46a27756d24623a756020cd2a.scope. Feb 2 08:09:07 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:07 np0005604725 podman[84587]: 2026-02-02 08:09:07.151559648 +0000 UTC m=+0.083452224 container create 9e39fc0b67652fdc07564ea578041057a9379030a1b4968aff7f87e00ac0a84e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine_db_sync, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, tcib_managed=true, build-date=2026-01-12T22:53:38Z, summary=Red Hat OpenStack Platform 17.1 heat-engine, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, config_id=tripleo_step3, vcs-ref=755001522886c265e88561b4997cab642504a845, vendor=Red Hat, Inc., com.redhat.component=openstack-heat-engine-container, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 heat-engine, name=rhosp-rhel9/openstack-heat-engine, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:53:38Z, distribution-scope=public, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.expose-services=, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, architecture=x86_64, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, release=1766032510, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, container_name=heat_engine_db_sync) Feb 2 08:09:07 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1f2dd32bd907beebad27a5f9cdf6c779d01fc032c57f49941b2288296f5b4b25/merged/var/log/glance supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:07 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1f2dd32bd907beebad27a5f9cdf6c779d01fc032c57f49941b2288296f5b4b25/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:07 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1f2dd32bd907beebad27a5f9cdf6c779d01fc032c57f49941b2288296f5b4b25/merged/var/lib/glance supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:07 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1f2dd32bd907beebad27a5f9cdf6c779d01fc032c57f49941b2288296f5b4b25/merged/var/lib/kolla/config_files/src-ceph supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:07 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1f2dd32bd907beebad27a5f9cdf6c779d01fc032c57f49941b2288296f5b4b25/merged/var/lib/kolla/config_files/config.json supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:07 np0005604725 podman[84542]: 2026-02-02 08:09:07.163330565 +0000 UTC m=+0.132620476 container init db385ffda360bf43afccca06e10514e74a1716d46a27756d24623a756020cd2a (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_db_sync, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, container_name=glance_api_db_sync, build-date=2026-01-12T22:34:42Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, vcs-ref=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, config_data={'cap_add': ['AUDIT_WRITE'], 'command': "/usr/bin/bootstrap_host_exec glance_api su glance -s /bin/bash -c '/usr/local/bin/kolla_start'", 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-glance-api-container, distribution-scope=public, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:42Z, release=1766032510, description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.openshift.expose-services=, config_id=tripleo_step3, io.buildah.version=1.41.5) Feb 2 08:09:07 np0005604725 systemd[1]: Started libpod-conmon-9e39fc0b67652fdc07564ea578041057a9379030a1b4968aff7f87e00ac0a84e.scope. Feb 2 08:09:07 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:07 np0005604725 podman[84542]: 2026-02-02 08:09:07.075254122 +0000 UTC m=+0.044544043 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:09:07 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/38e15f1d76ee99a8f600aaa78515c70936b66663e79e9ed5fa6ad888d252a5ac/merged/var/log/heat supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:07 np0005604725 podman[84587]: 2026-02-02 08:09:07.180865677 +0000 UTC m=+0.112758253 container init 9e39fc0b67652fdc07564ea578041057a9379030a1b4968aff7f87e00ac0a84e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine_db_sync, description=Red Hat OpenStack Platform 17.1 heat-engine, com.redhat.component=openstack-heat-engine-container, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, architecture=x86_64, config_id=tripleo_step3, vcs-ref=755001522886c265e88561b4997cab642504a845, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:53:38Z, build-date=2026-01-12T22:53:38Z, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, container_name=heat_engine_db_sync, vendor=Red Hat, Inc., tcib_managed=true, version=17.1.13, name=rhosp-rhel9/openstack-heat-engine, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.expose-services=, vcs-type=git, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 heat-engine, release=1766032510) Feb 2 08:09:07 np0005604725 podman[84542]: 2026-02-02 08:09:07.182337732 +0000 UTC m=+0.151627643 container start db385ffda360bf43afccca06e10514e74a1716d46a27756d24623a756020cd2a (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_db_sync, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:34:42Z, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp-rhel9/openstack-glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, config_data={'cap_add': ['AUDIT_WRITE'], 'command': "/usr/bin/bootstrap_host_exec glance_api su glance -s /bin/bash -c '/usr/local/bin/kolla_start'", 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, release=1766032510, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vcs-type=git, managed_by=tripleo_ansible, container_name=glance_api_db_sync, build-date=2026-01-12T22:34:42Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, config_id=tripleo_step3, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:09:07 np0005604725 podman[84542]: 2026-02-02 08:09:07.182548919 +0000 UTC m=+0.151838850 container attach db385ffda360bf43afccca06e10514e74a1716d46a27756d24623a756020cd2a (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_db_sync, org.opencontainers.image.created=2026-01-12T22:34:42Z, config_data={'cap_add': ['AUDIT_WRITE'], 'command': "/usr/bin/bootstrap_host_exec glance_api su glance -s /bin/bash -c '/usr/local/bin/kolla_start'", 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, description=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20260112.1, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, container_name=glance_api_db_sync, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.openshift.expose-services=, release=1766032510, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, build-date=2026-01-12T22:34:42Z, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, com.redhat.component=openstack-glance-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git) Feb 2 08:09:07 np0005604725 podman[84587]: 2026-02-02 08:09:07.186554601 +0000 UTC m=+0.118447177 container start 9e39fc0b67652fdc07564ea578041057a9379030a1b4968aff7f87e00ac0a84e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine_db_sync, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 heat-engine, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, config_id=tripleo_step3, vendor=Red Hat, Inc., org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, name=rhosp-rhel9/openstack-heat-engine, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, architecture=x86_64, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:53:38Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, distribution-scope=public, vcs-ref=755001522886c265e88561b4997cab642504a845, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 heat-engine, com.redhat.component=openstack-heat-engine-container, url=https://www.redhat.com, build-date=2026-01-12T22:53:38Z, container_name=heat_engine_db_sync, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:09:07 np0005604725 podman[84587]: 2026-02-02 08:09:07.18851308 +0000 UTC m=+0.120405676 container attach 9e39fc0b67652fdc07564ea578041057a9379030a1b4968aff7f87e00ac0a84e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine_db_sync, release=1766032510, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=heat_engine_db_sync, managed_by=tripleo_ansible, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, architecture=x86_64, config_id=tripleo_step3, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 heat-engine, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:53:38Z, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, vcs-type=git, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, name=rhosp-rhel9/openstack-heat-engine, com.redhat.component=openstack-heat-engine-container, description=Red Hat OpenStack Platform 17.1 heat-engine, build-date=2026-01-12T22:53:38Z, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, vcs-ref=755001522886c265e88561b4997cab642504a845, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:09:07 np0005604725 podman[84587]: 2026-02-02 08:09:07.111299446 +0000 UTC m=+0.043192042 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 Feb 2 08:09:07 np0005604725 systemd[1]: libpod-db385ffda360bf43afccca06e10514e74a1716d46a27756d24623a756020cd2a.scope: Deactivated successfully. Feb 2 08:09:07 np0005604725 podman[84542]: 2026-02-02 08:09:07.268363904 +0000 UTC m=+0.237653815 container died db385ffda360bf43afccca06e10514e74a1716d46a27756d24623a756020cd2a (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_db_sync, config_data={'cap_add': ['AUDIT_WRITE'], 'command': "/usr/bin/bootstrap_host_exec glance_api su glance -s /bin/bash -c '/usr/local/bin/kolla_start'", 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, architecture=x86_64, io.openshift.expose-services=, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, distribution-scope=public, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, config_id=tripleo_step3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, build-date=2026-01-12T22:34:42Z, batch=17.1_20260112.1, io.buildah.version=1.41.5, tcib_managed=true, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, container_name=glance_api_db_sync, name=rhosp-rhel9/openstack-glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, com.redhat.component=openstack-glance-api-container, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:09:07 np0005604725 podman[84694]: 2026-02-02 08:09:07.275875591 +0000 UTC m=+0.075439781 container create ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 horizon, build-date=2026-01-12T22:34:41Z, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step3, version=17.1.13, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, com.redhat.component=openstack-horizon-container, io.buildah.version=1.41.5, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vendor=Red Hat, Inc., batch=17.1_20260112.1, distribution-scope=public, vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:34:41Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, name=rhosp-rhel9/openstack-horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, description=Red Hat OpenStack Platform 17.1 horizon, container_name=horizon) Feb 2 08:09:07 np0005604725 podman[84715]: 2026-02-02 08:09:07.299972313 +0000 UTC m=+0.064871710 container create 6d21417587e42b56eacf3cf353878b9e2a81b9197cfab65d7b68fc029ebdbf89 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_db_sync, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:33:53Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, name=rhosp-rhel9/openstack-keystone, summary=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, release=1766032510, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, config_id=tripleo_step3, io.openshift.expose-services=, tcib_managed=true, batch=17.1_20260112.1, container_name=keystone_db_sync, managed_by=tripleo_ansible, config_data={'command': ['/usr/bin/bootstrap_host_exec', 'keystone', '/usr/local/bin/kolla_start'], 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.buildah.version=1.41.5, architecture=x86_64, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-keystone-container, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:09:07 np0005604725 systemd[1]: Started libpod-conmon-ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.scope. Feb 2 08:09:07 np0005604725 systemd[1]: Started libpod-conmon-6d21417587e42b56eacf3cf353878b9e2a81b9197cfab65d7b68fc029ebdbf89.scope. Feb 2 08:09:07 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:07 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:07 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/cac83ce3d46a3ecf44c4815240c1b161b9ba2c5c7c6fc3826c301486c045c123/merged/var/log/keystone supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:07 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/cac83ce3d46a3ecf44c4815240c1b161b9ba2c5c7c6fc3826c301486c045c123/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:07 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/23a513461e924cc1d750d6de85ceffa31df725cd3baac4f4bacef74ee1047b4b/merged/var/tmp supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:07 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/23a513461e924cc1d750d6de85ceffa31df725cd3baac4f4bacef74ee1047b4b/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:07 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/23a513461e924cc1d750d6de85ceffa31df725cd3baac4f4bacef74ee1047b4b/merged/var/log/horizon supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:07 np0005604725 podman[84694]: 2026-02-02 08:09:07.243739766 +0000 UTC m=+0.043303966 image pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Feb 2 08:09:07 np0005604725 podman[84740]: 2026-02-02 08:09:07.351676152 +0000 UTC m=+0.074989857 container cleanup db385ffda360bf43afccca06e10514e74a1716d46a27756d24623a756020cd2a (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_db_sync, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=glance_api_db_sync, vcs-type=git, config_id=tripleo_step3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, architecture=x86_64, tcib_managed=true, config_data={'cap_add': ['AUDIT_WRITE'], 'command': "/usr/bin/bootstrap_host_exec glance_api su glance -s /bin/bash -c '/usr/local/bin/kolla_start'", 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, version=17.1.13, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:34:42Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-glance-api, io.openshift.expose-services=, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public) Feb 2 08:09:07 np0005604725 systemd[1]: libpod-conmon-db385ffda360bf43afccca06e10514e74a1716d46a27756d24623a756020cd2a.scope: Deactivated successfully. Feb 2 08:09:07 np0005604725 systemd[1]: libpod-9e39fc0b67652fdc07564ea578041057a9379030a1b4968aff7f87e00ac0a84e.scope: Deactivated successfully. Feb 2 08:09:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:09:07 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name glance_api_db_sync --cap-add AUDIT_WRITE --conmon-pidfile /run/glance_api_db_sync.pid --detach=False --env KOLLA_BOOTSTRAP=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --env TRIPLEO_CONFIG_HASH=06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46 --label config_id=tripleo_step3 --label container_name=glance_api_db_sync --label managed_by=tripleo_ansible --label config_data={'cap_add': ['AUDIT_WRITE'], 'command': "/usr/bin/bootstrap_host_exec glance_api su glance -s /bin/bash -c '/usr/local/bin/kolla_start'", 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/glance_api_db_sync.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/glance:/var/log/glance:z --volume /var/log/containers/httpd/glance:/var/log/httpd:z --volume /var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json --volume /var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro --volume /var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z --volume /var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro --volume /var/lib/glance:/var/lib/glance:shared registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 /usr/bin/bootstrap_host_exec glance_api su glance -s /bin/bash -c '/usr/local/bin/kolla_start' Feb 2 08:09:07 np0005604725 podman[84587]: 2026-02-02 08:09:07.361919773 +0000 UTC m=+0.293812379 container died 9e39fc0b67652fdc07564ea578041057a9379030a1b4968aff7f87e00ac0a84e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine_db_sync, name=rhosp-rhel9/openstack-heat-engine, config_id=tripleo_step3, vcs-ref=755001522886c265e88561b4997cab642504a845, distribution-scope=public, vendor=Red Hat, Inc., version=17.1.13, batch=17.1_20260112.1, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, com.redhat.component=openstack-heat-engine-container, managed_by=tripleo_ansible, io.openshift.expose-services=, build-date=2026-01-12T22:53:38Z, io.buildah.version=1.41.5, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, description=Red Hat OpenStack Platform 17.1 heat-engine, summary=Red Hat OpenStack Platform 17.1 heat-engine, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=heat_engine_db_sync, tcib_managed=true, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:53:38Z, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, architecture=x86_64, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:09:07 np0005604725 podman[84694]: 2026-02-02 08:09:07.362329555 +0000 UTC m=+0.161893765 container init ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, name=rhosp-rhel9/openstack-horizon, com.redhat.component=openstack-horizon-container, io.openshift.expose-services=, vcs-type=git, maintainer=OpenStack TripleO Team, architecture=x86_64, release=1766032510, description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:34:41Z, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, tcib_managed=true, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=horizon, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon) Feb 2 08:09:07 np0005604725 podman[84715]: 2026-02-02 08:09:07.266355003 +0000 UTC m=+0.031254410 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Feb 2 08:09:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:09:07 np0005604725 podman[84694]: 2026-02-02 08:09:07.388025575 +0000 UTC m=+0.187589775 container start ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, config_id=tripleo_step3, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 horizon, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, build-date=2026-01-12T22:34:41Z, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, com.redhat.component=openstack-horizon-container, io.buildah.version=1.41.5, release=1766032510, tcib_managed=true, architecture=x86_64, version=17.1.13, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:34:41Z, name=rhosp-rhel9/openstack-horizon, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, description=Red Hat OpenStack Platform 17.1 horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:09:07 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name horizon --conmon-pidfile /run/horizon.pid --detach=True --env ENABLE_DESIGNATE=yes --env ENABLE_HEAT=yes --env ENABLE_IRONIC=yes --env ENABLE_MANILA=yes --env ENABLE_OCTAVIA=yes --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=a8e5b44090fb824658d0cdcc54fbcb7d --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step3 --label container_name=horizon --label managed_by=tripleo_ansible --label config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/horizon.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro --volume /var/log/containers/horizon:/var/log/horizon:z --volume /var/log/containers/httpd/horizon:/var/log/httpd:z --volume /var/tmp/horizon:/var/tmp:z --volume /var/www:/var/www:ro --volume /etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro --volume /etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Feb 2 08:09:07 np0005604725 podman[84715]: 2026-02-02 08:09:07.397556455 +0000 UTC m=+0.162455862 container init 6d21417587e42b56eacf3cf353878b9e2a81b9197cfab65d7b68fc029ebdbf89 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_db_sync, managed_by=tripleo_ansible, batch=17.1_20260112.1, vendor=Red Hat, Inc., org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:33:53Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, summary=Red Hat OpenStack Platform 17.1 keystone, config_data={'command': ['/usr/bin/bootstrap_host_exec', 'keystone', '/usr/local/bin/kolla_start'], 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.buildah.version=1.41.5, io.openshift.expose-services=, container_name=keystone_db_sync, distribution-scope=public, maintainer=OpenStack TripleO Team, vcs-type=git, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, config_id=tripleo_step3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:33:53Z, name=rhosp-rhel9/openstack-keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, com.redhat.component=openstack-keystone-container) Feb 2 08:09:07 np0005604725 podman[84715]: 2026-02-02 08:09:07.407001971 +0000 UTC m=+0.171901368 container start 6d21417587e42b56eacf3cf353878b9e2a81b9197cfab65d7b68fc029ebdbf89 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_db_sync, batch=17.1_20260112.1, distribution-scope=public, config_id=tripleo_step3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-keystone-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, architecture=x86_64, container_name=keystone_db_sync, config_data={'command': ['/usr/bin/bootstrap_host_exec', 'keystone', '/usr/local/bin/kolla_start'], 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.openshift.expose-services=, url=https://www.redhat.com, io.buildah.version=1.41.5, release=1766032510, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-keystone, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, summary=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., version=17.1.13, description=Red Hat OpenStack Platform 17.1 keystone, build-date=2026-01-12T22:33:53Z) Feb 2 08:09:07 np0005604725 podman[84715]: 2026-02-02 08:09:07.407700212 +0000 UTC m=+0.172599639 container attach 6d21417587e42b56eacf3cf353878b9e2a81b9197cfab65d7b68fc029ebdbf89 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_db_sync, com.redhat.component=openstack-keystone-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, summary=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., version=17.1.13, config_data={'command': ['/usr/bin/bootstrap_host_exec', 'keystone', '/usr/local/bin/kolla_start'], 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:33:53Z, container_name=keystone_db_sync, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, build-date=2026-01-12T22:33:53Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, managed_by=tripleo_ansible, distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, name=rhosp-rhel9/openstack-keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, release=1766032510, batch=17.1_20260112.1) Feb 2 08:09:07 np0005604725 systemd[1]: var-lib-containers-storage-overlay-d3fc54cb53ae9fdadb3214e0b459f632bf9bba5e6e28646810bd500da8fb2439-merged.mount: Deactivated successfully. Feb 2 08:09:07 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-8ef072866506af69df8328c99b84754898361120a403a502fe84c5b14f2e38eb-userdata-shm.mount: Deactivated successfully. Feb 2 08:09:07 np0005604725 systemd[1]: var-lib-containers-storage-overlay-850bef250b055e076678ec9a701218a79acc183c439996df243863e1a117d07d-merged.mount: Deactivated successfully. Feb 2 08:09:07 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-995bceadea8bd85ce9eac4694264d6165444c0533bb6d931044f2d7fe436ca61-userdata-shm.mount: Deactivated successfully. Feb 2 08:09:07 np0005604725 systemd[1]: var-lib-containers-storage-overlay-dd2495b91082993b6fc8cfbbcbb05acd7e7f33ed0c312a342fb3bfab0b3c2fbd-merged.mount: Deactivated successfully. Feb 2 08:09:07 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-7f713137b874e7ac5b459bafa96ce4d371ba5ad472fcacd72966acecb73887d0-userdata-shm.mount: Deactivated successfully. Feb 2 08:09:07 np0005604725 podman[84747]: 2026-02-02 08:09:07.334417218 +0000 UTC m=+0.036706485 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Feb 2 08:09:07 np0005604725 podman[84786]: 2026-02-02 08:09:07.454324128 +0000 UTC m=+0.070794230 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=starting, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.buildah.version=1.41.5, architecture=x86_64, tcib_managed=true, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, release=1766032510, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-horizon-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, config_id=tripleo_step3, container_name=horizon, build-date=2026-01-12T22:34:41Z, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, summary=Red Hat OpenStack Platform 17.1 horizon, version=17.1.13, name=rhosp-rhel9/openstack-horizon, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:09:07 np0005604725 podman[84786]: 2026-02-02 08:09:07.459761953 +0000 UTC m=+0.076232065 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, tcib_managed=true, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-horizon, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:41Z, com.redhat.component=openstack-horizon-container, container_name=horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.buildah.version=1.41.5, vcs-type=git, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, build-date=2026-01-12T22:34:41Z, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 horizon, managed_by=tripleo_ansible, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.openshift.expose-services=, config_id=tripleo_step3, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, version=17.1.13) Feb 2 08:09:07 np0005604725 podman[84786]: unhealthy Feb 2 08:09:07 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:09:07 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Failed with result 'exit-code'. Feb 2 08:09:07 np0005604725 podman[84747]: 2026-02-02 08:09:07.490222398 +0000 UTC m=+0.192511635 container create 29a8556f593651a36fe9ec5e15628bb9312bfbe066a6402dfe06833498941f89 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_db_sync, io.buildah.version=1.41.5, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, description=Red Hat OpenStack Platform 17.1 manila-api, maintainer=OpenStack TripleO Team, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, version=17.1.13, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, url=https://www.redhat.com, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-manila-api, config_id=tripleo_step3, summary=Red Hat OpenStack Platform 17.1 manila-api, batch=17.1_20260112.1, build-date=2026-01-12T22:52:22Z, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, tcib_managed=true, com.redhat.component=openstack-manila-api-container, container_name=manila_api_db_sync, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:52:22Z, io.openshift.expose-services=) Feb 2 08:09:07 np0005604725 systemd[1]: libpod-6d21417587e42b56eacf3cf353878b9e2a81b9197cfab65d7b68fc029ebdbf89.scope: Deactivated successfully. Feb 2 08:09:07 np0005604725 podman[84773]: 2026-02-02 08:09:07.534485001 +0000 UTC m=+0.162378249 container cleanup 9e39fc0b67652fdc07564ea578041057a9379030a1b4968aff7f87e00ac0a84e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine_db_sync, vcs-ref=755001522886c265e88561b4997cab642504a845, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 heat-engine, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, managed_by=tripleo_ansible, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, architecture=x86_64, io.buildah.version=1.41.5, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:53:38Z, com.redhat.component=openstack-heat-engine-container, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, config_id=tripleo_step3, build-date=2026-01-12T22:53:38Z, container_name=heat_engine_db_sync, summary=Red Hat OpenStack Platform 17.1 heat-engine, vendor=Red Hat, Inc., version=17.1.13, release=1766032510, tcib_managed=true, name=rhosp-rhel9/openstack-heat-engine, vcs-type=git) Feb 2 08:09:07 np0005604725 systemd[1]: libpod-conmon-9e39fc0b67652fdc07564ea578041057a9379030a1b4968aff7f87e00ac0a84e.scope: Deactivated successfully. Feb 2 08:09:07 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name heat_engine_db_sync --cap-add AUDIT_WRITE --conmon-pidfile /run/heat_engine_db_sync.pid --detach=False --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --env TRIPLEO_CONFIG_HASH=3b9828291d650a0cb3f28eaed8d5f04d --label config_id=tripleo_step3 --label container_name=heat_engine_db_sync --label managed_by=tripleo_ansible --label config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/heat_engine_db_sync.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/heat:/var/log/heat:z --volume /var/lib/kolla/config_files/heat_engine_db_sync.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 Feb 2 08:09:07 np0005604725 systemd[1]: Started libpod-conmon-29a8556f593651a36fe9ec5e15628bb9312bfbe066a6402dfe06833498941f89.scope. Feb 2 08:09:07 np0005604725 podman[84715]: 2026-02-02 08:09:07.574048032 +0000 UTC m=+0.338947429 container died 6d21417587e42b56eacf3cf353878b9e2a81b9197cfab65d7b68fc029ebdbf89 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_db_sync, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, maintainer=OpenStack TripleO Team, config_id=tripleo_step3, description=Red Hat OpenStack Platform 17.1 keystone, config_data={'command': ['/usr/bin/bootstrap_host_exec', 'keystone', '/usr/local/bin/kolla_start'], 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, url=https://www.redhat.com, distribution-scope=public, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vcs-type=git, com.redhat.component=openstack-keystone-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:33:53Z, build-date=2026-01-12T22:33:53Z, io.openshift.expose-services=, architecture=x86_64, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=keystone_db_sync, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:09:07 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:07 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ea1e5b2c16b6366eb105475f499b044487c1359d306bec6f67f621d67267836b/merged/var/log/manila supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:07 np0005604725 podman[84864]: 2026-02-02 08:09:07.594468282 +0000 UTC m=+0.064996014 container cleanup 6d21417587e42b56eacf3cf353878b9e2a81b9197cfab65d7b68fc029ebdbf89 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_db_sync, distribution-scope=public, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:33:53Z, build-date=2026-01-12T22:33:53Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, com.redhat.component=openstack-keystone-container, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone_db_sync, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, summary=Red Hat OpenStack Platform 17.1 keystone, config_data={'command': ['/usr/bin/bootstrap_host_exec', 'keystone', '/usr/local/bin/kolla_start'], 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.expose-services=, vcs-type=git, vcs-ref=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, vendor=Red Hat, Inc., managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, name=rhosp-rhel9/openstack-keystone) Feb 2 08:09:07 np0005604725 systemd[1]: libpod-conmon-6d21417587e42b56eacf3cf353878b9e2a81b9197cfab65d7b68fc029ebdbf89.scope: Deactivated successfully. Feb 2 08:09:07 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name keystone_db_sync --conmon-pidfile /run/keystone_db_sync.pid --detach=False --env KOLLA_BOOTSTRAP=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --env TRIPLEO_CONFIG_HASH=dff5bf4ccd6d0a40575dff90620f5e0d --label config_id=tripleo_step3 --label container_name=keystone_db_sync --label managed_by=tripleo_ansible --label config_data={'command': ['/usr/bin/bootstrap_host_exec', 'keystone', '/usr/local/bin/kolla_start'], 'detach': False, 'environment': {'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/keystone_db_sync.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/keystone:/var/log/keystone:z --volume /var/log/containers/httpd/keystone:/var/log/httpd:z --volume /etc/openldap:/etc/openldap:ro --volume /var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro --volume /etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 /usr/bin/bootstrap_host_exec keystone /usr/local/bin/kolla_start Feb 2 08:09:07 np0005604725 podman[84747]: 2026-02-02 08:09:07.640284692 +0000 UTC m=+0.342573939 container init 29a8556f593651a36fe9ec5e15628bb9312bfbe066a6402dfe06833498941f89 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_db_sync, description=Red Hat OpenStack Platform 17.1 manila-api, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, release=1766032510, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.component=openstack-manila-api-container, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, url=https://www.redhat.com, name=rhosp-rhel9/openstack-manila-api, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:52:22Z, io.openshift.expose-services=, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, architecture=x86_64, container_name=manila_api_db_sync, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vendor=Red Hat, Inc., distribution-scope=public, build-date=2026-01-12T22:52:22Z, maintainer=OpenStack TripleO Team) Feb 2 08:09:07 np0005604725 podman[84747]: 2026-02-02 08:09:07.648614175 +0000 UTC m=+0.350903422 container start 29a8556f593651a36fe9ec5e15628bb9312bfbe066a6402dfe06833498941f89 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_db_sync, description=Red Hat OpenStack Platform 17.1 manila-api, name=rhosp-rhel9/openstack-manila-api, release=1766032510, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, com.redhat.component=openstack-manila-api-container, version=17.1.13, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, distribution-scope=public, managed_by=tripleo_ansible, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 manila-api, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:52:22Z, container_name=manila_api_db_sync, config_id=tripleo_step3, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, build-date=2026-01-12T22:52:22Z, vendor=Red Hat, Inc., io.openshift.expose-services=) Feb 2 08:09:07 np0005604725 podman[84747]: 2026-02-02 08:09:07.648875124 +0000 UTC m=+0.351164381 container attach 29a8556f593651a36fe9ec5e15628bb9312bfbe066a6402dfe06833498941f89 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_db_sync, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, org.opencontainers.image.created=2026-01-12T22:52:22Z, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 manila-api, container_name=manila_api_db_sync, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-manila-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, build-date=2026-01-12T22:52:22Z, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, release=1766032510, config_id=tripleo_step3, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, architecture=x86_64, version=17.1.13, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.41.5, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, com.redhat.component=openstack-manila-api-container, distribution-scope=public) Feb 2 08:09:07 np0005604725 systemd[1]: libpod-29a8556f593651a36fe9ec5e15628bb9312bfbe066a6402dfe06833498941f89.scope: Deactivated successfully. Feb 2 08:09:07 np0005604725 podman[85020]: 2026-02-02 08:09:07.865676234 +0000 UTC m=+0.087374683 container create 847ee7733d4e8d139ae4472dd2c1b0c5a815966c5833c484bcecba26de1b8f57 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1, name=manila_share_init_logs, distribution-scope=public, maintainer=OpenStack TripleO Team, release=1766032510, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:53:11Z, io.buildah.version=1.41.5, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-manila-share, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-share, com.redhat.component=openstack-manila-share-container, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-share, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-share, summary=Red Hat OpenStack Platform 17.1 manila-share, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, config_data={'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z']}, vendor=Red Hat, Inc., container_name=manila_share_init_logs, version=17.1.13, build-date=2026-01-12T22:53:11Z, description=Red Hat OpenStack Platform 17.1 manila-share, architecture=x86_64, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:09:07 np0005604725 podman[85060]: 2026-02-02 08:09:07.872951435 +0000 UTC m=+0.044872363 container died 29a8556f593651a36fe9ec5e15628bb9312bfbe066a6402dfe06833498941f89 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_db_sync, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, version=17.1.13, architecture=x86_64, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, build-date=2026-01-12T22:52:22Z, tcib_managed=true, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=manila_api_db_sync, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, vendor=Red Hat, Inc., release=1766032510, config_id=tripleo_step3, managed_by=tripleo_ansible, url=https://www.redhat.com, com.redhat.component=openstack-manila-api-container, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:52:22Z) Feb 2 08:09:07 np0005604725 podman[85060]: 2026-02-02 08:09:07.894788007 +0000 UTC m=+0.066708925 container cleanup 29a8556f593651a36fe9ec5e15628bb9312bfbe066a6402dfe06833498941f89 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_db_sync, build-date=2026-01-12T22:52:22Z, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, architecture=x86_64, tcib_managed=true, container_name=manila_api_db_sync, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., com.redhat.component=openstack-manila-api-container, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, release=1766032510, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:52:22Z, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb) Feb 2 08:09:07 np0005604725 systemd[1]: libpod-conmon-29a8556f593651a36fe9ec5e15628bb9312bfbe066a6402dfe06833498941f89.scope: Deactivated successfully. Feb 2 08:09:07 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name manila_api_db_sync --cap-add AUDIT_WRITE --conmon-pidfile /run/manila_api_db_sync.pid --detach=False --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=d8e2b9fe37394fa4702f0b4840e2be72 --label config_id=tripleo_step3 --label container_name=manila_api_db_sync --label managed_by=tripleo_ansible --label config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/manila_api_db_sync.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/manila_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro --volume /var/log/containers/manila:/var/log/manila:z registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Feb 2 08:09:07 np0005604725 podman[85020]: 2026-02-02 08:09:07.816375697 +0000 UTC m=+0.038074156 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 Feb 2 08:09:07 np0005604725 systemd[1]: Started libpod-conmon-847ee7733d4e8d139ae4472dd2c1b0c5a815966c5833c484bcecba26de1b8f57.scope. Feb 2 08:09:07 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:07 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7cd00a9a7972eb4b4fcb8f53453a549af20075a817cda5b3b6f992cc1410ddef/merged/var/log/manila supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:07 np0005604725 podman[85020]: 2026-02-02 08:09:07.965655269 +0000 UTC m=+0.187353718 container init 847ee7733d4e8d139ae4472dd2c1b0c5a815966c5833c484bcecba26de1b8f57 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1, name=manila_share_init_logs, description=Red Hat OpenStack Platform 17.1 manila-share, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-manila-share, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-share, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-share, org.opencontainers.image.created=2026-01-12T22:53:11Z, build-date=2026-01-12T22:53:11Z, com.redhat.component=openstack-manila-share-container, config_id=tripleo_step3, summary=Red Hat OpenStack Platform 17.1 manila-share, managed_by=tripleo_ansible, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z']}, distribution-scope=public, batch=17.1_20260112.1, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-share, version=17.1.13, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, url=https://www.redhat.com, io.openshift.expose-services=, tcib_managed=true, container_name=manila_share_init_logs, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb) Feb 2 08:09:07 np0005604725 podman[85020]: 2026-02-02 08:09:07.974320852 +0000 UTC m=+0.196019301 container start 847ee7733d4e8d139ae4472dd2c1b0c5a815966c5833c484bcecba26de1b8f57 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1, name=manila_share_init_logs, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-share, io.buildah.version=1.41.5, config_data={'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z']}, org.opencontainers.image.created=2026-01-12T22:53:11Z, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, version=17.1.13, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-share, description=Red Hat OpenStack Platform 17.1 manila-share, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 manila-share, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-share, url=https://www.redhat.com, io.openshift.expose-services=, managed_by=tripleo_ansible, build-date=2026-01-12T22:53:11Z, name=rhosp-rhel9/openstack-manila-share, vendor=Red Hat, Inc., batch=17.1_20260112.1, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, com.redhat.component=openstack-manila-share-container, config_id=tripleo_step3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=manila_share_init_logs, distribution-scope=public, maintainer=OpenStack TripleO Team, architecture=x86_64, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:09:07 np0005604725 systemd[1]: libpod-847ee7733d4e8d139ae4472dd2c1b0c5a815966c5833c484bcecba26de1b8f57.scope: Deactivated successfully. Feb 2 08:09:07 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name manila_share_init_logs --conmon-pidfile /run/manila_share_init_logs.pid --detach=True --label config_id=tripleo_step3 --label container_name=manila_share_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/manila_share_init_logs.log --network none --privileged=False --user root --volume /var/log/containers/manila:/var/log/manila:z registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 /bin/bash -c chown -R manila:manila /var/log/manila Feb 2 08:09:08 np0005604725 podman[85109]: 2026-02-02 08:09:07.91924076 +0000 UTC m=+0.025184926 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:09:08 np0005604725 podman[85159]: 2026-02-02 08:09:08.032334512 +0000 UTC m=+0.044983826 container died 847ee7733d4e8d139ae4472dd2c1b0c5a815966c5833c484bcecba26de1b8f57 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1, name=manila_share_init_logs, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, distribution-scope=public, container_name=manila_share_init_logs, summary=Red Hat OpenStack Platform 17.1 manila-share, url=https://www.redhat.com, config_data={'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z']}, tcib_managed=true, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, architecture=x86_64, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-share, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-manila-share-container, description=Red Hat OpenStack Platform 17.1 manila-share, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-share, managed_by=tripleo_ansible, release=1766032510, config_id=tripleo_step3, io.buildah.version=1.41.5, build-date=2026-01-12T22:53:11Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:53:11Z, name=rhosp-rhel9/openstack-manila-share, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-share, io.openshift.expose-services=) Feb 2 08:09:08 np0005604725 podman[85159]: 2026-02-02 08:09:08.056331151 +0000 UTC m=+0.068980455 container cleanup 847ee7733d4e8d139ae4472dd2c1b0c5a815966c5833c484bcecba26de1b8f57 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1, name=manila_share_init_logs, maintainer=OpenStack TripleO Team, config_data={'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z']}, com.redhat.component=openstack-manila-share-container, version=17.1.13, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-share, distribution-scope=public, name=rhosp-rhel9/openstack-manila-share, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, config_id=tripleo_step3, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 manila-share, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 manila-share, container_name=manila_share_init_logs, managed_by=tripleo_ansible, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, vcs-type=git, url=https://www.redhat.com, build-date=2026-01-12T22:53:11Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-share, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:53:11Z, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-share) Feb 2 08:09:08 np0005604725 podman[85155]: 2026-02-02 08:09:08.060144816 +0000 UTC m=+0.079068011 container create 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, batch=17.1_20260112.1, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:09Z, summary=Red Hat OpenStack Platform 17.1 rsyslog, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, io.openshift.expose-services=, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, name=rhosp-rhel9/openstack-rsyslog, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 rsyslog, config_id=tripleo_step3, managed_by=tripleo_ansible, release=1766032510, vcs-type=git, container_name=rsyslog, build-date=2026-01-12T22:10:09Z, com.redhat.component=openstack-rsyslog-container, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, io.buildah.version=1.41.5) Feb 2 08:09:08 np0005604725 systemd[1]: libpod-conmon-847ee7733d4e8d139ae4472dd2c1b0c5a815966c5833c484bcecba26de1b8f57.scope: Deactivated successfully. Feb 2 08:09:08 np0005604725 podman[85109]: 2026-02-02 08:09:08.069093278 +0000 UTC m=+0.175037414 container create 060788da4aaf6095289890def183ddc513339d02f477a42d4219fc175d2157c5 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_db_sync, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, name=rhosp-rhel9/openstack-nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, com.redhat.component=openstack-nova-api-container, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, config_id=tripleo_step3, description=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, distribution-scope=public, release=1766032510, container_name=nova_api_db_sync, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.openshift.expose-services=, build-date=2026-01-12T23:31:50Z, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:09:08 np0005604725 podman[85094]: 2026-02-02 08:09:08.081263418 +0000 UTC m=+0.203734486 container create 8422fbf692357e4c635f4dbb717ec76b56441e62cb28f95de995098d5f024426 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_db_sync, summary=Red Hat OpenStack Platform 17.1 neutron-server, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, build-date=2026-01-12T22:57:35Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro']}, config_id=tripleo_step3, distribution-scope=public, io.openshift.expose-services=, name=rhosp-rhel9/openstack-neutron-server, url=https://www.redhat.com, architecture=x86_64, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, container_name=neutron_db_sync, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, release=1766032510, com.redhat.component=openstack-neutron-server-container, vendor=Red Hat, Inc., batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z) Feb 2 08:09:08 np0005604725 podman[85155]: 2026-02-02 08:09:08.009579991 +0000 UTC m=+0.028503196 image pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Feb 2 08:09:08 np0005604725 systemd[1]: Started libpod-conmon-8422fbf692357e4c635f4dbb717ec76b56441e62cb28f95de995098d5f024426.scope. Feb 2 08:09:08 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:08 np0005604725 podman[85094]: 2026-02-02 08:09:08.026189876 +0000 UTC m=+0.148660964 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Feb 2 08:09:08 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/060cea01c646383f5ae74e9c7035f41cfc078c8aa5f8fbe6ec6f4526a340ed7f/merged/var/log/neutron supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:08 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/060cea01c646383f5ae74e9c7035f41cfc078c8aa5f8fbe6ec6f4526a340ed7f/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:08 np0005604725 podman[85094]: 2026-02-02 08:09:08.13634519 +0000 UTC m=+0.258816288 container init 8422fbf692357e4c635f4dbb717ec76b56441e62cb28f95de995098d5f024426 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_db_sync, architecture=x86_64, container_name=neutron_db_sync, io.openshift.expose-services=, vendor=Red Hat, Inc., url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z, batch=17.1_20260112.1, vcs-type=git, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, com.redhat.component=openstack-neutron-server-container, managed_by=tripleo_ansible, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:57:35Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_step3, distribution-scope=public, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-neutron-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server) Feb 2 08:09:08 np0005604725 podman[85094]: 2026-02-02 08:09:08.143532867 +0000 UTC m=+0.266003935 container start 8422fbf692357e4c635f4dbb717ec76b56441e62cb28f95de995098d5f024426 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_db_sync, com.redhat.component=openstack-neutron-server-container, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, description=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z, tcib_managed=true, url=https://www.redhat.com, build-date=2026-01-12T22:57:35Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, distribution-scope=public, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 neutron-server, release=1766032510, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro']}, vcs-type=git, version=17.1.13, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=neutron_db_sync, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, io.buildah.version=1.41.5, config_id=tripleo_step3, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, name=rhosp-rhel9/openstack-neutron-server) Feb 2 08:09:08 np0005604725 podman[85094]: 2026-02-02 08:09:08.143909919 +0000 UTC m=+0.266381007 container attach 8422fbf692357e4c635f4dbb717ec76b56441e62cb28f95de995098d5f024426 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_db_sync, url=https://www.redhat.com, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, build-date=2026-01-12T22:57:35Z, container_name=neutron_db_sync, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:57:35Z, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, summary=Red Hat OpenStack Platform 17.1 neutron-server, vendor=Red Hat, Inc., tcib_managed=true, description=Red Hat OpenStack Platform 17.1 neutron-server, name=rhosp-rhel9/openstack-neutron-server, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, maintainer=OpenStack TripleO Team, vcs-type=git, config_id=tripleo_step3, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, io.buildah.version=1.41.5, io.openshift.expose-services=, distribution-scope=public, com.redhat.component=openstack-neutron-server-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13) Feb 2 08:09:08 np0005604725 systemd[1]: Started libpod-conmon-060788da4aaf6095289890def183ddc513339d02f477a42d4219fc175d2157c5.scope. Feb 2 08:09:08 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:08 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c3e201787b4740a0bc484098194a59bf4624c83faaa68f10386249d534778850/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:08 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c3e201787b4740a0bc484098194a59bf4624c83faaa68f10386249d534778850/merged/var/log/nova supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:08 np0005604725 systemd[1]: Started libpod-conmon-1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6.scope. Feb 2 08:09:08 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:08 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f/merged/var/log/rsyslog supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:08 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f/merged/var/lib/rsyslog supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:08 np0005604725 podman[85155]: 2026-02-02 08:09:08.21411402 +0000 UTC m=+0.233037185 container init 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, com.redhat.component=openstack-rsyslog-container, name=rhosp-rhel9/openstack-rsyslog, vendor=Red Hat, Inc., distribution-scope=public, build-date=2026-01-12T22:10:09Z, org.opencontainers.image.created=2026-01-12T22:10:09Z, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, io.openshift.expose-services=, container_name=rsyslog, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 rsyslog, config_id=tripleo_step3, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, release=1766032510, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:09:08 np0005604725 podman[85109]: 2026-02-02 08:09:08.22958895 +0000 UTC m=+0.335533096 container init 060788da4aaf6095289890def183ddc513339d02f477a42d4219fc175d2157c5 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_db_sync, version=17.1.13, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, container_name=nova_api_db_sync, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-nova-api, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:31:50Z, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, tcib_managed=true, org.opencontainers.image.created=2026-01-12T23:31:50Z, release=1766032510, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, distribution-scope=public, config_id=tripleo_step3, managed_by=tripleo_ansible) Feb 2 08:09:08 np0005604725 podman[85109]: 2026-02-02 08:09:08.237979924 +0000 UTC m=+0.343924050 container start 060788da4aaf6095289890def183ddc513339d02f477a42d4219fc175d2157c5 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_db_sync, distribution-scope=public, name=rhosp-rhel9/openstack-nova-api, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.buildah.version=1.41.5, release=1766032510, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, tcib_managed=true, build-date=2026-01-12T23:31:50Z, url=https://www.redhat.com, architecture=x86_64, container_name=nova_api_db_sync, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_step3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, com.redhat.component=openstack-nova-api-container, summary=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, org.opencontainers.image.created=2026-01-12T23:31:50Z) Feb 2 08:09:08 np0005604725 podman[85109]: 2026-02-02 08:09:08.240527022 +0000 UTC m=+0.346471208 container attach 060788da4aaf6095289890def183ddc513339d02f477a42d4219fc175d2157c5 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_db_sync, com.redhat.component=openstack-nova-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, io.buildah.version=1.41.5, release=1766032510, container_name=nova_api_db_sync, build-date=2026-01-12T23:31:50Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, tcib_managed=true, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, distribution-scope=public, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.openshift.expose-services=, vcs-type=git, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, name=rhosp-rhel9/openstack-nova-api, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:09:08 np0005604725 podman[85155]: 2026-02-02 08:09:08.28397146 +0000 UTC m=+0.302894645 container start 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, name=rhosp-rhel9/openstack-rsyslog, release=1766032510, vcs-type=git, io.openshift.expose-services=, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, io.buildah.version=1.41.5, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.created=2026-01-12T22:10:09Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, config_id=tripleo_step3, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 rsyslog, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=rsyslog, tcib_managed=true, build-date=2026-01-12T22:10:09Z, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, distribution-scope=public, com.redhat.component=openstack-rsyslog-container, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:09:08 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name rsyslog --conmon-pidfile /run/rsyslog.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=ae28058d2cacd52586f33ad08231e41f --label config_id=tripleo_step3 --label container_name=rsyslog --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/rsyslog.log --network host --privileged=True --security-opt label=disable --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro --volume /var/log/containers:/var/log/containers:ro --volume /var/log/containers/rsyslog:/var/log/rsyslog:rw,z --volume /var/log:/var/log/host:ro --volume /var/lib/rsyslog.container:/var/lib/rsyslog:rw,z registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Feb 2 08:09:08 np0005604725 systemd[1]: libpod-1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6.scope: Deactivated successfully. Feb 2 08:09:08 np0005604725 systemd[1]: libpod-8422fbf692357e4c635f4dbb717ec76b56441e62cb28f95de995098d5f024426.scope: Deactivated successfully. Feb 2 08:09:08 np0005604725 podman[85094]: 2026-02-02 08:09:08.330870364 +0000 UTC m=+0.453341432 container died 8422fbf692357e4c635f4dbb717ec76b56441e62cb28f95de995098d5f024426 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_db_sync, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:57:35Z, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, managed_by=tripleo_ansible, architecture=x86_64, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, container_name=neutron_db_sync, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, description=Red Hat OpenStack Platform 17.1 neutron-server, distribution-scope=public, com.redhat.component=openstack-neutron-server-container, vcs-type=git, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, release=1766032510, name=rhosp-rhel9/openstack-neutron-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, config_id=tripleo_step3, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 neutron-server, vendor=Red Hat, Inc., build-date=2026-01-12T22:57:35Z, batch=17.1_20260112.1, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=) Feb 2 08:09:08 np0005604725 podman[85315]: 2026-02-02 08:09:08.390159273 +0000 UTC m=+0.119868329 container create 929ce971174433da7918b347e2148e966f3481693121f5094c4ad004cb022b3f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_copy_rings, io.openshift.expose-services=, tcib_managed=true, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.buildah.version=1.41.5, vcs-type=git, name=rhosp-rhel9/openstack-swift-proxy-server, config_id=tripleo_step3, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, maintainer=OpenStack TripleO Team, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:51Z, container_name=swift_copy_rings, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, build-date=2026-01-12T22:50:51Z, managed_by=tripleo_ansible, config_data={'command': ['/bin/bash', '-c', 'cp -v -dR --preserve -t /etc/swift /swift_ringbuilder/etc/swift/*.gz /swift_ringbuilder/etc/swift/*.builder /swift_ringbuilder/etc/swift/backups'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72-0384afc25edd213d382c71d6593bd444'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/lib/config-data/puppet-generated/swift/etc/swift:/etc/swift:rw,z', '/var/lib/config-data/puppet-generated/swift_ringbuilder:/swift_ringbuilder:ro']}, com.redhat.component=openstack-swift-proxy-server-container, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, batch=17.1_20260112.1) Feb 2 08:09:08 np0005604725 systemd[1]: libpod-060788da4aaf6095289890def183ddc513339d02f477a42d4219fc175d2157c5.scope: Deactivated successfully. Feb 2 08:09:08 np0005604725 podman[85315]: 2026-02-02 08:09:08.298299665 +0000 UTC m=+0.028008731 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Feb 2 08:09:08 np0005604725 podman[85350]: 2026-02-02 08:09:08.408428468 +0000 UTC m=+0.072173282 container cleanup 8422fbf692357e4c635f4dbb717ec76b56441e62cb28f95de995098d5f024426 (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_db_sync, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, description=Red Hat OpenStack Platform 17.1 neutron-server, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, com.redhat.component=openstack-neutron-server-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., build-date=2026-01-12T22:57:35Z, config_id=tripleo_step3, tcib_managed=true, architecture=x86_64, distribution-scope=public, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro']}, name=rhosp-rhel9/openstack-neutron-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.expose-services=, managed_by=tripleo_ansible, batch=17.1_20260112.1, release=1766032510, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 neutron-server, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:57:35Z, container_name=neutron_db_sync, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.buildah.version=1.41.5) Feb 2 08:09:08 np0005604725 systemd[1]: libpod-conmon-8422fbf692357e4c635f4dbb717ec76b56441e62cb28f95de995098d5f024426.scope: Deactivated successfully. Feb 2 08:09:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay-ea1e5b2c16b6366eb105475f499b044487c1359d306bec6f67f621d67267836b-merged.mount: Deactivated successfully. Feb 2 08:09:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-29a8556f593651a36fe9ec5e15628bb9312bfbe066a6402dfe06833498941f89-userdata-shm.mount: Deactivated successfully. Feb 2 08:09:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay-cac83ce3d46a3ecf44c4815240c1b161b9ba2c5c7c6fc3826c301486c045c123-merged.mount: Deactivated successfully. Feb 2 08:09:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-6d21417587e42b56eacf3cf353878b9e2a81b9197cfab65d7b68fc029ebdbf89-userdata-shm.mount: Deactivated successfully. Feb 2 08:09:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay-38e15f1d76ee99a8f600aaa78515c70936b66663e79e9ed5fa6ad888d252a5ac-merged.mount: Deactivated successfully. Feb 2 08:09:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-9e39fc0b67652fdc07564ea578041057a9379030a1b4968aff7f87e00ac0a84e-userdata-shm.mount: Deactivated successfully. Feb 2 08:09:08 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name neutron_db_sync --cap-add AUDIT_WRITE --conmon-pidfile /run/neutron_db_sync.pid --detach=False --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --env TRIPLEO_CONFIG_HASH=ed61d1adcabe12fe3dffa08621622e77 --label config_id=tripleo_step3 --label container_name=neutron_db_sync --label managed_by=tripleo_ansible --label config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/neutron_db_sync.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/neutron:/var/log/neutron:z --volume /var/log/containers/httpd/neutron-api:/var/log/httpd:z --volume /var/lib/kolla/config_files/neutron_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Feb 2 08:09:08 np0005604725 podman[85333]: 2026-02-02 08:09:08.458729615 +0000 UTC m=+0.147929261 container died 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=rsyslog, tcib_managed=true, release=1766032510, io.openshift.expose-services=, batch=17.1_20260112.1, url=https://www.redhat.com, name=rhosp-rhel9/openstack-rsyslog, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 rsyslog, description=Red Hat OpenStack Platform 17.1 rsyslog, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step3, distribution-scope=public, build-date=2026-01-12T22:10:09Z, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:09Z, com.redhat.component=openstack-rsyslog-container) Feb 2 08:09:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6-userdata-shm.mount: Deactivated successfully. Feb 2 08:09:08 np0005604725 systemd[1]: var-lib-containers-storage-overlay-34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f-merged.mount: Deactivated successfully. Feb 2 08:09:08 np0005604725 podman[85333]: 2026-02-02 08:09:08.533125863 +0000 UTC m=+0.222325479 container cleanup 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, release=1766032510, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.expose-services=, managed_by=tripleo_ansible, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vcs-type=git, build-date=2026-01-12T22:10:09Z, batch=17.1_20260112.1, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:09Z, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.component=openstack-rsyslog-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-rsyslog, description=Red Hat OpenStack Platform 17.1 rsyslog, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, summary=Red Hat OpenStack Platform 17.1 rsyslog, container_name=rsyslog) Feb 2 08:09:08 np0005604725 systemd[1]: Started libpod-conmon-929ce971174433da7918b347e2148e966f3481693121f5094c4ad004cb022b3f.scope. Feb 2 08:09:08 np0005604725 podman[85393]: 2026-02-02 08:09:08.53865517 +0000 UTC m=+0.073637345 container create b4b98cf68fae4325dd8351299692b5d136410a537bbcad9123e53dc5dd308f18 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_setup_srv, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_setup_srv, build-date=2026-01-12T22:50:44Z, distribution-scope=public, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, summary=Red Hat OpenStack Platform 17.1 swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., config_data={'command': ['find', '/srv/node', '-maxdepth', '1', '-type', 'd', '-exec', 'chown', 'swift:', '{}', ';'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/srv/node:/srv/node:z']}, description=Red Hat OpenStack Platform 17.1 swift-account, batch=17.1_20260112.1, com.redhat.component=openstack-swift-account-container, version=17.1.13, architecture=x86_64, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, name=rhosp-rhel9/openstack-swift-account, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step3, maintainer=OpenStack TripleO Team, io.openshift.expose-services=) Feb 2 08:09:08 np0005604725 systemd[1]: libpod-conmon-1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6.scope: Deactivated successfully. Feb 2 08:09:08 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:08 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0c4fb760ea9b3bdff67e0cc1c4709d650729c6cdfe0ede9ab4861c7b8783e4b7/merged/etc/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:08 np0005604725 podman[85109]: 2026-02-02 08:09:08.555938605 +0000 UTC m=+0.661882751 container died 060788da4aaf6095289890def183ddc513339d02f477a42d4219fc175d2157c5 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_db_sync, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T23:31:50Z, build-date=2026-01-12T23:31:50Z, description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-nova-api, version=17.1.13, managed_by=tripleo_ansible, vendor=Red Hat, Inc., vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-api-container, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, release=1766032510, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, container_name=nova_api_db_sync, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:09:08 np0005604725 systemd[1]: Started libpod-conmon-b4b98cf68fae4325dd8351299692b5d136410a537bbcad9123e53dc5dd308f18.scope. Feb 2 08:09:08 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:08 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d3275846910be927062f19fec540eedbe5d9494d529e5bee21f56d6f8993bf8b/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:08 np0005604725 podman[85363]: 2026-02-02 08:09:08.588977778 +0000 UTC m=+0.175363733 container cleanup 060788da4aaf6095289890def183ddc513339d02f477a42d4219fc175d2157c5 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_db_sync, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, managed_by=tripleo_ansible, container_name=nova_api_db_sync, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-nova-api-container, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vendor=Red Hat, Inc., build-date=2026-01-12T23:31:50Z, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step3, version=17.1.13, io.buildah.version=1.41.5, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, name=rhosp-rhel9/openstack-nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, batch=17.1_20260112.1) Feb 2 08:09:08 np0005604725 systemd[1]: libpod-conmon-060788da4aaf6095289890def183ddc513339d02f477a42d4219fc175d2157c5.scope: Deactivated successfully. Feb 2 08:09:08 np0005604725 podman[85393]: 2026-02-02 08:09:08.595674712 +0000 UTC m=+0.130656867 container init b4b98cf68fae4325dd8351299692b5d136410a537bbcad9123e53dc5dd308f18 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_setup_srv, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, batch=17.1_20260112.1, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, config_data={'command': ['find', '/srv/node', '-maxdepth', '1', '-type', 'd', '-exec', 'chown', 'swift:', '{}', ';'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/srv/node:/srv/node:z']}, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_setup_srv, tcib_managed=true, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, build-date=2026-01-12T22:50:44Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:44Z, maintainer=OpenStack TripleO Team, vcs-type=git, managed_by=tripleo_ansible, url=https://www.redhat.com, release=1766032510, io.openshift.expose-services=, version=17.1.13, name=rhosp-rhel9/openstack-swift-account, com.redhat.component=openstack-swift-account-container, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, distribution-scope=public) Feb 2 08:09:08 np0005604725 podman[85393]: 2026-02-02 08:09:08.49581496 +0000 UTC m=+0.030797125 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 Feb 2 08:09:08 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name nova_api_db_sync --cap-add AUDIT_WRITE --conmon-pidfile /run/nova_api_db_sync.pid --detach=False --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --env TRIPLEO_CONFIG_HASH=0f33bf354435ad6e844c942ca95c792b --label config_id=tripleo_step3 --label container_name=nova_api_db_sync --label managed_by=tripleo_ansible --label config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/nova_api_db_sync.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/nova:/var/log/nova:z --volume /var/log/containers/httpd/nova-api:/var/log/httpd:z --volume /var/lib/kolla/config_files/nova_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:09:08 np0005604725 podman[85393]: 2026-02-02 08:09:08.603093406 +0000 UTC m=+0.138075571 container start b4b98cf68fae4325dd8351299692b5d136410a537bbcad9123e53dc5dd308f18 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_setup_srv, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, build-date=2026-01-12T22:50:44Z, tcib_managed=true, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, architecture=x86_64, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-account, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, release=1766032510, vcs-type=git, vendor=Red Hat, Inc., io.buildah.version=1.41.5, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, com.redhat.component=openstack-swift-account-container, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, config_data={'command': ['find', '/srv/node', '-maxdepth', '1', '-type', 'd', '-exec', 'chown', 'swift:', '{}', ';'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/srv/node:/srv/node:z']}, org.opencontainers.image.created=2026-01-12T22:50:44Z, config_id=tripleo_step3, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=swift_setup_srv) Feb 2 08:09:08 np0005604725 systemd[1]: libpod-b4b98cf68fae4325dd8351299692b5d136410a537bbcad9123e53dc5dd308f18.scope: Deactivated successfully. Feb 2 08:09:08 np0005604725 podman[85315]: 2026-02-02 08:09:08.610370178 +0000 UTC m=+0.340079244 container init 929ce971174433da7918b347e2148e966f3481693121f5094c4ad004cb022b3f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_copy_rings, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:51Z, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.13, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, config_data={'command': ['/bin/bash', '-c', 'cp -v -dR --preserve -t /etc/swift /swift_ringbuilder/etc/swift/*.gz /swift_ringbuilder/etc/swift/*.builder /swift_ringbuilder/etc/swift/backups'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72-0384afc25edd213d382c71d6593bd444'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/lib/config-data/puppet-generated/swift/etc/swift:/etc/swift:rw,z', '/var/lib/config-data/puppet-generated/swift_ringbuilder:/swift_ringbuilder:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, batch=17.1_20260112.1, container_name=swift_copy_rings, name=rhosp-rhel9/openstack-swift-proxy-server, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., io.openshift.expose-services=, build-date=2026-01-12T22:50:51Z, config_id=tripleo_step3, io.buildah.version=1.41.5) Feb 2 08:09:08 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_setup_srv --conmon-pidfile /run/swift_setup_srv.pid --detach=True --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --label config_id=tripleo_step3 --label container_name=swift_setup_srv --label managed_by=tripleo_ansible --label config_data={'command': ['find', '/srv/node', '-maxdepth', '1', '-type', 'd', '-exec', 'chown', 'swift:', '{}', ';'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/srv/node:/srv/node:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_setup_srv.log --network none --user root --volume /srv/node:/srv/node:z registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 find /srv/node -maxdepth 1 -type d -exec chown swift: {} ; Feb 2 08:09:08 np0005604725 podman[85315]: 2026-02-02 08:09:08.615737881 +0000 UTC m=+0.345446957 container start 929ce971174433da7918b347e2148e966f3481693121f5094c4ad004cb022b3f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_copy_rings, org.opencontainers.image.created=2026-01-12T22:50:51Z, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, release=1766032510, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, config_data={'command': ['/bin/bash', '-c', 'cp -v -dR --preserve -t /etc/swift /swift_ringbuilder/etc/swift/*.gz /swift_ringbuilder/etc/swift/*.builder /swift_ringbuilder/etc/swift/backups'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72-0384afc25edd213d382c71d6593bd444'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/lib/config-data/puppet-generated/swift/etc/swift:/etc/swift:rw,z', '/var/lib/config-data/puppet-generated/swift_ringbuilder:/swift_ringbuilder:ro']}, io.buildah.version=1.41.5, com.redhat.component=openstack-swift-proxy-server-container, build-date=2026-01-12T22:50:51Z, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-swift-proxy-server, vendor=Red Hat, Inc., architecture=x86_64, version=17.1.13, batch=17.1_20260112.1, container_name=swift_copy_rings) Feb 2 08:09:08 np0005604725 podman[85315]: 2026-02-02 08:09:08.615921816 +0000 UTC m=+0.345630912 container attach 929ce971174433da7918b347e2148e966f3481693121f5094c4ad004cb022b3f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_copy_rings, url=https://www.redhat.com, container_name=swift_copy_rings, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., version=17.1.13, config_id=tripleo_step3, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-proxy-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, build-date=2026-01-12T22:50:51Z, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, distribution-scope=public, architecture=x86_64, release=1766032510, config_data={'command': ['/bin/bash', '-c', 'cp -v -dR --preserve -t /etc/swift /swift_ringbuilder/etc/swift/*.gz /swift_ringbuilder/etc/swift/*.builder /swift_ringbuilder/etc/swift/backups'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72-0384afc25edd213d382c71d6593bd444'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/lib/config-data/puppet-generated/swift/etc/swift:/etc/swift:rw,z', '/var/lib/config-data/puppet-generated/swift_ringbuilder:/swift_ringbuilder:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-swift-proxy-server-container, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:50:51Z) Feb 2 08:09:08 np0005604725 systemd[1]: libpod-929ce971174433da7918b347e2148e966f3481693121f5094c4ad004cb022b3f.scope: Deactivated successfully. Feb 2 08:09:08 np0005604725 podman[85315]: 2026-02-02 08:09:08.628165077 +0000 UTC m=+0.357874193 container died 929ce971174433da7918b347e2148e966f3481693121f5094c4ad004cb022b3f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_copy_rings, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, container_name=swift_copy_rings, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1766032510, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-proxy-server-container, io.openshift.expose-services=, config_id=tripleo_step3, name=rhosp-rhel9/openstack-swift-proxy-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'command': ['/bin/bash', '-c', 'cp -v -dR --preserve -t /etc/swift /swift_ringbuilder/etc/swift/*.gz /swift_ringbuilder/etc/swift/*.builder /swift_ringbuilder/etc/swift/backups'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72-0384afc25edd213d382c71d6593bd444'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/lib/config-data/puppet-generated/swift/etc/swift:/etc/swift:rw,z', '/var/lib/config-data/puppet-generated/swift_ringbuilder:/swift_ringbuilder:ro']}, batch=17.1_20260112.1, managed_by=tripleo_ansible, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, architecture=x86_64, vcs-type=git, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.created=2026-01-12T22:50:51Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:51Z, io.buildah.version=1.41.5, vendor=Red Hat, Inc., version=17.1.13) Feb 2 08:09:08 np0005604725 podman[85458]: 2026-02-02 08:09:08.659143098 +0000 UTC m=+0.039274824 container died b4b98cf68fae4325dd8351299692b5d136410a537bbcad9123e53dc5dd308f18 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_setup_srv, batch=17.1_20260112.1, distribution-scope=public, container_name=swift_setup_srv, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.component=openstack-swift-account-container, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, config_data={'command': ['find', '/srv/node', '-maxdepth', '1', '-type', 'd', '-exec', 'chown', 'swift:', '{}', ';'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/srv/node:/srv/node:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, url=https://www.redhat.com, vendor=Red Hat, Inc., vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, config_id=tripleo_step3, name=rhosp-rhel9/openstack-swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, release=1766032510, org.opencontainers.image.created=2026-01-12T22:50:44Z, description=Red Hat OpenStack Platform 17.1 swift-account, build-date=2026-01-12T22:50:44Z, version=17.1.13, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64) Feb 2 08:09:08 np0005604725 podman[85474]: 2026-02-02 08:09:08.71258825 +0000 UTC m=+0.075867044 container cleanup 929ce971174433da7918b347e2148e966f3481693121f5094c4ad004cb022b3f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_copy_rings, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=swift_copy_rings, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:51Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:50:51Z, version=17.1.13, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp-rhel9/openstack-swift-proxy-server, batch=17.1_20260112.1, vendor=Red Hat, Inc., url=https://www.redhat.com, architecture=x86_64, com.redhat.component=openstack-swift-proxy-server-container, distribution-scope=public, config_data={'command': ['/bin/bash', '-c', 'cp -v -dR --preserve -t /etc/swift /swift_ringbuilder/etc/swift/*.gz /swift_ringbuilder/etc/swift/*.builder /swift_ringbuilder/etc/swift/backups'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72-0384afc25edd213d382c71d6593bd444'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/lib/config-data/puppet-generated/swift/etc/swift:/etc/swift:rw,z', '/var/lib/config-data/puppet-generated/swift_ringbuilder:/swift_ringbuilder:ro']}, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, io.buildah.version=1.41.5, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-proxy-server) Feb 2 08:09:08 np0005604725 systemd[1]: libpod-conmon-929ce971174433da7918b347e2148e966f3481693121f5094c4ad004cb022b3f.scope: Deactivated successfully. Feb 2 08:09:08 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_copy_rings --conmon-pidfile /run/swift_copy_rings.pid --detach=False --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72-0384afc25edd213d382c71d6593bd444 --label config_id=tripleo_step3 --label container_name=swift_copy_rings --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'cp -v -dR --preserve -t /etc/swift /swift_ringbuilder/etc/swift/*.gz /swift_ringbuilder/etc/swift/*.builder /swift_ringbuilder/etc/swift/backups'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72-0384afc25edd213d382c71d6593bd444'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/lib/config-data/puppet-generated/swift/etc/swift:/etc/swift:rw,z', '/var/lib/config-data/puppet-generated/swift_ringbuilder:/swift_ringbuilder:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_copy_rings.log --network none --user root --volume /var/lib/config-data/puppet-generated/swift/etc/swift:/etc/swift:rw,z --volume /var/lib/config-data/puppet-generated/swift_ringbuilder:/swift_ringbuilder:ro registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 /bin/bash -c cp -v -dR --preserve -t /etc/swift /swift_ringbuilder/etc/swift/*.gz /swift_ringbuilder/etc/swift/*.builder /swift_ringbuilder/etc/swift/backups Feb 2 08:09:08 np0005604725 podman[85458]: 2026-02-02 08:09:08.926665288 +0000 UTC m=+0.306797014 container cleanup b4b98cf68fae4325dd8351299692b5d136410a537bbcad9123e53dc5dd308f18 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_setup_srv, io.buildah.version=1.41.5, build-date=2026-01-12T22:50:44Z, version=17.1.13, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.component=openstack-swift-account-container, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, container_name=swift_setup_srv, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, config_data={'command': ['find', '/srv/node', '-maxdepth', '1', '-type', 'd', '-exec', 'chown', 'swift:', '{}', ';'], 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/srv/node:/srv/node:z']}, tcib_managed=true, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, url=https://www.redhat.com, name=rhosp-rhel9/openstack-swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, vcs-type=git, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:09:08 np0005604725 systemd[1]: libpod-conmon-b4b98cf68fae4325dd8351299692b5d136410a537bbcad9123e53dc5dd308f18.scope: Deactivated successfully. Feb 2 08:09:09 np0005604725 podman[85640]: 2026-02-02 08:09:09.268541655 +0000 UTC m=+0.062783957 container create a5377d0cf9058eaf5538b2def7cb02bc168fe333d7901314f1c87bccc56f7a02 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api_db_sync, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:34:35Z, summary=Red Hat OpenStack Platform 17.1 placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, architecture=x86_64, release=1766032510, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, batch=17.1_20260112.1, config_id=tripleo_step3, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, version=17.1.13, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:34:35Z, container_name=placement_api_db_sync, name=rhosp-rhel9/openstack-placement-api, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro']}, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-placement-api-container, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api) Feb 2 08:09:09 np0005604725 podman[85639]: 2026-02-02 08:09:09.30134146 +0000 UTC m=+0.099901733 container create f6824a58769f069a377a7d26667c537f37a3132f1609401dc8a72eac85ff585b (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_ensure_default_cells, architecture=x86_64, name=rhosp-rhel9/openstack-nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_ensure_default_cells.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, org.opencontainers.image.created=2026-01-12T23:31:50Z, build-date=2026-01-12T23:31:50Z, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step3, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, io.openshift.expose-services=, vcs-type=git, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_api_ensure_default_cells, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:09:09 np0005604725 systemd[1]: Started libpod-conmon-a5377d0cf9058eaf5538b2def7cb02bc168fe333d7901314f1c87bccc56f7a02.scope. Feb 2 08:09:09 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:09 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/fed3bd1181acb651e82511164a48ab4e1484edf51245df3a1bbea03b05980174/merged/var/log/placement supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:09 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/fed3bd1181acb651e82511164a48ab4e1484edf51245df3a1bbea03b05980174/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:09 np0005604725 systemd[1]: Started libpod-conmon-f6824a58769f069a377a7d26667c537f37a3132f1609401dc8a72eac85ff585b.scope. Feb 2 08:09:09 np0005604725 podman[85640]: 2026-02-02 08:09:09.330010041 +0000 UTC m=+0.124252353 container init a5377d0cf9058eaf5538b2def7cb02bc168fe333d7901314f1c87bccc56f7a02 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api_db_sync, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, url=https://www.redhat.com, io.openshift.expose-services=, version=17.1.13, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro']}, batch=17.1_20260112.1, container_name=placement_api_db_sync, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:34:35Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:35Z, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, release=1766032510, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, distribution-scope=public, com.redhat.component=openstack-placement-api-container) Feb 2 08:09:09 np0005604725 podman[85640]: 2026-02-02 08:09:09.234888154 +0000 UTC m=+0.029130456 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Feb 2 08:09:09 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:09 np0005604725 podman[85640]: 2026-02-02 08:09:09.338988553 +0000 UTC m=+0.133230865 container start a5377d0cf9058eaf5538b2def7cb02bc168fe333d7901314f1c87bccc56f7a02 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api_db_sync, build-date=2026-01-12T22:34:35Z, managed_by=tripleo_ansible, vcs-type=git, container_name=placement_api_db_sync, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-placement-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-placement-api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., architecture=x86_64, version=17.1.13, description=Red Hat OpenStack Platform 17.1 placement-api, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.created=2026-01-12T22:34:35Z, io.openshift.expose-services=, config_id=tripleo_step3, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, maintainer=OpenStack TripleO Team, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro']}) Feb 2 08:09:09 np0005604725 podman[85640]: 2026-02-02 08:09:09.33921798 +0000 UTC m=+0.133460322 container attach a5377d0cf9058eaf5538b2def7cb02bc168fe333d7901314f1c87bccc56f7a02 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api_db_sync, vcs-type=git, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, io.buildah.version=1.41.5, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro']}, tcib_managed=true, config_id=tripleo_step3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-placement-api-container, build-date=2026-01-12T22:34:35Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, container_name=placement_api_db_sync, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-placement-api, io.openshift.expose-services=, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, org.opencontainers.image.created=2026-01-12T22:34:35Z, managed_by=tripleo_ansible, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, version=17.1.13) Feb 2 08:09:09 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5c632c8c3495fb8a21c2423577c37c0f470e26d69738262d09af6437ed2b0cb5/merged/container-config-scripts supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:09 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5c632c8c3495fb8a21c2423577c37c0f470e26d69738262d09af6437ed2b0cb5/merged/var/log/nova supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:09 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5c632c8c3495fb8a21c2423577c37c0f470e26d69738262d09af6437ed2b0cb5/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:09 np0005604725 podman[85639]: 2026-02-02 08:09:09.245097813 +0000 UTC m=+0.043658046 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:09:09 np0005604725 podman[85639]: 2026-02-02 08:09:09.349799762 +0000 UTC m=+0.148360005 container init f6824a58769f069a377a7d26667c537f37a3132f1609401dc8a72eac85ff585b (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_ensure_default_cells, vcs-type=git, distribution-scope=public, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_ensure_default_cells.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, org.opencontainers.image.created=2026-01-12T23:31:50Z, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T23:31:50Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-nova-api, com.redhat.component=openstack-nova-api-container, description=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_api_ensure_default_cells, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, release=1766032510, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, batch=17.1_20260112.1) Feb 2 08:09:09 np0005604725 podman[85639]: 2026-02-02 08:09:09.359391222 +0000 UTC m=+0.157951465 container start f6824a58769f069a377a7d26667c537f37a3132f1609401dc8a72eac85ff585b (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_ensure_default_cells, name=rhosp-rhel9/openstack-nova-api, build-date=2026-01-12T23:31:50Z, distribution-scope=public, managed_by=tripleo_ansible, io.openshift.expose-services=, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.13, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1, vcs-type=git, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step3, release=1766032510, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_ensure_default_cells.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, org.opencontainers.image.created=2026-01-12T23:31:50Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_api_ensure_default_cells, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:09:09 np0005604725 podman[85639]: 2026-02-02 08:09:09.362520137 +0000 UTC m=+0.161080410 container attach f6824a58769f069a377a7d26667c537f37a3132f1609401dc8a72eac85ff585b (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_ensure_default_cells, vendor=Red Hat, Inc., architecture=x86_64, name=rhosp-rhel9/openstack-nova-api, config_id=tripleo_step3, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.buildah.version=1.41.5, managed_by=tripleo_ansible, io.openshift.expose-services=, com.redhat.component=openstack-nova-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, summary=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 nova-api, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_ensure_default_cells.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, version=17.1.13, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, distribution-scope=public, vcs-type=git, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:31:50Z, container_name=nova_api_ensure_default_cells) Feb 2 08:09:09 np0005604725 systemd[1]: var-lib-containers-storage-overlay-0c4fb760ea9b3bdff67e0cc1c4709d650729c6cdfe0ede9ab4861c7b8783e4b7-merged.mount: Deactivated successfully. Feb 2 08:09:09 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-929ce971174433da7918b347e2148e966f3481693121f5094c4ad004cb022b3f-userdata-shm.mount: Deactivated successfully. Feb 2 08:09:09 np0005604725 systemd[1]: var-lib-containers-storage-overlay-c3e201787b4740a0bc484098194a59bf4624c83faaa68f10386249d534778850-merged.mount: Deactivated successfully. Feb 2 08:09:09 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-060788da4aaf6095289890def183ddc513339d02f477a42d4219fc175d2157c5-userdata-shm.mount: Deactivated successfully. Feb 2 08:09:09 np0005604725 systemd[1]: libpod-a5377d0cf9058eaf5538b2def7cb02bc168fe333d7901314f1c87bccc56f7a02.scope: Deactivated successfully. Feb 2 08:09:09 np0005604725 podman[85640]: 2026-02-02 08:09:09.538068806 +0000 UTC m=+0.332311108 container died a5377d0cf9058eaf5538b2def7cb02bc168fe333d7901314f1c87bccc56f7a02 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api_db_sync, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step3, managed_by=tripleo_ansible, vcs-ref=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:34:35Z, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro']}, build-date=2026-01-12T22:34:35Z, release=1766032510, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., version=17.1.13, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-placement-api-container, container_name=placement_api_db_sync, architecture=x86_64, distribution-scope=public, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, vcs-type=git, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api) Feb 2 08:09:09 np0005604725 systemd[1]: libpod-f6824a58769f069a377a7d26667c537f37a3132f1609401dc8a72eac85ff585b.scope: Deactivated successfully. Feb 2 08:09:09 np0005604725 podman[85639]: 2026-02-02 08:09:09.551312888 +0000 UTC m=+0.349873141 container died f6824a58769f069a377a7d26667c537f37a3132f1609401dc8a72eac85ff585b (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_ensure_default_cells, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, architecture=x86_64, name=rhosp-rhel9/openstack-nova-api, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-api-container, tcib_managed=true, release=1766032510, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, build-date=2026-01-12T23:31:50Z, vcs-type=git, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, config_id=tripleo_step3, io.buildah.version=1.41.5, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_ensure_default_cells.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_api_ensure_default_cells, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:09:09 np0005604725 systemd[1]: tmp-crun.o1v9UN.mount: Deactivated successfully. Feb 2 08:09:09 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-a5377d0cf9058eaf5538b2def7cb02bc168fe333d7901314f1c87bccc56f7a02-userdata-shm.mount: Deactivated successfully. Feb 2 08:09:09 np0005604725 podman[85690]: 2026-02-02 08:09:09.656432598 +0000 UTC m=+0.112320630 container cleanup a5377d0cf9058eaf5538b2def7cb02bc168fe333d7901314f1c87bccc56f7a02 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api_db_sync, maintainer=OpenStack TripleO Team, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro']}, config_id=tripleo_step3, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, build-date=2026-01-12T22:34:35Z, summary=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.expose-services=, url=https://www.redhat.com, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-placement-api, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:34:35Z, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, distribution-scope=public, com.redhat.component=openstack-placement-api-container, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, version=17.1.13, vcs-ref=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=placement_api_db_sync, architecture=x86_64, release=1766032510) Feb 2 08:09:09 np0005604725 podman[85696]: 2026-02-02 08:09:09.659932394 +0000 UTC m=+0.099823490 container cleanup f6824a58769f069a377a7d26667c537f37a3132f1609401dc8a72eac85ff585b (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_ensure_default_cells, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-nova-api, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.buildah.version=1.41.5, build-date=2026-01-12T23:31:50Z, com.redhat.component=openstack-nova-api-container, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_ensure_default_cells.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, container_name=nova_api_ensure_default_cells, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, io.openshift.expose-services=, tcib_managed=true, vcs-type=git, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, release=1766032510, version=17.1.13) Feb 2 08:09:09 np0005604725 systemd[1]: libpod-conmon-a5377d0cf9058eaf5538b2def7cb02bc168fe333d7901314f1c87bccc56f7a02.scope: Deactivated successfully. Feb 2 08:09:09 np0005604725 systemd[1]: libpod-conmon-f6824a58769f069a377a7d26667c537f37a3132f1609401dc8a72eac85ff585b.scope: Deactivated successfully. Feb 2 08:09:09 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name placement_api_db_sync --cap-add AUDIT_WRITE --conmon-pidfile /run/placement_api_db_sync.pid --detach=False --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --env TRIPLEO_CONFIG_HASH=ae2de9ab0db0f109a0e66975aa28d256 --label config_id=tripleo_step3 --label container_name=placement_api_db_sync --label managed_by=tripleo_ansible --label config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/placement_api_db_sync.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/placement:/var/log/placement:z --volume /var/log/containers/httpd/placement:/var/log/httpd:z --volume /var/lib/kolla/config_files/placement_api_db_sync.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Feb 2 08:09:09 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name nova_api_ensure_default_cells --conmon-pidfile /run/nova_api_ensure_default_cells.pid --detach=False --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env __OS_DEBUG=true --env TRIPLEO_CONFIG_HASH=0f33bf354435ad6e844c942ca95c792b --label config_id=tripleo_step3 --label container_name=nova_api_ensure_default_cells --label managed_by=tripleo_ansible --label config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_ensure_default_cells.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/nova_api_ensure_default_cells.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/nova:/var/log/nova:z --volume /var/log/containers/httpd/nova-api:/var/log/httpd:z --volume /var/lib/kolla/config_files/nova_api_ensure_default_cells.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro --volume /var/lib/container-config-scripts:/container-config-scripts:z registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:09:10 np0005604725 podman[85866]: 2026-02-02 08:09:10.16483289 +0000 UTC m=+0.076018928 container create 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, container_name=keystone, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, io.buildah.version=1.41.5, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-keystone, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-keystone-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, vcs-ref=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:33:53Z, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, description=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:33:53Z) Feb 2 08:09:10 np0005604725 podman[85859]: 2026-02-02 08:09:10.181240479 +0000 UTC m=+0.100623226 container create 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, build-date=2026-01-12T22:34:43Z, vendor=Red Hat, Inc., container_name=iscsid, com.redhat.component=openstack-iscsid-container, name=rhosp-rhel9/openstack-iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:34:43Z, vcs-type=git, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 iscsid, release=1766032510, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, architecture=x86_64, config_id=tripleo_step3, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:09:10 np0005604725 systemd[1]: Started libpod-conmon-408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.scope. Feb 2 08:09:10 np0005604725 systemd[1]: Started libpod-conmon-758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.scope. Feb 2 08:09:10 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:10 np0005604725 podman[85859]: 2026-02-02 08:09:10.115609246 +0000 UTC m=+0.034991883 image pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Feb 2 08:09:10 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:10 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6f8630328a09c4045c92947a165b41fe4adf28b240833c8e2ff0feae762e4f70/merged/etc/target supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:10 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ece27a8edb14fa79bf95ec98c2e00350a5447a1ad76ad52e21c5b0c9ef815155/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:10 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ece27a8edb14fa79bf95ec98c2e00350a5447a1ad76ad52e21c5b0c9ef815155/merged/var/log/keystone supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:10 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6f8630328a09c4045c92947a165b41fe4adf28b240833c8e2ff0feae762e4f70/merged/var/lib/iscsi supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:10 np0005604725 podman[85866]: 2026-02-02 08:09:10.122669741 +0000 UTC m=+0.033855859 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Feb 2 08:09:10 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:09:10 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:09:10 np0005604725 podman[85866]: 2026-02-02 08:09:10.240510777 +0000 UTC m=+0.151696815 container init 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, architecture=x86_64, url=https://www.redhat.com, io.openshift.expose-services=, batch=17.1_20260112.1, config_id=tripleo_step3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:33:53Z, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=keystone, com.redhat.component=openstack-keystone-container, build-date=2026-01-12T22:33:53Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, description=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true) Feb 2 08:09:10 np0005604725 podman[85859]: 2026-02-02 08:09:10.240336622 +0000 UTC m=+0.159719229 container init 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:34:43Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.expose-services=, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, version=17.1.13, vendor=Red Hat, Inc., batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, release=1766032510, architecture=x86_64, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-iscsid, managed_by=tripleo_ansible, vcs-type=git, distribution-scope=public, container_name=iscsid, com.redhat.component=openstack-iscsid-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 iscsid, build-date=2026-01-12T22:34:43Z, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid) Feb 2 08:09:10 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:09:10 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:09:10 np0005604725 podman[85866]: 2026-02-02 08:09:10.280957205 +0000 UTC m=+0.192143243 container start 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, config_id=tripleo_step3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:33:53Z, batch=17.1_20260112.1, build-date=2026-01-12T22:33:53Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, name=rhosp-rhel9/openstack-keystone, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=keystone, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-keystone-container, architecture=x86_64, distribution-scope=public, maintainer=OpenStack TripleO Team, version=17.1.13) Feb 2 08:09:10 np0005604725 systemd-logind[36465]: Existing logind session ID 15 used by new audit session, ignoring. Feb 2 08:09:10 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name keystone --conmon-pidfile /run/keystone.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=dff5bf4ccd6d0a40575dff90620f5e0d --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step3 --label container_name=keystone --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/keystone.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/keystone:/var/log/keystone:z --volume /var/log/containers/httpd/keystone:/var/log/httpd:z --volume /etc/openldap:/etc/openldap:ro --volume /var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro --volume /etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Feb 2 08:09:10 np0005604725 systemd[1]: Started Session c2 of User root. Feb 2 08:09:10 np0005604725 podman[85909]: 2026-02-02 08:09:10.377835506 +0000 UTC m=+0.087391244 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=starting, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, architecture=x86_64, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:33:53Z, config_id=tripleo_step3, com.redhat.component=openstack-keystone-container, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.5, url=https://www.redhat.com, tcib_managed=true, distribution-scope=public, name=rhosp-rhel9/openstack-keystone, vcs-type=git, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:33:53Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, release=1766032510, container_name=keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:09:10 np0005604725 systemd[1]: session-c2.scope: Deactivated successfully. Feb 2 08:09:10 np0005604725 kernel: Loading iSCSI transport class v2.0-870. Feb 2 08:09:10 np0005604725 systemd[1]: var-lib-containers-storage-overlay-5c632c8c3495fb8a21c2423577c37c0f470e26d69738262d09af6437ed2b0cb5-merged.mount: Deactivated successfully. Feb 2 08:09:10 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-f6824a58769f069a377a7d26667c537f37a3132f1609401dc8a72eac85ff585b-userdata-shm.mount: Deactivated successfully. Feb 2 08:09:10 np0005604725 systemd[1]: var-lib-containers-storage-overlay-fed3bd1181acb651e82511164a48ab4e1484edf51245df3a1bbea03b05980174-merged.mount: Deactivated successfully. Feb 2 08:09:10 np0005604725 podman[85859]: 2026-02-02 08:09:10.440608571 +0000 UTC m=+0.359991188 container start 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, com.redhat.component=openstack-iscsid-container, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, summary=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, container_name=iscsid, version=17.1.13, build-date=2026-01-12T22:34:43Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, description=Red Hat OpenStack Platform 17.1 iscsid, io.buildah.version=1.41.5, architecture=x86_64, vcs-type=git, config_id=tripleo_step3, vendor=Red Hat, Inc., io.openshift.expose-services=, url=https://www.redhat.com, distribution-scope=public) Feb 2 08:09:10 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name iscsid --conmon-pidfile /run/iscsid.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=9bab49ca47f1b48252b0430bf6d56c46 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step3 --label container_name=iscsid --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/iscsid.log --network host --privileged=True --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro --volume /dev:/dev --volume /run:/run --volume /sys:/sys --volume /lib/modules:/lib/modules:ro --volume /var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro --volume /etc/target:/etc/target:z --volume /var/lib/iscsi:/var/lib/iscsi:z registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Feb 2 08:09:10 np0005604725 podman[85912]: 2026-02-02 08:09:10.469442955 +0000 UTC m=+0.184192081 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=starting, description=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, config_id=tripleo_step3, io.buildah.version=1.41.5, vcs-type=git, container_name=iscsid, build-date=2026-01-12T22:34:43Z, architecture=x86_64, vcs-ref=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-iscsid, release=1766032510, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-iscsid-container, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, managed_by=tripleo_ansible, distribution-scope=public, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com) Feb 2 08:09:10 np0005604725 podman[85912]: 2026-02-02 08:09:10.510735229 +0000 UTC m=+0.225484335 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-iscsid-container, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, vcs-type=git, distribution-scope=public, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., build-date=2026-01-12T22:34:43Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-iscsid, architecture=x86_64, vcs-ref=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, container_name=iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, io.buildah.version=1.41.5, release=1766032510, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, tcib_managed=true, managed_by=tripleo_ansible, config_id=tripleo_step3, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team) Feb 2 08:09:10 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:09:10 np0005604725 podman[86064]: 2026-02-02 08:09:10.796867264 +0000 UTC m=+0.087155636 container exec 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., release=1766032510, batch=17.1_20260112.1, url=https://www.redhat.com, io.buildah.version=1.41.5, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:33:53Z, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.component=openstack-keystone-container, tcib_managed=true, version=17.1.13, container_name=keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:33:53Z, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, description=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step3) Feb 2 08:09:10 np0005604725 podman[86096]: 2026-02-02 08:09:10.861464915 +0000 UTC m=+0.064023335 container create 9b531d06a06ca3d4a2bc7c5cfecfa88bd750adee6ab5eaba54299b3b2bd62e29 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_db_sync, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, io.buildah.version=1.41.5, version=17.1.13, container_name=nova_db_sync, summary=Red Hat OpenStack Platform 17.1 nova-conductor, distribution-scope=public, vendor=Red Hat, Inc., release=1766032510, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, config_id=tripleo_step3, description=Red Hat OpenStack Platform 17.1 nova-conductor, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-nova-conductor, vcs-type=git, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.created=2026-01-12T23:32:18Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-nova-conductor-container, managed_by=tripleo_ansible, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:32:18Z) Feb 2 08:09:10 np0005604725 systemd[1]: Started libpod-conmon-9b531d06a06ca3d4a2bc7c5cfecfa88bd750adee6ab5eaba54299b3b2bd62e29.scope. Feb 2 08:09:10 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:10 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/4f8c5e2dedb7ee8c1165c5430adbe95715e4e08f7d5bd83a001ab4faa2b66de2/merged/var/log/nova supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:10 np0005604725 podman[86096]: 2026-02-02 08:09:10.923814758 +0000 UTC m=+0.126373168 container init 9b531d06a06ca3d4a2bc7c5cfecfa88bd750adee6ab5eaba54299b3b2bd62e29 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_db_sync, distribution-scope=public, vendor=Red Hat, Inc., vcs-type=git, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:32:18Z, architecture=x86_64, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.openshift.expose-services=, io.buildah.version=1.41.5, url=https://www.redhat.com, com.redhat.component=openstack-nova-conductor-container, build-date=2026-01-12T23:32:18Z, description=Red Hat OpenStack Platform 17.1 nova-conductor, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, tcib_managed=true, container_name=nova_db_sync, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, release=1766032510, config_id=tripleo_step3, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 nova-conductor, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-nova-conductor, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:09:10 np0005604725 podman[86096]: 2026-02-02 08:09:10.825155382 +0000 UTC m=+0.027713812 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 Feb 2 08:09:10 np0005604725 podman[86096]: 2026-02-02 08:09:10.931330965 +0000 UTC m=+0.133889375 container start 9b531d06a06ca3d4a2bc7c5cfecfa88bd750adee6ab5eaba54299b3b2bd62e29 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_db_sync, managed_by=tripleo_ansible, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, vcs-type=git, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, url=https://www.redhat.com, name=rhosp-rhel9/openstack-nova-conductor, summary=Red Hat OpenStack Platform 17.1 nova-conductor, build-date=2026-01-12T23:32:18Z, com.redhat.component=openstack-nova-conductor-container, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vendor=Red Hat, Inc., vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T23:32:18Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, config_id=tripleo_step3, description=Red Hat OpenStack Platform 17.1 nova-conductor, distribution-scope=public, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=nova_db_sync, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, io.buildah.version=1.41.5, release=1766032510) Feb 2 08:09:10 np0005604725 podman[86096]: 2026-02-02 08:09:10.931539552 +0000 UTC m=+0.134097972 container attach 9b531d06a06ca3d4a2bc7c5cfecfa88bd750adee6ab5eaba54299b3b2bd62e29 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_db_sync, url=https://www.redhat.com, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:32:18Z, build-date=2026-01-12T23:32:18Z, config_id=tripleo_step3, description=Red Hat OpenStack Platform 17.1 nova-conductor, summary=Red Hat OpenStack Platform 17.1 nova-conductor, release=1766032510, version=17.1.13, container_name=nova_db_sync, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, io.openshift.expose-services=, name=rhosp-rhel9/openstack-nova-conductor, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-conductor-container, tcib_managed=true, io.buildah.version=1.41.5, architecture=x86_64, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor) Feb 2 08:09:10 np0005604725 podman[86064]: 2026-02-02 08:09:10.936839243 +0000 UTC m=+0.227127595 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, vcs-type=git, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, com.redhat.component=openstack-keystone-container, io.openshift.expose-services=, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, batch=17.1_20260112.1, container_name=keystone, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:33:53Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., managed_by=tripleo_ansible, build-date=2026-01-12T22:33:53Z, summary=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, io.buildah.version=1.41.5, config_id=tripleo_step3, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:09:11 np0005604725 systemd[1]: libpod-9b531d06a06ca3d4a2bc7c5cfecfa88bd750adee6ab5eaba54299b3b2bd62e29.scope: Deactivated successfully. Feb 2 08:09:11 np0005604725 podman[86096]: 2026-02-02 08:09:11.103470931 +0000 UTC m=+0.306029401 container died 9b531d06a06ca3d4a2bc7c5cfecfa88bd750adee6ab5eaba54299b3b2bd62e29 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_db_sync, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, distribution-scope=public, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, tcib_managed=true, build-date=2026-01-12T23:32:18Z, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 nova-conductor, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, com.redhat.component=openstack-nova-conductor-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, release=1766032510, io.buildah.version=1.41.5, io.openshift.expose-services=, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, container_name=nova_db_sync, architecture=x86_64, vendor=Red Hat, Inc., vcs-type=git, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T23:32:18Z, name=rhosp-rhel9/openstack-nova-conductor) Feb 2 08:09:11 np0005604725 podman[86153]: 2026-02-02 08:09:11.21281907 +0000 UTC m=+0.098209842 container cleanup 9b531d06a06ca3d4a2bc7c5cfecfa88bd750adee6ab5eaba54299b3b2bd62e29 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_db_sync, url=https://www.redhat.com, batch=17.1_20260112.1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-nova-conductor-container, io.openshift.expose-services=, vcs-type=git, distribution-scope=public, architecture=x86_64, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-nova-conductor, summary=Red Hat OpenStack Platform 17.1 nova-conductor, maintainer=OpenStack TripleO Team, tcib_managed=true, io.buildah.version=1.41.5, release=1766032510, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.created=2026-01-12T23:32:18Z, config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, build-date=2026-01-12T23:32:18Z, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, container_name=nova_db_sync, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, description=Red Hat OpenStack Platform 17.1 nova-conductor, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible) Feb 2 08:09:11 np0005604725 systemd[1]: libpod-conmon-9b531d06a06ca3d4a2bc7c5cfecfa88bd750adee6ab5eaba54299b3b2bd62e29.scope: Deactivated successfully. Feb 2 08:09:11 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name nova_db_sync --cap-add AUDIT_WRITE --conmon-pidfile /run/nova_db_sync.pid --detach=False --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --env TRIPLEO_CONFIG_HASH=0f33bf354435ad6e844c942ca95c792b --label config_id=tripleo_step3 --label container_name=nova_db_sync --label managed_by=tripleo_ansible --label config_data={'cap_add': ['AUDIT_WRITE'], 'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor_db_sync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/nova_db_sync.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/nova:/var/log/nova --volume /var/lib/kolla/config_files/nova_conductor_db_sync.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 Feb 2 08:09:11 np0005604725 systemd[1]: var-lib-containers-storage-overlay-4f8c5e2dedb7ee8c1165c5430adbe95715e4e08f7d5bd83a001ab4faa2b66de2-merged.mount: Deactivated successfully. Feb 2 08:09:11 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-9b531d06a06ca3d4a2bc7c5cfecfa88bd750adee6ab5eaba54299b3b2bd62e29-userdata-shm.mount: Deactivated successfully. Feb 2 08:09:11 np0005604725 podman[86239]: 2026-02-02 08:09:11.535179364 +0000 UTC m=+0.053023800 container create 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, release=1766032510, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=keystone_cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:33:53Z, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, version=17.1.13, tcib_managed=true, com.redhat.component=openstack-keystone-container, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, url=https://www.redhat.com, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, config_id=tripleo_step3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, batch=17.1_20260112.1) Feb 2 08:09:11 np0005604725 systemd[1]: Started libpod-conmon-40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.scope. Feb 2 08:09:11 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:11 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/54b2c5ffb3abebaad064b2bde313d24fca5b6c1668cf097637d20139644bd9ea/merged/var/log/keystone supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:11 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/54b2c5ffb3abebaad064b2bde313d24fca5b6c1668cf097637d20139644bd9ea/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:09:11 np0005604725 podman[86239]: 2026-02-02 08:09:11.6019105 +0000 UTC m=+0.119754926 container init 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, summary=Red Hat OpenStack Platform 17.1 keystone, build-date=2026-01-12T22:33:53Z, managed_by=tripleo_ansible, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, vendor=Red Hat, Inc., container_name=keystone_cron, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, config_id=tripleo_step3, com.redhat.component=openstack-keystone-container, tcib_managed=true, name=rhosp-rhel9/openstack-keystone, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:33:53Z, vcs-type=git) Feb 2 08:09:11 np0005604725 podman[86239]: 2026-02-02 08:09:11.507618228 +0000 UTC m=+0.025462654 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Feb 2 08:09:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:09:11 np0005604725 podman[86239]: 2026-02-02 08:09:11.633674444 +0000 UTC m=+0.151518860 container start 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, architecture=x86_64, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, vendor=Red Hat, Inc., distribution-scope=public, batch=17.1_20260112.1, container_name=keystone_cron, version=17.1.13, managed_by=tripleo_ansible, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:33:53Z, com.redhat.component=openstack-keystone-container, name=rhosp-rhel9/openstack-keystone, config_id=tripleo_step3, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, build-date=2026-01-12T22:33:53Z, io.openshift.expose-services=, release=1766032510) Feb 2 08:09:11 np0005604725 python3[83943]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name keystone_cron --conmon-pidfile /run/keystone_cron.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=dff5bf4ccd6d0a40575dff90620f5e0d --healthcheck-command /usr/share/openstack-tripleo-common/healthcheck/cron keystone --label config_id=tripleo_step3 --label container_name=keystone_cron --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/keystone_cron.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/keystone:/var/log/keystone:z --volume /var/log/containers/httpd/keystone:/var/log/httpd:z --volume /var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 /bin/bash -c /usr/local/bin/kolla_set_configs && /usr/sbin/crond -n Feb 2 08:09:11 np0005604725 podman[86261]: 2026-02-02 08:09:11.704823163 +0000 UTC m=+0.066667734 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=starting, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, architecture=x86_64, io.buildah.version=1.41.5, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, vendor=Red Hat, Inc., tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:33:53Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, release=1766032510, container_name=keystone_cron, com.redhat.component=openstack-keystone-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone) Feb 2 08:09:11 np0005604725 podman[86261]: 2026-02-02 08:09:11.784727709 +0000 UTC m=+0.146572300 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, vendor=Red Hat, Inc., config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, batch=17.1_20260112.1, release=1766032510, com.redhat.component=openstack-keystone-container, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, build-date=2026-01-12T22:33:53Z, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step3, summary=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, architecture=x86_64, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:33:53Z, container_name=keystone_cron, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:09:11 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:09:11 np0005604725 podman[85909]: 2026-02-02 08:09:11.991946959 +0000 UTC m=+1.701502687 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, release=1766032510, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:33:53Z, name=rhosp-rhel9/openstack-keystone, container_name=keystone, config_id=tripleo_step3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, build-date=2026-01-12T22:33:53Z, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, batch=17.1_20260112.1, com.redhat.component=openstack-keystone-container, vcs-type=git, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true) Feb 2 08:09:12 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:09:12 np0005604725 python3[86331]: ansible-file Invoked with path=/etc/systemd/system/tripleo_collectd.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:12 np0005604725 python3[86355]: ansible-file Invoked with path=/etc/systemd/system/tripleo_horizon.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:12 np0005604725 python3[86461]: ansible-file Invoked with path=/etc/systemd/system/tripleo_iscsid.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:13 np0005604725 python3[86485]: ansible-file Invoked with path=/etc/systemd/system/tripleo_keystone.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:13 np0005604725 python3[86516]: ansible-file Invoked with path=/etc/systemd/system/tripleo_keystone_cron.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:13 np0005604725 python3[86540]: ansible-file Invoked with path=/etc/systemd/system/tripleo_rsyslog.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:09:13 np0005604725 sshd[86619]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:09:13 np0005604725 podman[86583]: 2026-02-02 08:09:13.773777373 +0000 UTC m=+0.090168028 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, version=17.1.13, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:10:18Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, container_name=clustercheck, io.buildah.version=1.41.5, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step2, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, batch=17.1_20260112.1, com.redhat.component=openstack-mariadb-container, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, name=rhosp-rhel9/openstack-mariadb, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:09:13 np0005604725 python3[86582]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_collectd_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:09:13 np0005604725 podman[86583]: 2026-02-02 08:09:13.844830889 +0000 UTC m=+0.161221534 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, version=17.1.13, managed_by=tripleo_ansible, config_id=tripleo_step2, vendor=Red Hat, Inc., architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-mariadb-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:18Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, url=https://www.redhat.com, tcib_managed=true, container_name=clustercheck, name=rhosp-rhel9/openstack-mariadb) Feb 2 08:09:13 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:09:14 np0005604725 python3[86672]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_horizon_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:09:14 np0005604725 python3[86697]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_iscsid_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:09:14 np0005604725 python3[86750]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_keystone_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:09:14 np0005604725 python3[86833]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_keystone_cron_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:09:15 np0005604725 python3[86857]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_rsyslog_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:09:15 np0005604725 python3[86973]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019755.1816125-130977-90605457426793/source dest=/etc/systemd/system/tripleo_collectd.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:16 np0005604725 python3[87037]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019755.1816125-130977-90605457426793/source dest=/etc/systemd/system/tripleo_horizon.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:16 np0005604725 python3[87074]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019755.1816125-130977-90605457426793/source dest=/etc/systemd/system/tripleo_iscsid.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:17 np0005604725 python3[87141]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019755.1816125-130977-90605457426793/source dest=/etc/systemd/system/tripleo_keystone.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:17 np0005604725 python3[87209]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019755.1816125-130977-90605457426793/source dest=/etc/systemd/system/tripleo_keystone_cron.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:18 np0005604725 python3[87250]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019755.1816125-130977-90605457426793/source dest=/etc/systemd/system/tripleo_rsyslog.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:18 np0005604725 python3[87270]: ansible-systemd Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Feb 2 08:09:18 np0005604725 systemd[1]: Reloading. Feb 2 08:09:18 np0005604725 systemd-rc-local-generator[87306]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:09:18 np0005604725 systemd-sysv-generator[87310]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:09:18 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:09:19 np0005604725 python3[87348]: ansible-systemd Invoked with state=restarted name=tripleo_collectd.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:09:19 np0005604725 systemd[1]: Reloading. Feb 2 08:09:19 np0005604725 systemd-sysv-generator[87386]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:09:19 np0005604725 systemd-rc-local-generator[87383]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:09:19 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:09:20 np0005604725 systemd[1]: Starting collectd container... Feb 2 08:09:20 np0005604725 systemd[1]: Started collectd container. Feb 2 08:09:20 np0005604725 systemd[1]: Stopping User Manager for UID 0... Feb 2 08:09:20 np0005604725 systemd[84281]: Activating special unit Exit the Session... Feb 2 08:09:20 np0005604725 systemd[84281]: Stopped target Main User Target. Feb 2 08:09:20 np0005604725 systemd[84281]: Stopped target Basic System. Feb 2 08:09:20 np0005604725 systemd[84281]: Stopped target Paths. Feb 2 08:09:20 np0005604725 systemd[84281]: Stopped target Sockets. Feb 2 08:09:20 np0005604725 systemd[84281]: Stopped target Timers. Feb 2 08:09:20 np0005604725 systemd[84281]: Stopped Daily Cleanup of User's Temporary Directories. Feb 2 08:09:20 np0005604725 systemd[84281]: Closed D-Bus User Message Bus Socket. Feb 2 08:09:20 np0005604725 systemd[84281]: Stopped Create User's Volatile Files and Directories. Feb 2 08:09:20 np0005604725 systemd[84281]: Removed slice User Application Slice. Feb 2 08:09:20 np0005604725 systemd[84281]: Reached target Shutdown. Feb 2 08:09:20 np0005604725 systemd[84281]: Finished Exit the Session. Feb 2 08:09:20 np0005604725 systemd[84281]: Reached target Exit the Session. Feb 2 08:09:20 np0005604725 systemd[1]: user@0.service: Deactivated successfully. Feb 2 08:09:20 np0005604725 systemd[1]: Stopped User Manager for UID 0. Feb 2 08:09:20 np0005604725 systemd[1]: Stopping User Runtime Directory /run/user/0... Feb 2 08:09:20 np0005604725 systemd[1]: run-user-0.mount: Deactivated successfully. Feb 2 08:09:20 np0005604725 systemd[1]: user-runtime-dir@0.service: Deactivated successfully. Feb 2 08:09:20 np0005604725 systemd[1]: Stopped User Runtime Directory /run/user/0. Feb 2 08:09:20 np0005604725 systemd[1]: Removed slice User Slice of UID 0. Feb 2 08:09:21 np0005604725 python3[87507]: ansible-systemd Invoked with state=restarted name=tripleo_horizon.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:09:21 np0005604725 systemd[1]: Reloading. Feb 2 08:09:21 np0005604725 systemd-rc-local-generator[87550]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:09:21 np0005604725 systemd-sysv-generator[87553]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:09:21 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:09:21 np0005604725 systemd[1]: Starting horizon container... Feb 2 08:09:21 np0005604725 systemd[1]: Started horizon container. Feb 2 08:09:22 np0005604725 python3[87617]: ansible-systemd Invoked with state=restarted name=tripleo_iscsid.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:09:22 np0005604725 systemd[1]: Reloading. Feb 2 08:09:22 np0005604725 systemd-rc-local-generator[87691]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:09:22 np0005604725 systemd-sysv-generator[87696]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:09:22 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:09:23 np0005604725 systemd[1]: Starting iscsid container... Feb 2 08:09:23 np0005604725 systemd[1]: Started iscsid container. Feb 2 08:09:23 np0005604725 python3[87758]: ansible-systemd Invoked with state=restarted name=tripleo_keystone.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:09:24 np0005604725 systemd[1]: Reloading. Feb 2 08:09:24 np0005604725 systemd-rc-local-generator[87784]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:09:24 np0005604725 systemd-sysv-generator[87787]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:09:24 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:09:24 np0005604725 systemd[1]: Starting keystone container... Feb 2 08:09:24 np0005604725 systemd[1]: Started keystone container. Feb 2 08:09:25 np0005604725 sshd[87874]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:09:25 np0005604725 python3[87898]: ansible-systemd Invoked with state=restarted name=tripleo_keystone_cron.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:09:25 np0005604725 sshd[87908]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:09:26 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:09:26 np0005604725 podman[87925]: 2026-02-02 08:09:26.333686303 +0000 UTC m=+0.085357232 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, name=rhosp-rhel9/openstack-memcached, vendor=Red Hat, Inc., build-date=2026-01-12T22:12:26Z, description=Red Hat OpenStack Platform 17.1 memcached, release=1766032510, io.buildah.version=1.41.5, architecture=x86_64, version=17.1.13, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step1, container_name=memcached, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, com.redhat.component=openstack-memcached-container, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:12:26Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, summary=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.openshift.expose-services=, managed_by=tripleo_ansible) Feb 2 08:09:26 np0005604725 podman[87925]: 2026-02-02 08:09:26.352735651 +0000 UTC m=+0.104406580 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, name=rhosp-rhel9/openstack-memcached, url=https://www.redhat.com, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, distribution-scope=public, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:12:26Z, container_name=memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, io.openshift.expose-services=, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.buildah.version=1.41.5, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 memcached, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-memcached-container, build-date=2026-01-12T22:12:26Z) Feb 2 08:09:26 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:09:26 np0005604725 systemd[1]: Reloading. Feb 2 08:09:26 np0005604725 systemd-rc-local-generator[88034]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:09:26 np0005604725 systemd-sysv-generator[88037]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:09:26 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:09:26 np0005604725 systemd[1]: Starting keystone_cron container... Feb 2 08:09:26 np0005604725 systemd[1]: Started keystone_cron container. Feb 2 08:09:27 np0005604725 python3[88164]: ansible-systemd Invoked with state=restarted name=tripleo_rsyslog.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:09:27 np0005604725 systemd[1]: Reloading. Feb 2 08:09:27 np0005604725 systemd-rc-local-generator[88243]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:09:27 np0005604725 systemd-sysv-generator[88246]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:09:27 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:09:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:09:27 np0005604725 systemd[1]: Starting rsyslog container... Feb 2 08:09:28 np0005604725 podman[88256]: 2026-02-02 08:09:28.026895697 +0000 UTC m=+0.061270111 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, release=1766032510, vendor=Red Hat, Inc., tcib_managed=true, io.buildah.version=1.41.5, vcs-type=git, version=17.1.13, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:14Z, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, build-date=2026-01-12T22:10:14Z, container_name=metrics_qdr, config_id=tripleo_step1, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-qdrouterd, io.openshift.expose-services=, com.redhat.component=openstack-qdrouterd-container, description=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:09:28 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f/merged/var/log/rsyslog supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f/merged/var/lib/rsyslog supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:28 np0005604725 podman[88257]: 2026-02-02 08:09:28.11563703 +0000 UTC m=+0.145158096 container init 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, release=1766032510, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, maintainer=OpenStack TripleO Team, config_id=tripleo_step3, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, description=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, vendor=Red Hat, Inc., com.redhat.component=openstack-rsyslog-container, container_name=rsyslog, summary=Red Hat OpenStack Platform 17.1 rsyslog, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-rsyslog, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, managed_by=tripleo_ansible, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, build-date=2026-01-12T22:10:09Z, org.opencontainers.image.created=2026-01-12T22:10:09Z, io.buildah.version=1.41.5, io.openshift.expose-services=, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:09:28 np0005604725 podman[88257]: 2026-02-02 08:09:28.126260463 +0000 UTC m=+0.155781519 container start 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, vcs-type=git, description=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, architecture=x86_64, maintainer=OpenStack TripleO Team, container_name=rsyslog, config_id=tripleo_step3, com.redhat.component=openstack-rsyslog-container, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.created=2026-01-12T22:10:09Z, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, batch=17.1_20260112.1, distribution-scope=public, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-rsyslog, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:09Z, io.buildah.version=1.41.5, tcib_managed=true, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:09:28 np0005604725 podman[88257]: rsyslog Feb 2 08:09:28 np0005604725 systemd[1]: Started rsyslog container. Feb 2 08:09:28 np0005604725 systemd[1]: libpod-1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6.scope: Deactivated successfully. Feb 2 08:09:28 np0005604725 podman[88256]: 2026-02-02 08:09:28.206744026 +0000 UTC m=+0.241118440 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:14Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., architecture=x86_64, container_name=metrics_qdr, build-date=2026-01-12T22:10:14Z, version=17.1.13, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-qdrouterd-container, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step1, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:09:28 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:09:28 np0005604725 podman[88314]: 2026-02-02 08:09:28.262457607 +0000 UTC m=+0.042765389 container died 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, name=rhosp-rhel9/openstack-rsyslog, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:09Z, config_id=tripleo_step3, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, container_name=rsyslog, batch=17.1_20260112.1, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:09Z, com.redhat.component=openstack-rsyslog-container, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 rsyslog, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, tcib_managed=true, architecture=x86_64, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 rsyslog, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=) Feb 2 08:09:28 np0005604725 podman[88314]: 2026-02-02 08:09:28.28791133 +0000 UTC m=+0.068219072 container cleanup 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, description=Red Hat OpenStack Platform 17.1 rsyslog, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:09Z, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, container_name=rsyslog, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-rsyslog, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, maintainer=OpenStack TripleO Team, vcs-type=git, vendor=Red Hat, Inc., io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-rsyslog-container, release=1766032510, batch=17.1_20260112.1, config_id=tripleo_step3, tcib_managed=true, build-date=2026-01-12T22:10:09Z, managed_by=tripleo_ansible) Feb 2 08:09:28 np0005604725 systemd[1]: tripleo_rsyslog.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:09:28 np0005604725 podman[88355]: 2026-02-02 08:09:28.351589943 +0000 UTC m=+0.045370508 container cleanup 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, build-date=2026-01-12T22:10:09Z, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 rsyslog, distribution-scope=public, managed_by=tripleo_ansible, tcib_managed=true, config_id=tripleo_step3, com.redhat.component=openstack-rsyslog-container, org.opencontainers.image.created=2026-01-12T22:10:09Z, url=https://www.redhat.com, container_name=rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, batch=17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, name=rhosp-rhel9/openstack-rsyslog, architecture=x86_64, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, vendor=Red Hat, Inc., io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:09:28 np0005604725 podman[88355]: rsyslog Feb 2 08:09:28 np0005604725 systemd[1]: tripleo_rsyslog.service: Failed with result 'exit-code'. Feb 2 08:09:28 np0005604725 systemd[1]: tripleo_rsyslog.service: Scheduled restart job, restart counter is at 1. Feb 2 08:09:28 np0005604725 systemd[1]: Stopped rsyslog container. Feb 2 08:09:28 np0005604725 systemd[1]: Starting rsyslog container... Feb 2 08:09:28 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f/merged/var/log/rsyslog supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f/merged/var/lib/rsyslog supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:28 np0005604725 podman[88383]: 2026-02-02 08:09:28.613584515 +0000 UTC m=+0.104446791 container init 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, summary=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-rsyslog-container, build-date=2026-01-12T22:10:09Z, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, config_id=tripleo_step3, version=17.1.13, vcs-type=git, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, url=https://www.redhat.com, vendor=Red Hat, Inc., architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=rsyslog, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-rsyslog, description=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:09Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:09:28 np0005604725 podman[88383]: 2026-02-02 08:09:28.620246837 +0000 UTC m=+0.111109103 container start 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, build-date=2026-01-12T22:10:09Z, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:10:09Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, batch=17.1_20260112.1, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 rsyslog, distribution-scope=public, release=1766032510, name=rhosp-rhel9/openstack-rsyslog, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 rsyslog, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, com.redhat.component=openstack-rsyslog-container, vcs-type=git, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com) Feb 2 08:09:28 np0005604725 podman[88383]: rsyslog Feb 2 08:09:28 np0005604725 python3[88382]: ansible-file Invoked with path=/var/lib/container-puppet/container-puppet-tasks3.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:28 np0005604725 systemd[1]: Started rsyslog container. Feb 2 08:09:28 np0005604725 systemd[1]: libpod-1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6.scope: Deactivated successfully. Feb 2 08:09:28 np0005604725 podman[88453]: 2026-02-02 08:09:28.726791441 +0000 UTC m=+0.032238300 container died 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=rsyslog, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, url=https://www.redhat.com, config_id=tripleo_step3, description=Red Hat OpenStack Platform 17.1 rsyslog, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, tcib_managed=true, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, name=rhosp-rhel9/openstack-rsyslog, build-date=2026-01-12T22:10:09Z, org.opencontainers.image.created=2026-01-12T22:10:09Z, summary=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.component=openstack-rsyslog-container) Feb 2 08:09:28 np0005604725 podman[88453]: 2026-02-02 08:09:28.752259584 +0000 UTC m=+0.057706453 container cleanup 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, org.opencontainers.image.created=2026-01-12T22:10:09Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vcs-type=git, io.openshift.expose-services=, architecture=x86_64, com.redhat.component=openstack-rsyslog-container, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 rsyslog, build-date=2026-01-12T22:10:09Z, tcib_managed=true, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., container_name=rsyslog, name=rhosp-rhel9/openstack-rsyslog, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, release=1766032510) Feb 2 08:09:28 np0005604725 systemd[1]: tripleo_rsyslog.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:09:28 np0005604725 podman[88475]: 2026-02-02 08:09:28.824405483 +0000 UTC m=+0.045674487 container cleanup 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=rsyslog, build-date=2026-01-12T22:10:09Z, batch=17.1_20260112.1, release=1766032510, summary=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.component=openstack-rsyslog-container, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, version=17.1.13, config_id=tripleo_step3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, tcib_managed=true, name=rhosp-rhel9/openstack-rsyslog, architecture=x86_64, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:09Z, vendor=Red Hat, Inc., vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com) Feb 2 08:09:28 np0005604725 podman[88475]: rsyslog Feb 2 08:09:28 np0005604725 systemd[1]: tripleo_rsyslog.service: Failed with result 'exit-code'. Feb 2 08:09:28 np0005604725 systemd[1]: tripleo_rsyslog.service: Scheduled restart job, restart counter is at 2. Feb 2 08:09:28 np0005604725 systemd[1]: Stopped rsyslog container. Feb 2 08:09:28 np0005604725 systemd[1]: Starting rsyslog container... Feb 2 08:09:29 np0005604725 systemd[1]: var-lib-containers-storage-overlay-34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f-merged.mount: Deactivated successfully. Feb 2 08:09:29 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6-userdata-shm.mount: Deactivated successfully. Feb 2 08:09:29 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:29 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f/merged/var/log/rsyslog supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:29 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f/merged/var/lib/rsyslog supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:29 np0005604725 podman[88503]: 2026-02-02 08:09:29.080823367 +0000 UTC m=+0.083069773 container init 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, tcib_managed=true, maintainer=OpenStack TripleO Team, release=1766032510, name=rhosp-rhel9/openstack-rsyslog, org.opencontainers.image.created=2026-01-12T22:10:09Z, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, container_name=rsyslog, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, vcs-type=git, com.redhat.component=openstack-rsyslog-container, build-date=2026-01-12T22:10:09Z, vendor=Red Hat, Inc., architecture=x86_64, description=Red Hat OpenStack Platform 17.1 rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 rsyslog, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, url=https://www.redhat.com) Feb 2 08:09:29 np0005604725 podman[88503]: 2026-02-02 08:09:29.088996075 +0000 UTC m=+0.091242481 container start 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, distribution-scope=public, architecture=x86_64, build-date=2026-01-12T22:10:09Z, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 rsyslog, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step3, url=https://www.redhat.com, com.redhat.component=openstack-rsyslog-container, batch=17.1_20260112.1, container_name=rsyslog, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-rsyslog, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:09Z, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, maintainer=OpenStack TripleO Team, version=17.1.13, release=1766032510, summary=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog) Feb 2 08:09:29 np0005604725 podman[88503]: rsyslog Feb 2 08:09:29 np0005604725 systemd[1]: Started rsyslog container. Feb 2 08:09:29 np0005604725 systemd[1]: libpod-1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6.scope: Deactivated successfully. Feb 2 08:09:29 np0005604725 podman[88562]: 2026-02-02 08:09:29.18930086 +0000 UTC m=+0.029972621 container died 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, org.opencontainers.image.created=2026-01-12T22:10:09Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.component=openstack-rsyslog-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, config_id=tripleo_step3, summary=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, url=https://www.redhat.com, version=17.1.13, batch=17.1_20260112.1, release=1766032510, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:09Z, io.buildah.version=1.41.5, architecture=x86_64, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=rsyslog, vendor=Red Hat, Inc., tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, io.openshift.expose-services=, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-rsyslog) Feb 2 08:09:29 np0005604725 podman[88562]: 2026-02-02 08:09:29.207747589 +0000 UTC m=+0.048419320 container cleanup 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, name=rhosp-rhel9/openstack-rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 rsyslog, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:09Z, release=1766032510, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=rsyslog, org.opencontainers.image.created=2026-01-12T22:10:09Z, io.openshift.expose-services=, version=17.1.13, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 rsyslog, url=https://www.redhat.com, io.buildah.version=1.41.5, config_id=tripleo_step3, com.redhat.component=openstack-rsyslog-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, vendor=Red Hat, Inc.) Feb 2 08:09:29 np0005604725 systemd[1]: tripleo_rsyslog.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:09:29 np0005604725 podman[88576]: 2026-02-02 08:09:29.271864505 +0000 UTC m=+0.041779619 container cleanup 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, com.redhat.component=openstack-rsyslog-container, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 rsyslog, container_name=rsyslog, managed_by=tripleo_ansible, config_id=tripleo_step3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 rsyslog, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-rsyslog, vcs-type=git, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, url=https://www.redhat.com, build-date=2026-01-12T22:10:09Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, distribution-scope=public, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, org.opencontainers.image.created=2026-01-12T22:10:09Z) Feb 2 08:09:29 np0005604725 podman[88576]: rsyslog Feb 2 08:09:29 np0005604725 systemd[1]: tripleo_rsyslog.service: Failed with result 'exit-code'. Feb 2 08:09:29 np0005604725 systemd[1]: tripleo_rsyslog.service: Scheduled restart job, restart counter is at 3. Feb 2 08:09:29 np0005604725 systemd[1]: Stopped rsyslog container. Feb 2 08:09:29 np0005604725 systemd[1]: Starting rsyslog container... Feb 2 08:09:29 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:29 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f/merged/var/log/rsyslog supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:29 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f/merged/var/lib/rsyslog supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:29 np0005604725 podman[88645]: 2026-02-02 08:09:29.585098863 +0000 UTC m=+0.090035103 container init 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 rsyslog, vcs-type=git, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-rsyslog, config_id=tripleo_step3, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=rsyslog, summary=Red Hat OpenStack Platform 17.1 rsyslog, build-date=2026-01-12T22:10:09Z, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, io.buildah.version=1.41.5, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, com.redhat.component=openstack-rsyslog-container, vendor=Red Hat, Inc., architecture=x86_64, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:09Z, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:09:29 np0005604725 podman[88645]: 2026-02-02 08:09:29.591648342 +0000 UTC m=+0.096584572 container start 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, tcib_managed=true, config_id=tripleo_step3, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, vcs-type=git, name=rhosp-rhel9/openstack-rsyslog, org.opencontainers.image.created=2026-01-12T22:10:09Z, managed_by=tripleo_ansible, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, architecture=x86_64, build-date=2026-01-12T22:10:09Z, description=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.component=openstack-rsyslog-container, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog) Feb 2 08:09:29 np0005604725 podman[88645]: rsyslog Feb 2 08:09:29 np0005604725 systemd[1]: Started rsyslog container. Feb 2 08:09:29 np0005604725 systemd[1]: libpod-1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6.scope: Deactivated successfully. Feb 2 08:09:29 np0005604725 podman[88671]: 2026-02-02 08:09:29.711053996 +0000 UTC m=+0.038483119 container died 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, managed_by=tripleo_ansible, release=1766032510, architecture=x86_64, com.redhat.component=openstack-rsyslog-container, url=https://www.redhat.com, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, io.buildah.version=1.41.5, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:09Z, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, build-date=2026-01-12T22:10:09Z, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, maintainer=OpenStack TripleO Team, container_name=rsyslog, name=rhosp-rhel9/openstack-rsyslog, description=Red Hat OpenStack Platform 17.1 rsyslog, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:09:29 np0005604725 podman[88671]: 2026-02-02 08:09:29.730093665 +0000 UTC m=+0.057522768 container cleanup 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, release=1766032510, url=https://www.redhat.com, managed_by=tripleo_ansible, io.openshift.expose-services=, config_id=tripleo_step3, architecture=x86_64, tcib_managed=true, vcs-type=git, com.redhat.component=openstack-rsyslog-container, build-date=2026-01-12T22:10:09Z, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, description=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, name=rhosp-rhel9/openstack-rsyslog, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, distribution-scope=public, container_name=rsyslog, org.opencontainers.image.created=2026-01-12T22:10:09Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:09:29 np0005604725 systemd[1]: tripleo_rsyslog.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:09:29 np0005604725 podman[88694]: 2026-02-02 08:09:29.789667562 +0000 UTC m=+0.033878029 container cleanup 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, name=rhosp-rhel9/openstack-rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step3, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, com.redhat.component=openstack-rsyslog-container, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, io.buildah.version=1.41.5, container_name=rsyslog, build-date=2026-01-12T22:10:09Z, summary=Red Hat OpenStack Platform 17.1 rsyslog, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.created=2026-01-12T22:10:09Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, version=17.1.13, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, vendor=Red Hat, Inc.) Feb 2 08:09:29 np0005604725 podman[88694]: rsyslog Feb 2 08:09:29 np0005604725 systemd[1]: tripleo_rsyslog.service: Failed with result 'exit-code'. Feb 2 08:09:29 np0005604725 systemd[1]: tripleo_rsyslog.service: Scheduled restart job, restart counter is at 4. Feb 2 08:09:29 np0005604725 systemd[1]: Stopped rsyslog container. Feb 2 08:09:29 np0005604725 systemd[1]: Starting rsyslog container... Feb 2 08:09:30 np0005604725 systemd[1]: tmp-crun.An9hhi.mount: Deactivated successfully. Feb 2 08:09:30 np0005604725 systemd[1]: var-lib-containers-storage-overlay-34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f-merged.mount: Deactivated successfully. Feb 2 08:09:30 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6-userdata-shm.mount: Deactivated successfully. Feb 2 08:09:30 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:09:30 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f/merged/var/log/rsyslog supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:30 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f/merged/var/lib/rsyslog supports timestamps until 2038 (0x7fffffff) Feb 2 08:09:30 np0005604725 podman[88736]: 2026-02-02 08:09:30.116915456 +0000 UTC m=+0.112225898 container init 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, tcib_managed=true, release=1766032510, container_name=rsyslog, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step3, batch=17.1_20260112.1, vcs-type=git, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 rsyslog, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 rsyslog, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, build-date=2026-01-12T22:10:09Z, name=rhosp-rhel9/openstack-rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-rsyslog-container, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, io.openshift.expose-services=, version=17.1.13, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:09Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:09:30 np0005604725 podman[88736]: 2026-02-02 08:09:30.12401003 +0000 UTC m=+0.119320472 container start 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, container_name=rsyslog, com.redhat.component=openstack-rsyslog-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:09Z, build-date=2026-01-12T22:10:09Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, maintainer=OpenStack TripleO Team, tcib_managed=true, release=1766032510, vcs-type=git, distribution-scope=public, name=rhosp-rhel9/openstack-rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, architecture=x86_64, batch=17.1_20260112.1, io.buildah.version=1.41.5, vendor=Red Hat, Inc., io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, version=17.1.13, config_id=tripleo_step3, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 rsyslog, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 rsyslog, url=https://www.redhat.com) Feb 2 08:09:30 np0005604725 podman[88736]: rsyslog Feb 2 08:09:30 np0005604725 systemd[1]: Started rsyslog container. Feb 2 08:09:30 np0005604725 systemd[1]: libpod-1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6.scope: Deactivated successfully. Feb 2 08:09:30 np0005604725 python3[88738]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=True puppet_config=/var/lib/container-puppet/container-puppet-tasks3.json short_hostname=np0005604725 step=3 update_config_hash_only=False Feb 2 08:09:30 np0005604725 podman[88760]: 2026-02-02 08:09:30.267398604 +0000 UTC m=+0.029166967 container died 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, version=17.1.13, architecture=x86_64, managed_by=tripleo_ansible, build-date=2026-01-12T22:10:09Z, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.component=openstack-rsyslog-container, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-rsyslog, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:10:09Z, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, release=1766032510, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, container_name=rsyslog, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 rsyslog, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}) Feb 2 08:09:30 np0005604725 podman[88760]: 2026-02-02 08:09:30.28806045 +0000 UTC m=+0.049828813 container cleanup 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, release=1766032510, io.openshift.expose-services=, distribution-scope=public, architecture=x86_64, build-date=2026-01-12T22:10:09Z, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=rsyslog, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 rsyslog, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, tcib_managed=true, name=rhosp-rhel9/openstack-rsyslog, batch=17.1_20260112.1, vcs-type=git, managed_by=tripleo_ansible, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.created=2026-01-12T22:10:09Z, config_id=tripleo_step3, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-rsyslog-container) Feb 2 08:09:30 np0005604725 systemd[1]: tripleo_rsyslog.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:09:30 np0005604725 podman[88780]: 2026-02-02 08:09:30.377688191 +0000 UTC m=+0.058504557 container cleanup 1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=rsyslog, distribution-scope=public, version=17.1.13, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae28058d2cacd52586f33ad08231e41f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'security_opt': ['label=disable'], 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/rsyslog.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rsyslog:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:ro', '/var/log/containers/rsyslog:/var/log/rsyslog:rw,z', '/var/log:/var/log/host:ro', '/var/lib/rsyslog.container:/var/lib/rsyslog:rw,z']}, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-rsyslog-container, description=Red Hat OpenStack Platform 17.1 rsyslog, summary=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, build-date=2026-01-12T22:10:09Z, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-rsyslog, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, config_id=tripleo_step3, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=rsyslog, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:09Z) Feb 2 08:09:30 np0005604725 podman[88780]: rsyslog Feb 2 08:09:30 np0005604725 systemd[1]: tripleo_rsyslog.service: Failed with result 'exit-code'. Feb 2 08:09:30 np0005604725 systemd[1]: tripleo_rsyslog.service: Scheduled restart job, restart counter is at 5. Feb 2 08:09:30 np0005604725 systemd[1]: Stopped rsyslog container. Feb 2 08:09:30 np0005604725 systemd[1]: tripleo_rsyslog.service: Start request repeated too quickly. Feb 2 08:09:30 np0005604725 systemd[1]: tripleo_rsyslog.service: Failed with result 'exit-code'. Feb 2 08:09:30 np0005604725 systemd[1]: Failed to start rsyslog container. Feb 2 08:09:30 np0005604725 python3[88815]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:09:31 np0005604725 systemd[1]: var-lib-containers-storage-overlay-34f4090a7e835f4e87a3d6da489078b1e1d7108666c803fc3710cf5e5d90d20f-merged.mount: Deactivated successfully. Feb 2 08:09:31 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-1601ffac5355c0d702b6e9cf2f14d3ef5b640ee5cd30e8da562b500a1a95e6f6-userdata-shm.mount: Deactivated successfully. Feb 2 08:09:31 np0005604725 python3[88839]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_3 config_pattern=container-puppet-*.json config_overrides={} debug=True Feb 2 08:09:37 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:09:37 np0005604725 systemd[1]: tmp-crun.VNGqmm.mount: Deactivated successfully. Feb 2 08:09:37 np0005604725 podman[89073]: 2026-02-02 08:09:37.351917791 +0000 UTC m=+0.096998935 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=starting, distribution-scope=public, version=17.1.13, io.openshift.expose-services=, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, com.redhat.component=openstack-collectd-container, build-date=2026-01-12T22:10:15Z, url=https://www.redhat.com, config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:10:15Z, container_name=collectd, architecture=x86_64, io.buildah.version=1.41.5, vcs-type=git, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, summary=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 collectd, batch=17.1_20260112.1, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:09:37 np0005604725 podman[89073]: 2026-02-02 08:09:37.390084099 +0000 UTC m=+0.135165273 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, com.redhat.component=openstack-collectd-container, container_name=collectd, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 collectd, vendor=Red Hat, Inc., release=1766032510, architecture=x86_64, vcs-type=git, build-date=2026-01-12T22:10:15Z, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-collectd, tcib_managed=true, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, config_id=tripleo_step3, io.openshift.expose-services=, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:15Z) Feb 2 08:09:37 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:09:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:09:38 np0005604725 podman[89166]: 2026-02-02 08:09:38.33695415 +0000 UTC m=+0.085654841 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=starting, description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, release=1766032510, vendor=Red Hat, Inc., vcs-ref=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, container_name=horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:34:41Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, com.redhat.component=openstack-horizon-container, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, config_id=tripleo_step3, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:41Z, version=17.1.13) Feb 2 08:09:38 np0005604725 podman[89166]: 2026-02-02 08:09:38.374121197 +0000 UTC m=+0.122821838 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:41Z, name=rhosp-rhel9/openstack-horizon, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:34:41Z, config_id=tripleo_step3, distribution-scope=public, managed_by=tripleo_ansible, container_name=horizon, description=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., com.redhat.component=openstack-horizon-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, io.buildah.version=1.41.5, batch=17.1_20260112.1, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 horizon) Feb 2 08:09:38 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:09:41 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:09:41 np0005604725 podman[89360]: 2026-02-02 08:09:41.335360126 +0000 UTC m=+0.079934494 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, name=rhosp-rhel9/openstack-iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, architecture=x86_64, config_id=tripleo_step3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, com.redhat.component=openstack-iscsid-container, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, vcs-type=git, build-date=2026-01-12T22:34:43Z, vendor=Red Hat, Inc., container_name=iscsid, managed_by=tripleo_ansible, batch=17.1_20260112.1, release=1766032510, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, distribution-scope=public, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:09:41 np0005604725 podman[89360]: 2026-02-02 08:09:41.346898373 +0000 UTC m=+0.091472731 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, description=Red Hat OpenStack Platform 17.1 iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:34:43Z, maintainer=OpenStack TripleO Team, version=17.1.13, architecture=x86_64, io.buildah.version=1.41.5, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_step3, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, release=1766032510, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, com.redhat.component=openstack-iscsid-container, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, name=rhosp-rhel9/openstack-iscsid, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:34:43Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 iscsid, container_name=iscsid) Feb 2 08:09:41 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:09:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:09:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:09:42 np0005604725 podman[89459]: 2026-02-02 08:09:42.326684912 +0000 UTC m=+0.068620305 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=keystone_cron, com.redhat.component=openstack-keystone-container, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, version=17.1.13, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, name=rhosp-rhel9/openstack-keystone, summary=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., release=1766032510, url=https://www.redhat.com, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:33:53Z, distribution-scope=public, build-date=2026-01-12T22:33:53Z, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5) Feb 2 08:09:42 np0005604725 systemd[1]: tmp-crun.iZs2xl.mount: Deactivated successfully. Feb 2 08:09:42 np0005604725 podman[89458]: 2026-02-02 08:09:42.392904064 +0000 UTC m=+0.141151881 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.openshift.expose-services=, io.buildah.version=1.41.5, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, com.redhat.component=openstack-keystone-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, version=17.1.13, tcib_managed=true, container_name=keystone, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, architecture=x86_64, config_id=tripleo_step3, description=Red Hat OpenStack Platform 17.1 keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:33:53Z, org.opencontainers.image.created=2026-01-12T22:33:53Z, summary=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:09:42 np0005604725 podman[89459]: 2026-02-02 08:09:42.415862261 +0000 UTC m=+0.157797694 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, com.redhat.component=openstack-keystone-container, release=1766032510, summary=Red Hat OpenStack Platform 17.1 keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, vendor=Red Hat, Inc., version=17.1.13, build-date=2026-01-12T22:33:53Z, managed_by=tripleo_ansible, batch=17.1_20260112.1, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=keystone_cron, maintainer=OpenStack TripleO Team, tcib_managed=true, architecture=x86_64, name=rhosp-rhel9/openstack-keystone, distribution-scope=public, vcs-type=git, io.openshift.expose-services=) Feb 2 08:09:42 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:09:42 np0005604725 podman[89458]: 2026-02-02 08:09:42.452740428 +0000 UTC m=+0.200988275 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:33:53Z, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, batch=17.1_20260112.1, io.openshift.expose-services=, container_name=keystone, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, architecture=x86_64, config_id=tripleo_step3, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-keystone, build-date=2026-01-12T22:33:53Z) Feb 2 08:09:42 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:09:44 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:09:44 np0005604725 systemd[1]: tmp-crun.o4Sguh.mount: Deactivated successfully. Feb 2 08:09:44 np0005604725 podman[89665]: 2026-02-02 08:09:44.337811932 +0000 UTC m=+0.082370319 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., io.buildah.version=1.41.5, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step2, build-date=2026-01-12T22:10:18Z, container_name=clustercheck, tcib_managed=true, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, name=rhosp-rhel9/openstack-mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-mariadb-container, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team) Feb 2 08:09:44 np0005604725 podman[89665]: 2026-02-02 08:09:44.403059234 +0000 UTC m=+0.147617651 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, io.buildah.version=1.41.5, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, name=rhosp-rhel9/openstack-mariadb, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, io.openshift.expose-services=, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, tcib_managed=true, vendor=Red Hat, Inc., release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, config_id=tripleo_step2, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-mariadb-container, container_name=clustercheck, managed_by=tripleo_ansible, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:18Z, description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, maintainer=OpenStack TripleO Team) Feb 2 08:09:44 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:09:57 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:09:57 np0005604725 systemd[1]: tmp-crun.RYI3d3.mount: Deactivated successfully. Feb 2 08:09:57 np0005604725 podman[90415]: 2026-02-02 08:09:57.319314055 +0000 UTC m=+0.068718479 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, io.openshift.expose-services=, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, vendor=Red Hat, Inc., tcib_managed=true, name=rhosp-rhel9/openstack-memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, summary=Red Hat OpenStack Platform 17.1 memcached, release=1766032510, container_name=memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:12:26Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.buildah.version=1.41.5, vcs-type=git, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:12:26Z, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step1) Feb 2 08:09:57 np0005604725 podman[90415]: 2026-02-02 08:09:57.328954333 +0000 UTC m=+0.078358757 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, tcib_managed=true, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, maintainer=OpenStack TripleO Team, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-memcached-container, build-date=2026-01-12T22:12:26Z, io.openshift.expose-services=, vendor=Red Hat, Inc., io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:12:26Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, release=1766032510, name=rhosp-rhel9/openstack-memcached, vcs-type=git, distribution-scope=public) Feb 2 08:09:57 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:09:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:09:58 np0005604725 podman[90527]: 2026-02-02 08:09:58.310544078 +0000 UTC m=+0.063180419 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=metrics_qdr, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, url=https://www.redhat.com, batch=17.1_20260112.1, tcib_managed=true, name=rhosp-rhel9/openstack-qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, com.redhat.component=openstack-qdrouterd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, architecture=x86_64, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step1, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:14Z, maintainer=OpenStack TripleO Team, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:14Z, summary=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:09:58 np0005604725 podman[90527]: 2026-02-02 08:09:58.505874789 +0000 UTC m=+0.258511140 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:14Z, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, config_id=tripleo_step1, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=metrics_qdr, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, vcs-type=git, name=rhosp-rhel9/openstack-qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:14Z, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, com.redhat.component=openstack-qdrouterd-container, url=https://www.redhat.com) Feb 2 08:09:58 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:10:01 np0005604725 systemd[1]: tmp-crun.5FVGo6.mount: Deactivated successfully. Feb 2 08:10:01 np0005604725 podman[90634]: 2026-02-02 08:10:01.311183878 +0000 UTC m=+0.104606825 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, name=rhosp-rhel9/openstack-mariadb, architecture=x86_64, batch=17.1_20260112.1, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, tcib_managed=true, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:18Z) Feb 2 08:10:01 np0005604725 podman[90634]: 2026-02-02 08:10:01.342865904 +0000 UTC m=+0.136288861 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, build-date=2026-01-12T22:10:18Z, batch=17.1_20260112.1, distribution-scope=public, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-mariadb, url=https://www.redhat.com, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, release=1766032510) Feb 2 08:10:01 np0005604725 podman[90665]: 2026-02-02 08:10:01.494601252 +0000 UTC m=+0.130888726 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, tcib_managed=true, vcs-type=git, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 haproxy, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, description=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, io.buildah.version=1.41.5, version=17.1.13, url=https://www.redhat.com, name=rhosp-rhel9/openstack-haproxy, build-date=2026-01-12T22:10:12Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-haproxy-container) Feb 2 08:10:01 np0005604725 podman[90681]: 2026-02-02 08:10:01.549437982 +0000 UTC m=+0.108642000 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2026-01-12T22:10:14Z, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.41.5, tcib_managed=true, vcs-type=git, release=1766032510, batch=17.1_20260112.1, io.openshift.expose-services=, com.redhat.component=openstack-rabbitmq-container, description=Red Hat OpenStack Platform 17.1 rabbitmq, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., version=17.1.13, distribution-scope=public, name=rhosp-rhel9/openstack-rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:14Z, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:10:01 np0005604725 podman[90665]: 2026-02-02 08:10:01.577122485 +0000 UTC m=+0.213409829 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, version=17.1.13, build-date=2026-01-12T22:10:12Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 haproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, vendor=Red Hat, Inc.) Feb 2 08:10:01 np0005604725 podman[90681]: 2026-02-02 08:10:01.635815184 +0000 UTC m=+0.195019212 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, io.openshift.expose-services=, version=17.1.13, build-date=2026-01-12T22:10:14Z, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, com.redhat.component=openstack-rabbitmq-container, tcib_managed=true, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, name=rhosp-rhel9/openstack-rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:10:01 np0005604725 podman[90724]: 2026-02-02 08:10:01.641119408 +0000 UTC m=+0.072702992 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, name=rhosp-rhel9/openstack-redis, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:16Z, architecture=x86_64, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, vendor=Red Hat, Inc., io.openshift.expose-services=, release=1766032510, com.redhat.component=openstack-redis-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, description=Red Hat OpenStack Platform 17.1 redis, org.opencontainers.image.created=2026-01-12T22:10:16Z, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 redis, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis) Feb 2 08:10:01 np0005604725 podman[90747]: 2026-02-02 08:10:01.77680777 +0000 UTC m=+0.126486300 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, description=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, tcib_managed=true, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, batch=17.1_20260112.1, build-date=2026-01-12T22:10:16Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, version=17.1.13, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:16Z, summary=Red Hat OpenStack Platform 17.1 redis, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-redis, vendor=Red Hat, Inc.) Feb 2 08:10:01 np0005604725 podman[90724]: 2026-02-02 08:10:01.781317579 +0000 UTC m=+0.212901233 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, summary=Red Hat OpenStack Platform 17.1 redis, org.opencontainers.image.created=2026-01-12T22:10:16Z, io.openshift.expose-services=, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, vcs-type=git, architecture=x86_64, build-date=2026-01-12T22:10:16Z, description=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, vendor=Red Hat, Inc., release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-redis-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, tcib_managed=true) Feb 2 08:10:02 np0005604725 systemd[1]: tmp-crun.e9UFXK.mount: Deactivated successfully. Feb 2 08:10:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:10:07 np0005604725 podman[91039]: 2026-02-02 08:10:07.922425218 +0000 UTC m=+0.108247357 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, distribution-scope=public, vendor=Red Hat, Inc., release=1766032510, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, build-date=2026-01-12T22:10:15Z, config_id=tripleo_step3, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:15Z, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-collectd-container, name=rhosp-rhel9/openstack-collectd, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 collectd, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 collectd, io.buildah.version=1.41.5, vcs-type=git, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}) Feb 2 08:10:07 np0005604725 podman[91039]: 2026-02-02 08:10:07.935265944 +0000 UTC m=+0.121088103 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-collectd-container, version=17.1.13, distribution-scope=public, config_id=tripleo_step3, url=https://www.redhat.com, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:15Z, container_name=collectd, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, summary=Red Hat OpenStack Platform 17.1 collectd, name=rhosp-rhel9/openstack-collectd, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, vendor=Red Hat, Inc., release=1766032510, build-date=2026-01-12T22:10:15Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, vcs-type=git, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd) Feb 2 08:10:07 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:10:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:10:09 np0005604725 podman[91145]: 2026-02-02 08:10:09.33962144 +0000 UTC m=+0.086025253 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, batch=17.1_20260112.1, container_name=horizon, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:34:41Z, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 horizon, build-date=2026-01-12T22:34:41Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 horizon, com.redhat.component=openstack-horizon-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, tcib_managed=true, version=17.1.13, vcs-type=git, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, distribution-scope=public, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, url=https://www.redhat.com, io.openshift.expose-services=, vcs-ref=705339545363fec600102567c4e923938e0f43b3, release=1766032510, name=rhosp-rhel9/openstack-horizon) Feb 2 08:10:09 np0005604725 podman[91145]: 2026-02-02 08:10:09.390788237 +0000 UTC m=+0.137192090 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, managed_by=tripleo_ansible, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, architecture=x86_64, name=rhosp-rhel9/openstack-horizon, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 horizon, summary=Red Hat OpenStack Platform 17.1 horizon, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, io.openshift.expose-services=, url=https://www.redhat.com, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, com.redhat.component=openstack-horizon-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.buildah.version=1.41.5, container_name=horizon, build-date=2026-01-12T22:34:41Z) Feb 2 08:10:09 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:10:12 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:10:12 np0005604725 podman[91370]: 2026-02-02 08:10:12.319624374 +0000 UTC m=+0.073962192 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, build-date=2026-01-12T22:34:43Z, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.13, config_id=tripleo_step3, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, vendor=Red Hat, Inc., distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-iscsid-container, io.buildah.version=1.41.5, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-iscsid, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, architecture=x86_64, vcs-ref=705339545363fec600102567c4e923938e0f43b3, container_name=iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:34:43Z) Feb 2 08:10:12 np0005604725 podman[91370]: 2026-02-02 08:10:12.330791328 +0000 UTC m=+0.085129126 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, managed_by=tripleo_ansible, architecture=x86_64, tcib_managed=true, com.redhat.component=openstack-iscsid-container, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, name=rhosp-rhel9/openstack-iscsid, vcs-type=git, config_id=tripleo_step3, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:34:43Z, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 iscsid, build-date=2026-01-12T22:34:43Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, container_name=iscsid, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, url=https://www.redhat.com, vendor=Red Hat, Inc.) Feb 2 08:10:12 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:10:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:10:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:10:13 np0005604725 podman[91455]: 2026-02-02 08:10:13.315220781 +0000 UTC m=+0.067038777 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, config_id=tripleo_step3, batch=17.1_20260112.1, build-date=2026-01-12T22:33:53Z, org.opencontainers.image.created=2026-01-12T22:33:53Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, maintainer=OpenStack TripleO Team, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone_cron, url=https://www.redhat.com, managed_by=tripleo_ansible, vcs-ref=705339545363fec600102567c4e923938e0f43b3, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, version=17.1.13, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.buildah.version=1.41.5, vcs-type=git, name=rhosp-rhel9/openstack-keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:10:13 np0005604725 podman[91455]: 2026-02-02 08:10:13.329847032 +0000 UTC m=+0.081665018 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, vendor=Red Hat, Inc., com.redhat.component=openstack-keystone-container, config_id=tripleo_step3, vcs-type=git, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, managed_by=tripleo_ansible, build-date=2026-01-12T22:33:53Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, release=1766032510, container_name=keystone_cron, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:33:53Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.buildah.version=1.41.5, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, name=rhosp-rhel9/openstack-keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:10:13 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:10:13 np0005604725 podman[91454]: 2026-02-02 08:10:13.368616047 +0000 UTC m=+0.121148775 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, io.openshift.expose-services=, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-keystone-container, container_name=keystone, description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, version=17.1.13, architecture=x86_64, build-date=2026-01-12T22:33:53Z, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step3, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-keystone, url=https://www.redhat.com) Feb 2 08:10:13 np0005604725 podman[91454]: 2026-02-02 08:10:13.454929388 +0000 UTC m=+0.207462096 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, url=https://www.redhat.com, com.redhat.component=openstack-keystone-container, vcs-type=git, name=rhosp-rhel9/openstack-keystone, architecture=x86_64, container_name=keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, distribution-scope=public, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:33:53Z, vendor=Red Hat, Inc., managed_by=tripleo_ansible, config_id=tripleo_step3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.5, build-date=2026-01-12T22:33:53Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, summary=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, version=17.1.13, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone) Feb 2 08:10:13 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:10:15 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:10:15 np0005604725 podman[91587]: 2026-02-02 08:10:15.324252886 +0000 UTC m=+0.076742926 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, release=1766032510, build-date=2026-01-12T22:10:18Z, io.buildah.version=1.41.5, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:18Z, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, config_id=tripleo_step2, name=rhosp-rhel9/openstack-mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, version=17.1.13, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, com.redhat.component=openstack-mariadb-container, container_name=clustercheck, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:10:15 np0005604725 podman[91587]: 2026-02-02 08:10:15.372643148 +0000 UTC m=+0.125133168 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:10:18Z, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, config_id=tripleo_step2, build-date=2026-01-12T22:10:18Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, container_name=clustercheck, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, batch=17.1_20260112.1, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, release=1766032510) Feb 2 08:10:15 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:10:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:10:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:10:28 np0005604725 podman[92358]: 2026-02-02 08:10:28.691978953 +0000 UTC m=+0.436934459 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, container_name=memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, summary=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, release=1766032510, com.redhat.component=openstack-memcached-container, managed_by=tripleo_ansible, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, name=rhosp-rhel9/openstack-memcached, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., url=https://www.redhat.com, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, description=Red Hat OpenStack Platform 17.1 memcached, build-date=2026-01-12T22:12:26Z, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached) Feb 2 08:10:28 np0005604725 podman[92358]: 2026-02-02 08:10:28.925055437 +0000 UTC m=+0.670010933 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, com.redhat.component=openstack-memcached-container, version=17.1.13, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step1, summary=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:12:26Z, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-memcached, build-date=2026-01-12T22:12:26Z, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, container_name=memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, batch=17.1_20260112.1, io.openshift.expose-services=) Feb 2 08:10:28 np0005604725 systemd[1]: tmp-crun.UK4546.mount: Deactivated successfully. Feb 2 08:10:29 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:10:29 np0005604725 podman[92391]: 2026-02-02 08:10:28.936158739 +0000 UTC m=+0.235417677 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-qdrouterd-container, description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, name=rhosp-rhel9/openstack-qdrouterd, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:14Z, architecture=x86_64, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, container_name=metrics_qdr, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, config_id=tripleo_step1, vcs-type=git, build-date=2026-01-12T22:10:14Z, version=17.1.13, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:10:29 np0005604725 podman[92391]: 2026-02-02 08:10:29.380011281 +0000 UTC m=+0.679270229 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:14Z, summary=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr, build-date=2026-01-12T22:10:14Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, name=rhosp-rhel9/openstack-qdrouterd, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-qdrouterd-container, release=1766032510, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, architecture=x86_64, io.openshift.expose-services=, managed_by=tripleo_ansible, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:10:29 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:10:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:10:38 np0005604725 systemd[1]: tmp-crun.0eOE1X.mount: Deactivated successfully. Feb 2 08:10:38 np0005604725 podman[92930]: 2026-02-02 08:10:38.34233421 +0000 UTC m=+0.090990036 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, summary=Red Hat OpenStack Platform 17.1 collectd, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-collectd, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, config_id=tripleo_step3, com.redhat.component=openstack-collectd-container, container_name=collectd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, build-date=2026-01-12T22:10:15Z, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, io.buildah.version=1.41.5, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, org.opencontainers.image.created=2026-01-12T22:10:15Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, io.openshift.expose-services=, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:10:38 np0005604725 podman[92930]: 2026-02-02 08:10:38.354377531 +0000 UTC m=+0.103033417 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, summary=Red Hat OpenStack Platform 17.1 collectd, description=Red Hat OpenStack Platform 17.1 collectd, managed_by=tripleo_ansible, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., tcib_managed=true, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, io.openshift.expose-services=, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, name=rhosp-rhel9/openstack-collectd, distribution-scope=public, container_name=collectd, org.opencontainers.image.created=2026-01-12T22:10:15Z, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-collectd-container, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:15Z, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, version=17.1.13, maintainer=OpenStack TripleO Team) Feb 2 08:10:38 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:10:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:10:40 np0005604725 podman[93127]: 2026-02-02 08:10:40.332205454 +0000 UTC m=+0.082516614 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:34:41Z, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, vcs-type=git, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-horizon, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, version=17.1.13, batch=17.1_20260112.1, com.redhat.component=openstack-horizon-container, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, build-date=2026-01-12T22:34:41Z, distribution-scope=public, container_name=horizon, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 horizon, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:10:40 np0005604725 podman[93127]: 2026-02-02 08:10:40.36191471 +0000 UTC m=+0.112225810 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, container_name=horizon, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, io.buildah.version=1.41.5, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 horizon, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, build-date=2026-01-12T22:34:41Z, org.opencontainers.image.created=2026-01-12T22:34:41Z, name=rhosp-rhel9/openstack-horizon, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-horizon-container, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, batch=17.1_20260112.1) Feb 2 08:10:40 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:10:43 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:10:43 np0005604725 systemd[1]: tmp-crun.tKrrMX.mount: Deactivated successfully. Feb 2 08:10:43 np0005604725 podman[93272]: 2026-02-02 08:10:43.336481977 +0000 UTC m=+0.084789685 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:43Z, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, container_name=iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, vendor=Red Hat, Inc., org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, version=17.1.13, build-date=2026-01-12T22:34:43Z, vcs-type=git, description=Red Hat OpenStack Platform 17.1 iscsid, architecture=x86_64, config_id=tripleo_step3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-iscsid, com.redhat.component=openstack-iscsid-container, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 iscsid) Feb 2 08:10:43 np0005604725 podman[93272]: 2026-02-02 08:10:43.343618556 +0000 UTC m=+0.091926204 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, build-date=2026-01-12T22:34:43Z, release=1766032510, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, io.openshift.expose-services=, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=iscsid, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 iscsid, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_step3, batch=17.1_20260112.1, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:34:43Z, version=17.1.13, architecture=x86_64, io.buildah.version=1.41.5, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, com.redhat.component=openstack-iscsid-container, name=rhosp-rhel9/openstack-iscsid, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:10:43 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:10:43 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:10:43 np0005604725 podman[93291]: 2026-02-02 08:10:43.421604738 +0000 UTC m=+0.058871454 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, build-date=2026-01-12T22:33:53Z, com.redhat.component=openstack-keystone-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, vendor=Red Hat, Inc., version=17.1.13, managed_by=tripleo_ansible, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, url=https://www.redhat.com, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, distribution-scope=public, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 keystone, summary=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, release=1766032510, org.opencontainers.image.created=2026-01-12T22:33:53Z, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-keystone, container_name=keystone_cron) Feb 2 08:10:43 np0005604725 podman[93291]: 2026-02-02 08:10:43.433094282 +0000 UTC m=+0.070361028 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, maintainer=OpenStack TripleO Team, vcs-type=git, config_id=tripleo_step3, name=rhosp-rhel9/openstack-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20260112.1, io.buildah.version=1.41.5, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:33:53Z, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 keystone, build-date=2026-01-12T22:33:53Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, description=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone_cron, distribution-scope=public, version=17.1.13) Feb 2 08:10:43 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:10:44 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:10:44 np0005604725 podman[93334]: 2026-02-02 08:10:44.351780318 +0000 UTC m=+0.101366183 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:33:53Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, vcs-type=git, tcib_managed=true, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, summary=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, version=17.1.13, build-date=2026-01-12T22:33:53Z, batch=17.1_20260112.1, com.redhat.component=openstack-keystone-container, container_name=keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, name=rhosp-rhel9/openstack-keystone, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:10:44 np0005604725 podman[93334]: 2026-02-02 08:10:44.452862861 +0000 UTC m=+0.202448716 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, summary=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=keystone, url=https://www.redhat.com, distribution-scope=public, build-date=2026-01-12T22:33:53Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, managed_by=tripleo_ansible, batch=17.1_20260112.1, vcs-type=git, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-keystone-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, architecture=x86_64, vendor=Red Hat, Inc., org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, release=1766032510, org.opencontainers.image.created=2026-01-12T22:33:53Z, name=rhosp-rhel9/openstack-keystone, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:10:44 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:10:46 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:10:46 np0005604725 podman[93445]: 2026-02-02 08:10:46.309199468 +0000 UTC m=+0.064970702 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-mariadb, maintainer=OpenStack TripleO Team, distribution-scope=public, managed_by=tripleo_ansible, tcib_managed=true, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.component=openstack-mariadb-container, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step2, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:18Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, url=https://www.redhat.com, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, batch=17.1_20260112.1, container_name=clustercheck, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:18Z, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git) Feb 2 08:10:46 np0005604725 podman[93445]: 2026-02-02 08:10:46.361450526 +0000 UTC m=+0.117221740 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, description=Red Hat OpenStack Platform 17.1 mariadb, container_name=clustercheck, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, name=rhosp-rhel9/openstack-mariadb, release=1766032510, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, build-date=2026-01-12T22:10:18Z, vendor=Red Hat, Inc., vcs-type=git, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, config_id=tripleo_step2, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-mariadb-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, architecture=x86_64, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:10:46 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:10:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:10:59 np0005604725 podman[94160]: 2026-02-02 08:10:59.327787445 +0000 UTC m=+0.079963324 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, vcs-type=git, version=17.1.13, distribution-scope=public, io.buildah.version=1.41.5, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:12:26Z, config_id=tripleo_step1, release=1766032510, name=rhosp-rhel9/openstack-memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, managed_by=tripleo_ansible, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, com.redhat.component=openstack-memcached-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:10:59 np0005604725 podman[94160]: 2026-02-02 08:10:59.373113341 +0000 UTC m=+0.125289250 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, io.openshift.expose-services=, batch=17.1_20260112.1, managed_by=tripleo_ansible, architecture=x86_64, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, build-date=2026-01-12T22:12:26Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:12:26Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-memcached-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, vcs-type=git, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, version=17.1.13, maintainer=OpenStack TripleO Team, config_id=tripleo_step1, summary=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, release=1766032510, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}) Feb 2 08:10:59 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:11:00 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:11:00 np0005604725 podman[94207]: 2026-02-02 08:11:00.343528201 +0000 UTC m=+0.090610043 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, container_name=metrics_qdr, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:14Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., release=1766032510, description=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, name=rhosp-rhel9/openstack-qdrouterd, architecture=x86_64, build-date=2026-01-12T22:10:14Z, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, batch=17.1_20260112.1, io.buildah.version=1.41.5, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, com.redhat.component=openstack-qdrouterd-container, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:11:00 np0005604725 podman[94207]: 2026-02-02 08:11:00.580089517 +0000 UTC m=+0.327171329 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, version=17.1.13, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.openshift.expose-services=, build-date=2026-01-12T22:10:14Z, description=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-qdrouterd-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:14Z, tcib_managed=true, io.buildah.version=1.41.5, vcs-type=git, name=rhosp-rhel9/openstack-qdrouterd, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, managed_by=tripleo_ansible, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:11:00 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:11:01 np0005604725 systemd[1]: tmp-crun.ZrEDGP.mount: Deactivated successfully. Feb 2 08:11:01 np0005604725 podman[94263]: 2026-02-02 08:11:01.493797639 +0000 UTC m=+0.107051928 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, url=https://www.redhat.com, build-date=2026-01-12T22:10:18Z, release=1766032510, vcs-type=git, architecture=x86_64, io.openshift.expose-services=, tcib_managed=true, name=rhosp-rhel9/openstack-mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, com.redhat.component=openstack-mariadb-container, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team) Feb 2 08:11:01 np0005604725 podman[94263]: 2026-02-02 08:11:01.52270053 +0000 UTC m=+0.135954799 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, vendor=Red Hat, Inc., vcs-type=git, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, io.openshift.expose-services=, tcib_managed=true, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:18Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-mariadb-container, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.buildah.version=1.41.5) Feb 2 08:11:01 np0005604725 systemd[1]: tmp-crun.Kf9aQb.mount: Deactivated successfully. Feb 2 08:11:01 np0005604725 podman[94304]: 2026-02-02 08:11:01.699897667 +0000 UTC m=+0.089846488 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, name=rhosp-rhel9/openstack-haproxy, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 haproxy, architecture=x86_64, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-haproxy-container, description=Red Hat OpenStack Platform 17.1 haproxy, build-date=2026-01-12T22:10:12Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:12Z, tcib_managed=true, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, vcs-type=git) Feb 2 08:11:01 np0005604725 podman[94320]: 2026-02-02 08:11:01.765005713 +0000 UTC m=+0.094667257 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, build-date=2026-01-12T22:10:14Z, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, com.redhat.component=openstack-rabbitmq-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, version=17.1.13, vendor=Red Hat, Inc., batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 rabbitmq, release=1766032510, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-rabbitmq, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:11:01 np0005604725 podman[94304]: 2026-02-02 08:11:01.784219634 +0000 UTC m=+0.174168455 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.buildah.version=1.41.5, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, build-date=2026-01-12T22:10:12Z, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, description=Red Hat OpenStack Platform 17.1 haproxy, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-haproxy, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:12Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, vcs-type=git, com.redhat.component=openstack-haproxy-container, distribution-scope=public, vendor=Red Hat, Inc.) Feb 2 08:11:01 np0005604725 podman[94320]: 2026-02-02 08:11:01.8512872 +0000 UTC m=+0.180948694 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, org.opencontainers.image.created=2026-01-12T22:10:14Z, com.redhat.component=openstack-rabbitmq-container, architecture=x86_64, version=17.1.13, build-date=2026-01-12T22:10:14Z, name=rhosp-rhel9/openstack-rabbitmq, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, vendor=Red Hat, Inc., release=1766032510, io.openshift.expose-services=, batch=17.1_20260112.1, tcib_managed=true, distribution-scope=public, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:11:01 np0005604725 podman[94379]: 2026-02-02 08:11:01.936888466 +0000 UTC m=+0.111701530 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, url=https://www.redhat.com, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:16Z, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 redis, description=Red Hat OpenStack Platform 17.1 redis, architecture=x86_64, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, version=17.1.13, tcib_managed=true, name=rhosp-rhel9/openstack-redis, build-date=2026-01-12T22:10:16Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:11:01 np0005604725 podman[94379]: 2026-02-02 08:11:01.939713493 +0000 UTC m=+0.114526587 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, batch=17.1_20260112.1, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:10:16Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, vcs-type=git, name=rhosp-rhel9/openstack-redis, build-date=2026-01-12T22:10:16Z, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, tcib_managed=true, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, summary=Red Hat OpenStack Platform 17.1 redis, release=1766032510, version=17.1.13, io.buildah.version=1.41.5) Feb 2 08:11:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:11:09 np0005604725 systemd[1]: tmp-crun.oeUXtX.mount: Deactivated successfully. Feb 2 08:11:09 np0005604725 podman[94888]: 2026-02-02 08:11:09.342010799 +0000 UTC m=+0.087091554 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, managed_by=tripleo_ansible, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:15Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, architecture=x86_64, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, release=1766032510, build-date=2026-01-12T22:10:15Z, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, container_name=collectd, summary=Red Hat OpenStack Platform 17.1 collectd, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, config_id=tripleo_step3, name=rhosp-rhel9/openstack-collectd, vcs-type=git, com.redhat.component=openstack-collectd-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:11:09 np0005604725 podman[94888]: 2026-02-02 08:11:09.353234734 +0000 UTC m=+0.098315509 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 collectd, name=rhosp-rhel9/openstack-collectd, maintainer=OpenStack TripleO Team, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, vendor=Red Hat, Inc., version=17.1.13, com.redhat.component=openstack-collectd-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, build-date=2026-01-12T22:10:15Z, container_name=collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, architecture=x86_64, vcs-type=git, managed_by=tripleo_ansible, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, config_id=tripleo_step3, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:15Z) Feb 2 08:11:09 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:11:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:11:11 np0005604725 podman[94966]: 2026-02-02 08:11:11.329259776 +0000 UTC m=+0.082968636 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 horizon, container_name=horizon, config_id=tripleo_step3, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, com.redhat.component=openstack-horizon-container, description=Red Hat OpenStack Platform 17.1 horizon, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, architecture=x86_64, vendor=Red Hat, Inc., distribution-scope=public, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:34:41Z, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, url=https://www.redhat.com, build-date=2026-01-12T22:34:41Z, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:11:11 np0005604725 podman[94966]: 2026-02-02 08:11:11.386083226 +0000 UTC m=+0.139792096 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, tcib_managed=true, vendor=Red Hat, Inc., vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:41Z, com.redhat.component=openstack-horizon-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 horizon, config_id=tripleo_step3, name=rhosp-rhel9/openstack-horizon, architecture=x86_64, build-date=2026-01-12T22:34:41Z, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, container_name=horizon, summary=Red Hat OpenStack Platform 17.1 horizon, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:11:11 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:11:14 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:11:14 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:11:14 np0005604725 podman[95113]: 2026-02-02 08:11:14.333811808 +0000 UTC m=+0.079892512 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, batch=17.1_20260112.1, container_name=keystone_cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, architecture=x86_64, distribution-scope=public, managed_by=tripleo_ansible, build-date=2026-01-12T22:33:53Z, summary=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, name=rhosp-rhel9/openstack-keystone, vcs-type=git, release=1766032510, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, tcib_managed=true, config_id=tripleo_step3, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:33:53Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team) Feb 2 08:11:14 np0005604725 podman[95113]: 2026-02-02 08:11:14.340547755 +0000 UTC m=+0.086628489 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:33:53Z, name=rhosp-rhel9/openstack-keystone, summary=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone_cron, distribution-scope=public, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, com.redhat.component=openstack-keystone-container, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:33:53Z, managed_by=tripleo_ansible, release=1766032510, description=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, url=https://www.redhat.com, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step3, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git) Feb 2 08:11:14 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:11:14 np0005604725 systemd[1]: tmp-crun.cAnX1Y.mount: Deactivated successfully. Feb 2 08:11:14 np0005604725 podman[95114]: 2026-02-02 08:11:14.415775912 +0000 UTC m=+0.157892113 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, io.openshift.expose-services=, container_name=iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, tcib_managed=true, io.buildah.version=1.41.5, release=1766032510, config_id=tripleo_step3, name=rhosp-rhel9/openstack-iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, vcs-ref=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:43Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, com.redhat.component=openstack-iscsid-container, version=17.1.13, description=Red Hat OpenStack Platform 17.1 iscsid, architecture=x86_64, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 iscsid, batch=17.1_20260112.1, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:11:14 np0005604725 podman[95114]: 2026-02-02 08:11:14.424076508 +0000 UTC m=+0.166192719 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, name=rhosp-rhel9/openstack-iscsid, description=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., vcs-type=git, build-date=2026-01-12T22:34:43Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, batch=17.1_20260112.1, io.buildah.version=1.41.5, release=1766032510, container_name=iscsid, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:43Z, summary=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.component=openstack-iscsid-container, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step3, architecture=x86_64) Feb 2 08:11:14 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:11:15 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:11:15 np0005604725 podman[95205]: 2026-02-02 08:11:15.32769438 +0000 UTC m=+0.079756367 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, config_id=tripleo_step3, build-date=2026-01-12T22:33:53Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, container_name=keystone, com.redhat.component=openstack-keystone-container, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.openshift.expose-services=, release=1766032510, description=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true) Feb 2 08:11:15 np0005604725 podman[95205]: 2026-02-02 08:11:15.418189538 +0000 UTC m=+0.170251475 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, version=17.1.13, vcs-type=git, vendor=Red Hat, Inc., url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.5, io.openshift.expose-services=, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, container_name=keystone, description=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-ref=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-keystone, architecture=x86_64, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, build-date=2026-01-12T22:33:53Z, config_id=tripleo_step3, managed_by=tripleo_ansible, com.redhat.component=openstack-keystone-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:11:15 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:11:16 np0005604725 sshd[95276]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:11:17 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:11:17 np0005604725 systemd[1]: tmp-crun.olMjrr.mount: Deactivated successfully. Feb 2 08:11:17 np0005604725 podman[95294]: 2026-02-02 08:11:17.325447763 +0000 UTC m=+0.071066661 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, release=1766032510, tcib_managed=true, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:18Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=clustercheck, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.buildah.version=1.41.5, config_id=tripleo_step2, build-date=2026-01-12T22:10:18Z, com.redhat.component=openstack-mariadb-container, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, name=rhosp-rhel9/openstack-mariadb) Feb 2 08:11:17 np0005604725 podman[95294]: 2026-02-02 08:11:17.357958854 +0000 UTC m=+0.103577752 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, summary=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step2, batch=17.1_20260112.1, version=17.1.13, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, name=rhosp-rhel9/openstack-mariadb, build-date=2026-01-12T22:10:18Z, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:18Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, container_name=clustercheck, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public) Feb 2 08:11:17 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:11:24 np0005604725 sshd[95892]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:11:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:11:30 np0005604725 podman[96126]: 2026-02-02 08:11:30.346334252 +0000 UTC m=+0.093196112 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, build-date=2026-01-12T22:12:26Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, summary=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-memcached-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, name=rhosp-rhel9/openstack-memcached, batch=17.1_20260112.1, version=17.1.13, architecture=x86_64, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:12:26Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public) Feb 2 08:11:30 np0005604725 podman[96126]: 2026-02-02 08:11:30.392997209 +0000 UTC m=+0.139859049 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, name=rhosp-rhel9/openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, summary=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, version=17.1.13, managed_by=tripleo_ansible, vendor=Red Hat, Inc., vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, io.openshift.expose-services=, io.buildah.version=1.41.5, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step1, maintainer=OpenStack TripleO Team, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 memcached, release=1766032510, tcib_managed=true, com.redhat.component=openstack-memcached-container, build-date=2026-01-12T22:12:26Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, vcs-type=git, container_name=memcached, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:12:26Z) Feb 2 08:11:30 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:11:31 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:11:31 np0005604725 podman[96171]: 2026-02-02 08:11:31.321990973 +0000 UTC m=+0.077973583 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:14Z, tcib_managed=true, config_id=tripleo_step1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:14Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, description=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, vcs-type=git, io.openshift.expose-services=, url=https://www.redhat.com, name=rhosp-rhel9/openstack-qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=metrics_qdr, io.buildah.version=1.41.5, managed_by=tripleo_ansible, distribution-scope=public, com.redhat.component=openstack-qdrouterd-container, release=1766032510) Feb 2 08:11:31 np0005604725 podman[96171]: 2026-02-02 08:11:31.506234298 +0000 UTC m=+0.262216948 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp-rhel9/openstack-qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:14Z, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, config_id=tripleo_step1, vcs-type=git, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, version=17.1.13, vendor=Red Hat, Inc., com.redhat.component=openstack-qdrouterd-container, container_name=metrics_qdr, build-date=2026-01-12T22:10:14Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:11:31 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:11:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:11:40 np0005604725 podman[96762]: 2026-02-02 08:11:40.338596678 +0000 UTC m=+0.085309268 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 collectd, architecture=x86_64, url=https://www.redhat.com, config_id=tripleo_step3, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, managed_by=tripleo_ansible, batch=17.1_20260112.1, release=1766032510, com.redhat.component=openstack-collectd-container, io.buildah.version=1.41.5, io.openshift.expose-services=, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, distribution-scope=public, build-date=2026-01-12T22:10:15Z, summary=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.created=2026-01-12T22:10:15Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=collectd, vcs-type=git, name=rhosp-rhel9/openstack-collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd) Feb 2 08:11:40 np0005604725 podman[96762]: 2026-02-02 08:11:40.353066094 +0000 UTC m=+0.099778724 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:15Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, architecture=x86_64, batch=17.1_20260112.1, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:15Z, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=collectd, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, tcib_managed=true, com.redhat.component=openstack-collectd-container, distribution-scope=public, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, version=17.1.13, name=rhosp-rhel9/openstack-collectd, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 collectd, description=Red Hat OpenStack Platform 17.1 collectd, config_id=tripleo_step3, release=1766032510) Feb 2 08:11:40 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:11:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:11:42 np0005604725 podman[96830]: 2026-02-02 08:11:42.339405804 +0000 UTC m=+0.087042092 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, release=1766032510, description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.buildah.version=1.41.5, architecture=x86_64, name=rhosp-rhel9/openstack-horizon, url=https://www.redhat.com, distribution-scope=public, com.redhat.component=openstack-horizon-container, vendor=Red Hat, Inc., build-date=2026-01-12T22:34:41Z, config_id=tripleo_step3, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team) Feb 2 08:11:42 np0005604725 podman[96830]: 2026-02-02 08:11:42.376178506 +0000 UTC m=+0.123814844 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, build-date=2026-01-12T22:34:41Z, release=1766032510, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-horizon-container, container_name=horizon, summary=Red Hat OpenStack Platform 17.1 horizon, name=rhosp-rhel9/openstack-horizon, distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:41Z, config_id=tripleo_step3, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, io.openshift.expose-services=, vcs-type=git, io.buildah.version=1.41.5, tcib_managed=true, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, maintainer=OpenStack TripleO Team, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 horizon) Feb 2 08:11:42 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:11:45 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:11:45 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:11:45 np0005604725 podman[96967]: 2026-02-02 08:11:45.325346641 +0000 UTC m=+0.069174722 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, container_name=iscsid, io.openshift.expose-services=, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 iscsid, managed_by=tripleo_ansible, com.redhat.component=openstack-iscsid-container, build-date=2026-01-12T22:34:43Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:34:43Z, distribution-scope=public, name=rhosp-rhel9/openstack-iscsid, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 iscsid, architecture=x86_64, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, vcs-type=git, config_id=tripleo_step3) Feb 2 08:11:45 np0005604725 podman[96967]: 2026-02-02 08:11:45.335520254 +0000 UTC m=+0.079348345 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, org.opencontainers.image.created=2026-01-12T22:34:43Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, vcs-type=git, version=17.1.13, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, description=Red Hat OpenStack Platform 17.1 iscsid, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-iscsid-container, distribution-scope=public, build-date=2026-01-12T22:34:43Z, container_name=iscsid, io.openshift.expose-services=, architecture=x86_64, name=rhosp-rhel9/openstack-iscsid, config_id=tripleo_step3, managed_by=tripleo_ansible, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, tcib_managed=true, batch=17.1_20260112.1, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:11:45 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:11:45 np0005604725 podman[96965]: 2026-02-02 08:11:45.385621277 +0000 UTC m=+0.131620595 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-keystone, batch=17.1_20260112.1, io.openshift.expose-services=, release=1766032510, vcs-type=git, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-keystone-container, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, container_name=keystone_cron, build-date=2026-01-12T22:33:53Z, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, managed_by=tripleo_ansible, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:11:45 np0005604725 podman[96965]: 2026-02-02 08:11:45.419913383 +0000 UTC m=+0.165912741 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, url=https://www.redhat.com, io.buildah.version=1.41.5, com.redhat.component=openstack-keystone-container, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step3, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, distribution-scope=public, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:33:53Z, version=17.1.13, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:33:53Z, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, release=1766032510, vcs-type=git, container_name=keystone_cron, vcs-ref=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:11:45 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:11:45 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:11:45 np0005604725 podman[97050]: 2026-02-02 08:11:45.529052725 +0000 UTC m=+0.067477889 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, architecture=x86_64, build-date=2026-01-12T22:33:53Z, summary=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, vcs-type=git, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, com.redhat.component=openstack-keystone-container, managed_by=tripleo_ansible, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, batch=17.1_20260112.1, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step3, io.buildah.version=1.41.5, container_name=keystone, maintainer=OpenStack TripleO Team, tcib_managed=true, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:33:53Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, release=1766032510) Feb 2 08:11:45 np0005604725 podman[97050]: 2026-02-02 08:11:45.608438161 +0000 UTC m=+0.146863315 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, summary=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:33:53Z, version=17.1.13, name=rhosp-rhel9/openstack-keystone, url=https://www.redhat.com, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, config_id=tripleo_step3, architecture=x86_64, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:33:53Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, container_name=keystone, batch=17.1_20260112.1, com.redhat.component=openstack-keystone-container, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, tcib_managed=true, distribution-scope=public) Feb 2 08:11:45 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:11:48 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:11:48 np0005604725 systemd[1]: tmp-crun.WrNrqy.mount: Deactivated successfully. Feb 2 08:11:48 np0005604725 podman[97148]: 2026-02-02 08:11:48.354267804 +0000 UTC m=+0.097886439 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, org.opencontainers.image.created=2026-01-12T22:10:18Z, com.redhat.component=openstack-mariadb-container, io.openshift.expose-services=, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, container_name=clustercheck, config_id=tripleo_step2, tcib_managed=true, distribution-scope=public, name=rhosp-rhel9/openstack-mariadb, vcs-type=git, batch=17.1_20260112.1, build-date=2026-01-12T22:10:18Z, release=1766032510, summary=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5) Feb 2 08:11:48 np0005604725 podman[97148]: 2026-02-02 08:11:48.419206523 +0000 UTC m=+0.162825208 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-type=git, architecture=x86_64, com.redhat.component=openstack-mariadb-container, url=https://www.redhat.com, name=rhosp-rhel9/openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, tcib_managed=true, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, container_name=clustercheck, distribution-scope=public, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step2, vendor=Red Hat, Inc., vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:18Z, release=1766032510, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:11:48 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:12:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:12:01 np0005604725 podman[97857]: 2026-02-02 08:12:01.319906402 +0000 UTC m=+0.072178664 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:12:26Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, io.buildah.version=1.41.5, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, description=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 memcached, version=17.1.13, build-date=2026-01-12T22:12:26Z, tcib_managed=true, com.redhat.component=openstack-memcached-container, release=1766032510, name=rhosp-rhel9/openstack-memcached, container_name=memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached) Feb 2 08:12:01 np0005604725 podman[97857]: 2026-02-02 08:12:01.333304227 +0000 UTC m=+0.085576539 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, vcs-type=git, vendor=Red Hat, Inc., config_id=tripleo_step1, summary=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:12:26Z, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, url=https://www.redhat.com, build-date=2026-01-12T22:12:26Z, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, name=rhosp-rhel9/openstack-memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-memcached-container, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, architecture=x86_64) Feb 2 08:12:01 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:12:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:12:01 np0005604725 podman[97889]: 2026-02-02 08:12:01.657074763 +0000 UTC m=+0.088697404 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, com.redhat.component=openstack-mariadb-container, vendor=Red Hat, Inc., version=17.1.13, distribution-scope=public, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, build-date=2026-01-12T22:10:18Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.buildah.version=1.41.5, vcs-type=git, io.openshift.expose-services=, name=rhosp-rhel9/openstack-mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb) Feb 2 08:12:01 np0005604725 podman[97889]: 2026-02-02 08:12:01.685232405 +0000 UTC m=+0.116855026 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, build-date=2026-01-12T22:10:18Z, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:18Z, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, release=1766032510, name=rhosp-rhel9/openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-mariadb-container, io.buildah.version=1.41.5, version=17.1.13, tcib_managed=true, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:12:01 np0005604725 podman[97905]: 2026-02-02 08:12:01.785133766 +0000 UTC m=+0.123017917 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, build-date=2026-01-12T22:10:14Z, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, url=https://www.redhat.com, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, release=1766032510, com.redhat.component=openstack-qdrouterd-container, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:14Z, batch=17.1_20260112.1, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, io.buildah.version=1.41.5, container_name=metrics_qdr) Feb 2 08:12:01 np0005604725 podman[97956]: 2026-02-02 08:12:01.890588679 +0000 UTC m=+0.076237670 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, tcib_managed=true, release=1766032510, architecture=x86_64, build-date=2026-01-12T22:10:12Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 haproxy, io.buildah.version=1.41.5, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.expose-services=, name=rhosp-rhel9/openstack-haproxy, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., com.redhat.component=openstack-haproxy-container, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:12Z, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:12:01 np0005604725 podman[97981]: 2026-02-02 08:12:01.936751127 +0000 UTC m=+0.060376989 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:14Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.openshift.expose-services=, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 rabbitmq, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 rabbitmq, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, build-date=2026-01-12T22:10:14Z, com.redhat.component=openstack-rabbitmq-container, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, url=https://www.redhat.com, vcs-type=git, name=rhosp-rhel9/openstack-rabbitmq, tcib_managed=true, maintainer=OpenStack TripleO Team) Feb 2 08:12:01 np0005604725 podman[97981]: 2026-02-02 08:12:01.966885419 +0000 UTC m=+0.090511251 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, architecture=x86_64, vendor=Red Hat, Inc., com.redhat.component=openstack-rabbitmq-container, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:14Z, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:14Z, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.expose-services=, name=rhosp-rhel9/openstack-rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq) Feb 2 08:12:02 np0005604725 podman[97956]: 2026-02-02 08:12:02.019234699 +0000 UTC m=+0.204883690 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, build-date=2026-01-12T22:10:12Z, com.redhat.component=openstack-haproxy-container, architecture=x86_64, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.created=2026-01-12T22:10:12Z, name=rhosp-rhel9/openstack-haproxy, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, tcib_managed=true, batch=17.1_20260112.1, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:12:02 np0005604725 podman[98027]: 2026-02-02 08:12:02.024953236 +0000 UTC m=+0.051273458 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, summary=Red Hat OpenStack Platform 17.1 redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, tcib_managed=true, maintainer=OpenStack TripleO Team, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-redis, com.redhat.component=openstack-redis-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, org.opencontainers.image.created=2026-01-12T22:10:16Z, vcs-type=git, description=Red Hat OpenStack Platform 17.1 redis, architecture=x86_64, io.openshift.expose-services=, batch=17.1_20260112.1, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, build-date=2026-01-12T22:10:16Z) Feb 2 08:12:02 np0005604725 podman[97905]: 2026-02-02 08:12:02.070572587 +0000 UTC m=+0.408456738 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, distribution-scope=public, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:14Z, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, container_name=metrics_qdr, version=17.1.13, description=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp-rhel9/openstack-qdrouterd, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-qdrouterd-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:14Z, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_step1, io.buildah.version=1.41.5) Feb 2 08:12:02 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:12:02 np0005604725 podman[98046]: 2026-02-02 08:12:02.155552086 +0000 UTC m=+0.122994546 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, url=https://www.redhat.com, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-redis, summary=Red Hat OpenStack Platform 17.1 redis, build-date=2026-01-12T22:10:16Z, release=1766032510, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:16Z, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-redis-container, description=Red Hat OpenStack Platform 17.1 redis, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:12:02 np0005604725 podman[98027]: 2026-02-02 08:12:02.159345254 +0000 UTC m=+0.185665476 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, url=https://www.redhat.com, vendor=Red Hat, Inc., tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, build-date=2026-01-12T22:10:16Z, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-redis, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 redis, version=17.1.13, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-redis-container, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:16Z, maintainer=OpenStack TripleO Team, release=1766032510) Feb 2 08:12:02 np0005604725 systemd[1]: tmp-crun.qncIbW.mount: Deactivated successfully. Feb 2 08:12:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:12:11 np0005604725 podman[98650]: 2026-02-02 08:12:11.343243166 +0000 UTC m=+0.085679872 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, summary=Red Hat OpenStack Platform 17.1 collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, url=https://www.redhat.com, vcs-type=git, config_id=tripleo_step3, build-date=2026-01-12T22:10:15Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, io.openshift.expose-services=, container_name=collectd, architecture=x86_64, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-collectd-container, org.opencontainers.image.created=2026-01-12T22:10:15Z, batch=17.1_20260112.1, version=17.1.13, tcib_managed=true, io.buildah.version=1.41.5, release=1766032510, description=Red Hat OpenStack Platform 17.1 collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team) Feb 2 08:12:11 np0005604725 podman[98650]: 2026-02-02 08:12:11.379103845 +0000 UTC m=+0.121540561 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, url=https://www.redhat.com, com.redhat.component=openstack-collectd-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, version=17.1.13, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:15Z, vendor=Red Hat, Inc., container_name=collectd, config_id=tripleo_step3, managed_by=tripleo_ansible, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 collectd, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, tcib_managed=true, vcs-type=git, name=rhosp-rhel9/openstack-collectd, build-date=2026-01-12T22:10:15Z, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd) Feb 2 08:12:11 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:12:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:12:13 np0005604725 podman[98717]: 2026-02-02 08:12:13.328875889 +0000 UTC m=+0.079764670 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, summary=Red Hat OpenStack Platform 17.1 horizon, build-date=2026-01-12T22:34:41Z, org.opencontainers.image.created=2026-01-12T22:34:41Z, managed_by=tripleo_ansible, com.redhat.component=openstack-horizon-container, release=1766032510, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, distribution-scope=public, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, version=17.1.13, tcib_managed=true, container_name=horizon, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, architecture=x86_64, config_id=tripleo_step3, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 horizon) Feb 2 08:12:13 np0005604725 podman[98717]: 2026-02-02 08:12:13.352553701 +0000 UTC m=+0.103442542 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, container_name=horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 horizon, name=rhosp-rhel9/openstack-horizon, architecture=x86_64, build-date=2026-01-12T22:34:41Z, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 horizon, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, com.redhat.component=openstack-horizon-container, vcs-type=git, vcs-ref=705339545363fec600102567c4e923938e0f43b3, release=1766032510, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:34:41Z, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.buildah.version=1.41.5, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible) Feb 2 08:12:13 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:12:16 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:12:16 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:12:16 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:12:16 np0005604725 systemd[1]: tmp-crun.RXquUJ.mount: Deactivated successfully. Feb 2 08:12:16 np0005604725 podman[98890]: 2026-02-02 08:12:16.319469386 +0000 UTC m=+0.072168413 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, container_name=keystone, vcs-type=git, com.redhat.component=openstack-keystone-container, summary=Red Hat OpenStack Platform 17.1 keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:33:53Z, managed_by=tripleo_ansible, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-keystone, maintainer=OpenStack TripleO Team, distribution-scope=public, architecture=x86_64, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, release=1766032510, build-date=2026-01-12T22:33:53Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, config_id=tripleo_step3, description=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:12:16 np0005604725 podman[98891]: 2026-02-02 08:12:16.383804476 +0000 UTC m=+0.130365004 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, architecture=x86_64, maintainer=OpenStack TripleO Team, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, name=rhosp-rhel9/openstack-keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.5, managed_by=tripleo_ansible, distribution-scope=public, build-date=2026-01-12T22:33:53Z, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:33:53Z, vcs-type=git, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, config_id=tripleo_step3, batch=17.1_20260112.1, container_name=keystone_cron, tcib_managed=true, com.redhat.component=openstack-keystone-container, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:12:16 np0005604725 podman[98890]: 2026-02-02 08:12:16.394330972 +0000 UTC m=+0.147030009 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, release=1766032510, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, container_name=keystone, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:33:53Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-keystone, vcs-type=git, version=17.1.13, com.redhat.component=openstack-keystone-container, config_id=tripleo_step3, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, distribution-scope=public, io.buildah.version=1.41.5, url=https://www.redhat.com, build-date=2026-01-12T22:33:53Z, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:12:16 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:12:16 np0005604725 podman[98893]: 2026-02-02 08:12:16.433883266 +0000 UTC m=+0.175882853 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, maintainer=OpenStack TripleO Team, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., architecture=x86_64, description=Red Hat OpenStack Platform 17.1 iscsid, build-date=2026-01-12T22:34:43Z, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:34:43Z, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step3, io.buildah.version=1.41.5, container_name=iscsid, tcib_managed=true, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, release=1766032510, name=rhosp-rhel9/openstack-iscsid, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-iscsid-container, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid) Feb 2 08:12:16 np0005604725 podman[98891]: 2026-02-02 08:12:16.445130334 +0000 UTC m=+0.191690872 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, version=17.1.13, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-keystone, com.redhat.component=openstack-keystone-container, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:33:53Z, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:33:53Z, release=1766032510, architecture=x86_64, io.openshift.expose-services=, url=https://www.redhat.com, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=keystone_cron, summary=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, managed_by=tripleo_ansible, config_id=tripleo_step3, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:12:16 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:12:16 np0005604725 podman[98893]: 2026-02-02 08:12:16.472921534 +0000 UTC m=+0.214921141 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, container_name=iscsid, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:34:43Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, name=rhosp-rhel9/openstack-iscsid, version=17.1.13, distribution-scope=public, com.redhat.component=openstack-iscsid-container, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 iscsid, description=Red Hat OpenStack Platform 17.1 iscsid, io.buildah.version=1.41.5, config_id=tripleo_step3, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, managed_by=tripleo_ansible, build-date=2026-01-12T22:34:43Z, release=1766032510) Feb 2 08:12:16 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:12:19 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:12:19 np0005604725 podman[99249]: 2026-02-02 08:12:19.330728742 +0000 UTC m=+0.079194431 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, vcs-type=git, managed_by=tripleo_ansible, architecture=x86_64, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, distribution-scope=public, com.redhat.component=openstack-mariadb-container, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=clustercheck, release=1766032510, summary=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:18Z, url=https://www.redhat.com, build-date=2026-01-12T22:10:18Z, config_id=tripleo_step2, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=) Feb 2 08:12:19 np0005604725 podman[99249]: 2026-02-02 08:12:19.42501033 +0000 UTC m=+0.173476049 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:18Z, description=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, version=17.1.13, name=rhosp-rhel9/openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, config_id=tripleo_step2, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, io.buildah.version=1.41.5, container_name=clustercheck, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:18Z, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, com.redhat.component=openstack-mariadb-container) Feb 2 08:12:19 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:12:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:12:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:12:32 np0005604725 systemd[1]: tmp-crun.r9PYCj.mount: Deactivated successfully. Feb 2 08:12:32 np0005604725 podman[99913]: 2026-02-02 08:12:32.336971216 +0000 UTC m=+0.084743662 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, com.redhat.component=openstack-qdrouterd-container, name=rhosp-rhel9/openstack-qdrouterd, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, description=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, config_id=tripleo_step1, container_name=metrics_qdr, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:14Z, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:14Z) Feb 2 08:12:32 np0005604725 systemd[1]: tmp-crun.Gs8GRQ.mount: Deactivated successfully. Feb 2 08:12:32 np0005604725 podman[99912]: 2026-02-02 08:12:32.385541249 +0000 UTC m=+0.134212404 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, com.redhat.component=openstack-memcached-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, architecture=x86_64, distribution-scope=public, version=17.1.13, config_id=tripleo_step1, build-date=2026-01-12T22:12:26Z, maintainer=OpenStack TripleO Team, container_name=memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, vcs-type=git, url=https://www.redhat.com, release=1766032510, vendor=Red Hat, Inc., managed_by=tripleo_ansible, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:12:26Z, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, summary=Red Hat OpenStack Platform 17.1 memcached) Feb 2 08:12:32 np0005604725 podman[99912]: 2026-02-02 08:12:32.400843913 +0000 UTC m=+0.149515068 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, version=17.1.13, build-date=2026-01-12T22:12:26Z, com.redhat.component=openstack-memcached-container, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:12:26Z, container_name=memcached, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, summary=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-memcached, distribution-scope=public, io.buildah.version=1.41.5) Feb 2 08:12:32 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:12:32 np0005604725 podman[99913]: 2026-02-02 08:12:32.521755893 +0000 UTC m=+0.269528309 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, batch=17.1_20260112.1, io.openshift.expose-services=, distribution-scope=public, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2026-01-12T22:10:14Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, com.redhat.component=openstack-qdrouterd-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, io.buildah.version=1.41.5, architecture=x86_64, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:14Z, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, name=rhosp-rhel9/openstack-qdrouterd, release=1766032510, maintainer=OpenStack TripleO Team, version=17.1.13, container_name=metrics_qdr, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., config_id=tripleo_step1) Feb 2 08:12:32 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:12:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:12:42 np0005604725 podman[100435]: 2026-02-02 08:12:42.328850439 +0000 UTC m=+0.080308026 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, config_id=tripleo_step3, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, architecture=x86_64, name=rhosp-rhel9/openstack-collectd, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-collectd-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, release=1766032510, build-date=2026-01-12T22:10:15Z, distribution-scope=public, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, description=Red Hat OpenStack Platform 17.1 collectd, batch=17.1_20260112.1, tcib_managed=true, container_name=collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.created=2026-01-12T22:10:15Z, summary=Red Hat OpenStack Platform 17.1 collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd) Feb 2 08:12:42 np0005604725 podman[100435]: 2026-02-02 08:12:42.34180821 +0000 UTC m=+0.093265797 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, distribution-scope=public, managed_by=tripleo_ansible, config_id=tripleo_step3, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-collectd-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:15Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, container_name=collectd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 collectd, build-date=2026-01-12T22:10:15Z, name=rhosp-rhel9/openstack-collectd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, vendor=Red Hat, Inc., config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, vcs-type=git) Feb 2 08:12:42 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:12:44 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:12:44 np0005604725 podman[100545]: 2026-02-02 08:12:44.353332184 +0000 UTC m=+0.100470748 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, build-date=2026-01-12T22:34:41Z, vendor=Red Hat, Inc., org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, container_name=horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, distribution-scope=public, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-horizon-container, name=rhosp-rhel9/openstack-horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 horizon, config_id=tripleo_step3, release=1766032510, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:34:41Z, io.buildah.version=1.41.5, managed_by=tripleo_ansible, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}) Feb 2 08:12:44 np0005604725 podman[100545]: 2026-02-02 08:12:44.391117874 +0000 UTC m=+0.138256518 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, summary=Red Hat OpenStack Platform 17.1 horizon, version=17.1.13, name=rhosp-rhel9/openstack-horizon, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, vcs-type=git, architecture=x86_64, container_name=horizon, distribution-scope=public, io.openshift.expose-services=, build-date=2026-01-12T22:34:41Z, com.redhat.component=openstack-horizon-container, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc.) Feb 2 08:12:44 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:12:47 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:12:47 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:12:47 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:12:47 np0005604725 systemd[1]: tmp-crun.8Z7Ojf.mount: Deactivated successfully. Feb 2 08:12:47 np0005604725 podman[100801]: 2026-02-02 08:12:47.349280548 +0000 UTC m=+0.093308688 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, description=Red Hat OpenStack Platform 17.1 iscsid, container_name=iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, url=https://www.redhat.com, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:34:43Z, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, release=1766032510, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, build-date=2026-01-12T22:34:43Z, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-iscsid, architecture=x86_64, io.buildah.version=1.41.5, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-iscsid-container, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc.) Feb 2 08:12:47 np0005604725 podman[100800]: 2026-02-02 08:12:47.380030619 +0000 UTC m=+0.126397821 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, version=17.1.13, vcs-type=git, build-date=2026-01-12T22:33:53Z, com.redhat.component=openstack-keystone-container, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:33:53Z, tcib_managed=true, managed_by=tripleo_ansible, vendor=Red Hat, Inc., release=1766032510, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-keystone, architecture=x86_64, io.buildah.version=1.41.5, vcs-ref=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step3, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, container_name=keystone_cron) Feb 2 08:12:47 np0005604725 podman[100799]: 2026-02-02 08:12:47.330268559 +0000 UTC m=+0.079788809 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, url=https://www.redhat.com, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:33:53Z, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, distribution-scope=public, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, container_name=keystone, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, build-date=2026-01-12T22:33:53Z, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, vcs-type=git, com.redhat.component=openstack-keystone-container, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true) Feb 2 08:12:47 np0005604725 podman[100800]: 2026-02-02 08:12:47.387736858 +0000 UTC m=+0.134104070 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, managed_by=tripleo_ansible, vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:33:53Z, vendor=Red Hat, Inc., tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-keystone, summary=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, config_id=tripleo_step3, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.openshift.expose-services=, build-date=2026-01-12T22:33:53Z, container_name=keystone_cron) Feb 2 08:12:47 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:12:47 np0005604725 podman[100799]: 2026-02-02 08:12:47.461894802 +0000 UTC m=+0.211415082 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, url=https://www.redhat.com, config_id=tripleo_step3, build-date=2026-01-12T22:33:53Z, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, release=1766032510, name=rhosp-rhel9/openstack-keystone, distribution-scope=public, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, vendor=Red Hat, Inc., vcs-type=git, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, batch=17.1_20260112.1, version=17.1.13, tcib_managed=true, container_name=keystone, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:12:47 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:12:47 np0005604725 podman[100801]: 2026-02-02 08:12:47.484172661 +0000 UTC m=+0.228200811 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 iscsid, description=Red Hat OpenStack Platform 17.1 iscsid, container_name=iscsid, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, name=rhosp-rhel9/openstack-iscsid, tcib_managed=true, io.buildah.version=1.41.5, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, distribution-scope=public, build-date=2026-01-12T22:34:43Z, managed_by=tripleo_ansible, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, config_id=tripleo_step3, com.redhat.component=openstack-iscsid-container, org.opencontainers.image.created=2026-01-12T22:34:43Z, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc.) Feb 2 08:12:47 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:12:48 np0005604725 systemd[1]: tmp-crun.Y3BGu7.mount: Deactivated successfully. Feb 2 08:12:50 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:12:50 np0005604725 systemd[1]: tmp-crun.16d9io.mount: Deactivated successfully. Feb 2 08:12:50 np0005604725 podman[101059]: 2026-02-02 08:12:50.332167536 +0000 UTC m=+0.078454728 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-mariadb, com.redhat.component=openstack-mariadb-container, tcib_managed=true, config_id=tripleo_step2, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:18Z, container_name=clustercheck, distribution-scope=public, build-date=2026-01-12T22:10:18Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}) Feb 2 08:12:50 np0005604725 podman[101059]: 2026-02-02 08:12:50.389887531 +0000 UTC m=+0.136174713 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, container_name=clustercheck, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-mariadb, distribution-scope=public, build-date=2026-01-12T22:10:18Z, org.opencontainers.image.created=2026-01-12T22:10:18Z, summary=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, config_id=tripleo_step2, release=1766032510, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-mariadb-container) Feb 2 08:12:50 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:13:01 np0005604725 podman[101673]: 2026-02-02 08:13:01.79334379 +0000 UTC m=+0.071151664 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, com.redhat.component=openstack-mariadb-container, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-mariadb, release=1766032510, batch=17.1_20260112.1, io.openshift.expose-services=, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:18Z, build-date=2026-01-12T22:10:18Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb) Feb 2 08:13:01 np0005604725 podman[101673]: 2026-02-02 08:13:01.824916146 +0000 UTC m=+0.102724050 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, distribution-scope=public, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, vcs-type=git, com.redhat.component=openstack-mariadb-container, org.opencontainers.image.created=2026-01-12T22:10:18Z, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:18Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, vendor=Red Hat, Inc., tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, version=17.1.13, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:13:02 np0005604725 podman[101721]: 2026-02-02 08:13:02.189887013 +0000 UTC m=+0.197193334 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, version=17.1.13, batch=17.1_20260112.1, distribution-scope=public, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., architecture=x86_64, url=https://www.redhat.com, release=1766032510, com.redhat.component=openstack-rabbitmq-container, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:14Z, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-rabbitmq, io.buildah.version=1.41.5, io.openshift.expose-services=, build-date=2026-01-12T22:10:14Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 rabbitmq, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:13:02 np0005604725 systemd[1]: tmp-crun.AqizTQ.mount: Deactivated successfully. Feb 2 08:13:02 np0005604725 podman[101756]: 2026-02-02 08:13:02.251791048 +0000 UTC m=+0.061099830 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., vcs-type=git, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, description=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-redis, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, url=https://www.redhat.com, build-date=2026-01-12T22:10:16Z, distribution-scope=public, io.buildah.version=1.41.5, com.redhat.component=openstack-redis-container, io.openshift.expose-services=, tcib_managed=true, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:16Z, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, version=17.1.13) Feb 2 08:13:02 np0005604725 podman[101721]: 2026-02-02 08:13:02.274946172 +0000 UTC m=+0.282252463 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, tcib_managed=true, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:14Z, com.redhat.component=openstack-rabbitmq-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 rabbitmq, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, vcs-type=git, build-date=2026-01-12T22:10:14Z, vendor=Red Hat, Inc., vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, io.buildah.version=1.41.5, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp-rhel9/openstack-rabbitmq) Feb 2 08:13:02 np0005604725 podman[101756]: 2026-02-02 08:13:02.284938524 +0000 UTC m=+0.094247276 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:16Z, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 redis, name=rhosp-rhel9/openstack-redis, distribution-scope=public, version=17.1.13, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 redis, vendor=Red Hat, Inc., vcs-type=git, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:16Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, tcib_managed=true, architecture=x86_64, com.redhat.component=openstack-redis-container) Feb 2 08:13:02 np0005604725 podman[101735]: 2026-02-02 08:13:02.324365146 +0000 UTC m=+0.277110001 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, build-date=2026-01-12T22:10:12Z, distribution-scope=public, name=rhosp-rhel9/openstack-haproxy, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-haproxy-container, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 haproxy, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, batch=17.1_20260112.1) Feb 2 08:13:02 np0005604725 podman[101735]: 2026-02-02 08:13:02.35584978 +0000 UTC m=+0.308594625 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, description=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:12Z, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 haproxy, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, vcs-type=git, distribution-scope=public, batch=17.1_20260112.1, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, tcib_managed=true, io.buildah.version=1.41.5, release=1766032510) Feb 2 08:13:02 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:13:02 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:13:02 np0005604725 podman[101882]: 2026-02-02 08:13:02.823680802 +0000 UTC m=+0.063774475 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, release=1766032510, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:14Z, container_name=metrics_qdr, build-date=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-qdrouterd, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_step1, vendor=Red Hat, Inc., io.openshift.expose-services=, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vcs-type=git, com.redhat.component=openstack-qdrouterd-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:13:02 np0005604725 podman[101881]: 2026-02-02 08:13:02.930204671 +0000 UTC m=+0.170125168 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, vcs-type=git, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:12:26Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, name=rhosp-rhel9/openstack-memcached, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:12:26Z, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1, com.redhat.component=openstack-memcached-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, managed_by=tripleo_ansible, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com) Feb 2 08:13:02 np0005604725 podman[101881]: 2026-02-02 08:13:02.975904279 +0000 UTC m=+0.215824766 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, version=17.1.13, architecture=x86_64, config_id=tripleo_step1, org.opencontainers.image.created=2026-01-12T22:12:26Z, url=https://www.redhat.com, com.redhat.component=openstack-memcached-container, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=memcached, distribution-scope=public, name=rhosp-rhel9/openstack-memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, build-date=2026-01-12T22:12:26Z, io.buildah.version=1.41.5, batch=17.1_20260112.1, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team) Feb 2 08:13:02 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:13:03 np0005604725 podman[101882]: 2026-02-02 08:13:03.027108319 +0000 UTC m=+0.267202032 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, com.redhat.component=openstack-qdrouterd-container, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, tcib_managed=true, batch=17.1_20260112.1, build-date=2026-01-12T22:10:14Z, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, container_name=metrics_qdr, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, managed_by=tripleo_ansible, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd) Feb 2 08:13:03 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:13:03 np0005604725 systemd[1]: tmp-crun.dzMKec.mount: Deactivated successfully. Feb 2 08:13:12 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:13:12 np0005604725 podman[102367]: 2026-02-02 08:13:12.825919986 +0000 UTC m=+0.093462731 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, architecture=x86_64, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 collectd, container_name=collectd, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:15Z, name=rhosp-rhel9/openstack-collectd, release=1766032510, config_id=tripleo_step3, url=https://www.redhat.com, vendor=Red Hat, Inc., batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, build-date=2026-01-12T22:10:15Z, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-collectd-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, summary=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:13:12 np0005604725 podman[102367]: 2026-02-02 08:13:12.832986458 +0000 UTC m=+0.100529213 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, release=1766032510, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, name=rhosp-rhel9/openstack-collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, url=https://www.redhat.com, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, container_name=collectd, org.opencontainers.image.created=2026-01-12T22:10:15Z, version=17.1.13, io.openshift.expose-services=, config_id=tripleo_step3, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, com.redhat.component=openstack-collectd-container, vcs-type=git, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:15Z, summary=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true) Feb 2 08:13:12 np0005604725 python3[102366]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/config_step.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:13:12 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:13:13 np0005604725 python3[102430]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/config_step.json force=True mode=0600 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019992.5261202-137979-269581555143568/source _original_basename=tmpi8b162wv follow=False checksum=ee48fb03297eb703b1954c8852d0f67fab51dac1 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:13:14 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:13:14 np0005604725 systemd[1]: tmp-crun.95blg3.mount: Deactivated successfully. Feb 2 08:13:14 np0005604725 podman[102582]: 2026-02-02 08:13:14.53367698 +0000 UTC m=+0.069704630 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, io.buildah.version=1.41.5, com.redhat.component=openstack-horizon-container, summary=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:34:41Z, io.openshift.expose-services=, config_id=tripleo_step3, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, name=rhosp-rhel9/openstack-horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, container_name=horizon, release=1766032510, version=17.1.13, vcs-type=git, vendor=Red Hat, Inc., managed_by=tripleo_ansible, distribution-scope=public) Feb 2 08:13:14 np0005604725 podman[102582]: 2026-02-02 08:13:14.559207658 +0000 UTC m=+0.095235308 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, release=1766032510, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:34:41Z, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 horizon, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, io.buildah.version=1.41.5, vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-horizon, batch=17.1_20260112.1, com.redhat.component=openstack-horizon-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 horizon, tcib_managed=true, build-date=2026-01-12T22:34:41Z, config_id=tripleo_step3, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-ref=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=horizon, vendor=Red Hat, Inc.) Feb 2 08:13:14 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:13:14 np0005604725 python3[102583]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:13:17 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:13:17 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:13:17 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:13:17 np0005604725 podman[102922]: 2026-02-02 08:13:17.533481905 +0000 UTC m=+0.084757861 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, description=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone_cron, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, name=rhosp-rhel9/openstack-keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, architecture=x86_64, release=1766032510, tcib_managed=true, io.openshift.expose-services=, com.redhat.component=openstack-keystone-container, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:33:53Z, build-date=2026-01-12T22:33:53Z, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, summary=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible) Feb 2 08:13:17 np0005604725 podman[102943]: 2026-02-02 08:13:17.590409383 +0000 UTC m=+0.054687650 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, config_id=tripleo_step3, batch=17.1_20260112.1, com.redhat.component=openstack-iscsid-container, build-date=2026-01-12T22:34:43Z, tcib_managed=true, container_name=iscsid, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:34:43Z, description=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, release=1766032510, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.openshift.expose-services=, name=rhosp-rhel9/openstack-iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid) Feb 2 08:13:17 np0005604725 systemd[1]: tmp-crun.7Se8KL.mount: Deactivated successfully. Feb 2 08:13:17 np0005604725 podman[102940]: 2026-02-02 08:13:17.601961714 +0000 UTC m=+0.068119479 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, config_id=tripleo_step3, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-keystone-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.openshift.expose-services=, build-date=2026-01-12T22:33:53Z, version=17.1.13, distribution-scope=public, vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, container_name=keystone, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., url=https://www.redhat.com, architecture=x86_64, name=rhosp-rhel9/openstack-keystone) Feb 2 08:13:17 np0005604725 podman[102922]: 2026-02-02 08:13:17.62230408 +0000 UTC m=+0.173580046 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, config_id=tripleo_step3, distribution-scope=public, io.buildah.version=1.41.5, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:33:53Z, description=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, name=rhosp-rhel9/openstack-keystone, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, container_name=keystone_cron, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:33:53Z, architecture=x86_64, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone) Feb 2 08:13:17 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:13:17 np0005604725 python3[102923]: ansible-tripleo_container_manage Invoked with config_id=ovn_cluster_north_db_server config_dir=/var/lib/tripleo-config/container-startup-config/step_0 config_patterns=ovn_cluster_north_db_server.json config_overrides={} concurrency=1 log_base_path=/var/log/containers/stdouts debug=False Feb 2 08:13:17 np0005604725 podman[102943]: 2026-02-02 08:13:17.677939989 +0000 UTC m=+0.142218246 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, release=1766032510, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, org.opencontainers.image.created=2026-01-12T22:34:43Z, architecture=x86_64, com.redhat.component=openstack-iscsid-container, distribution-scope=public, name=rhosp-rhel9/openstack-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, url=https://www.redhat.com, container_name=iscsid, vendor=Red Hat, Inc., config_id=tripleo_step3, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 iscsid, tcib_managed=true, build-date=2026-01-12T22:34:43Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:13:17 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:13:17 np0005604725 podman[102940]: 2026-02-02 08:13:17.730383378 +0000 UTC m=+0.196541213 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:33:53Z, managed_by=tripleo_ansible, tcib_managed=true, name=rhosp-rhel9/openstack-keystone, config_id=tripleo_step3, distribution-scope=public, container_name=keystone, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, description=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.5, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-keystone-container, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, summary=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:13:17 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:13:17 np0005604725 podman[103043]: 2026-02-02 08:13:17.917413444 +0000 UTC m=+0.112786747 container create 6321d070746f8defa5e0dd8dbd1cf5b6b682b9a324204f7aad6cda811e1d828d (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1, name=ovn_cluster_north_db_server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-nb-db-server, config_id=ovn_cluster_north_db_server, org.opencontainers.image.created=2026-01-12T22:34:10Z, batch=17.1_20260112.1, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-ovn-nb-db-server, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-nb-db-server, url=https://www.redhat.com, io.openshift.expose-services=, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-nb-db-server, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, build-date=2026-01-12T22:34:10Z, container_name=ovn_cluster_north_db_server, io.buildah.version=1.41.5, tcib_managed=true, vendor=Red Hat, Inc., managed_by=tripleo_ansible, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-ovn-nb-db-server-container, description=Red Hat OpenStack Platform 17.1 ovn-nb-db-server, summary=Red Hat OpenStack Platform 17.1 ovn-nb-db-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_north_db_server.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/var/lib/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/var/lib/ovn:shared,z', '/var/lib/openvswitch/ovn:/etc/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/etc/ovn:shared,z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, architecture=x86_64, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team) Feb 2 08:13:17 np0005604725 systemd[1]: Started libpod-conmon-6321d070746f8defa5e0dd8dbd1cf5b6b682b9a324204f7aad6cda811e1d828d.scope. Feb 2 08:13:17 np0005604725 podman[103043]: 2026-02-02 08:13:17.868412662 +0000 UTC m=+0.063786005 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 Feb 2 08:13:17 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:13:17 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/186a5accc5d467ae307969022ecb405e772869e1c733fad311aa3cc103fb24c0/merged/etc/ovn supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:17 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/186a5accc5d467ae307969022ecb405e772869e1c733fad311aa3cc103fb24c0/merged/run/openvswitch supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:17 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/186a5accc5d467ae307969022ecb405e772869e1c733fad311aa3cc103fb24c0/merged/etc/openvswitch supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:17 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/186a5accc5d467ae307969022ecb405e772869e1c733fad311aa3cc103fb24c0/merged/run/ovn supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:17 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/186a5accc5d467ae307969022ecb405e772869e1c733fad311aa3cc103fb24c0/merged/var/lib/openvswitch supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:17 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/186a5accc5d467ae307969022ecb405e772869e1c733fad311aa3cc103fb24c0/merged/var/log/ovn supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:17 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/186a5accc5d467ae307969022ecb405e772869e1c733fad311aa3cc103fb24c0/merged/var/log/openvswitch supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:17 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/186a5accc5d467ae307969022ecb405e772869e1c733fad311aa3cc103fb24c0/merged/var/lib/ovn supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:17 np0005604725 podman[103043]: 2026-02-02 08:13:17.988749763 +0000 UTC m=+0.184123076 container init 6321d070746f8defa5e0dd8dbd1cf5b6b682b9a324204f7aad6cda811e1d828d (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1, name=ovn_cluster_north_db_server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_north_db_server.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/var/lib/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/var/lib/ovn:shared,z', '/var/lib/openvswitch/ovn:/etc/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/etc/ovn:shared,z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=ovn_cluster_north_db_server, org.opencontainers.image.created=2026-01-12T22:34:10Z, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, managed_by=tripleo_ansible, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 ovn-nb-db-server, vcs-type=git, container_name=ovn_cluster_north_db_server, build-date=2026-01-12T22:34:10Z, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 ovn-nb-db-server, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-ovn-nb-db-server-container, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-nb-db-server, distribution-scope=public, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-ovn-nb-db-server, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.openshift.expose-services=, version=17.1.13, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-nb-db-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-nb-db-server) Feb 2 08:13:17 np0005604725 podman[103043]: 2026-02-02 08:13:17.999596752 +0000 UTC m=+0.194970065 container start 6321d070746f8defa5e0dd8dbd1cf5b6b682b9a324204f7aad6cda811e1d828d (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1, name=ovn_cluster_north_db_server, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-nb-db-server, config_id=ovn_cluster_north_db_server, description=Red Hat OpenStack Platform 17.1 ovn-nb-db-server, version=17.1.13, io.buildah.version=1.41.5, io.openshift.expose-services=, build-date=2026-01-12T22:34:10Z, maintainer=OpenStack TripleO Team, distribution-scope=public, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-nb-db-server, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_north_db_server.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/var/lib/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/var/lib/ovn:shared,z', '/var/lib/openvswitch/ovn:/etc/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/etc/ovn:shared,z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:34:10Z, summary=Red Hat OpenStack Platform 17.1 ovn-nb-db-server, url=https://www.redhat.com, vendor=Red Hat, Inc., container_name=ovn_cluster_north_db_server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-nb-db-server, com.redhat.component=openstack-ovn-nb-db-server-container, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-ovn-nb-db-server, architecture=x86_64, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:13:18 np0005604725 python3[102923]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name ovn_cluster_north_db_server --conmon-pidfile /run/ovn_cluster_north_db_server.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --label config_id=ovn_cluster_north_db_server --label container_name=ovn_cluster_north_db_server --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_north_db_server.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/var/lib/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/var/lib/ovn:shared,z', '/var/lib/openvswitch/ovn:/etc/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/etc/ovn:shared,z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/ovn_cluster_north_db_server.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/ovn_cluster_north_db_server.json:/var/lib/kolla/config_files/config.json:ro --volume /lib/modules:/lib/modules:ro --volume /var/lib/openvswitch/ovn:/var/lib/openvswitch:shared,z --volume /var/lib/openvswitch/ovn:/run/openvswitch:shared,z --volume /var/log/containers/openvswitch:/var/log/openvswitch:z --volume /var/lib/openvswitch/ovn:/var/lib/ovn:shared,z --volume /var/lib/openvswitch/ovn:/etc/openvswitch:shared,z --volume /var/lib/openvswitch/ovn:/etc/ovn:shared,z --volume /var/lib/openvswitch/ovn:/run/ovn:shared,z --volume /var/log/containers/openvswitch:/var/log/ovn:z --volume /var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro --volume /etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00002|raft|INFO|local server ID is d0ad Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00003|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.6-141.el9fdp Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00004|reconnect|INFO|ssl:172.17.0.103:6643: connecting... Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00005|reconnect|INFO|ssl:172.17.0.103:6643: connected Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00006|raft_rpc|INFO|learned cluster ID 6ec3 Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00007|raft|INFO|ssl:172.17.0.103:6643: learned server ID 6e8a Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00008|raft|INFO|server 6e8a is leader for term 2 Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00009|raft|INFO|rejecting append_request because previous entry 2,5 not in local log (mismatch past end of log) Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00010|raft|INFO|server 6e8a added to configuration Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00011|raft|INFO|Election timer changed from 10000 to 10000 Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00012|raft|INFO|server d0ad added to configuration Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00013|raft|INFO|ssl:172.17.0.103:47546: learned server ID 6e8a Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00014|raft|INFO|ssl:172.17.0.103:47546: learned remote address ssl:172.17.0.103:6643 Feb 2 08:13:18 np0005604725 sshd[103223]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:13:18 np0005604725 python3[103226]: ansible-file Invoked with path=/etc/systemd/system/tripleo_ovn_cluster_north_db_server.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00015|raft|INFO|server a730 added to configuration Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00016|reconnect|INFO|ssl:172.17.0.105:6643: connecting... Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00017|raft|INFO|ssl:172.17.0.105:42608: learned server ID a730 Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00018|raft|INFO|ssl:172.17.0.105:42608: learned remote address ssl:172.17.0.105:6643 Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00019|raft|INFO|adding a730 (a730 at ssl:172.17.0.105:6643) to cluster 6ec3 failed (not leader) Feb 2 08:13:18 np0005604725 ovsdb-server[103079]: ovs|00020|reconnect|INFO|ssl:172.17.0.105:6643: connected Feb 2 08:13:18 np0005604725 python3[103258]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_ovn_cluster_north_db_server_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:13:19 np0005604725 python3[103329]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770019999.0317676-138553-196529332873635/source dest=/etc/systemd/system/tripleo_ovn_cluster_north_db_server.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:13:20 np0005604725 python3[103414]: ansible-systemd Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Feb 2 08:13:20 np0005604725 systemd[1]: Reloading. Feb 2 08:13:20 np0005604725 systemd-rc-local-generator[103443]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:13:20 np0005604725 systemd-sysv-generator[103446]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:13:20 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:13:21 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:13:21 np0005604725 podman[103491]: 2026-02-02 08:13:21.240176541 +0000 UTC m=+0.051358057 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., config_id=tripleo_step2, container_name=clustercheck, summary=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, url=https://www.redhat.com, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.component=openstack-mariadb-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, release=1766032510, description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:18Z, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, name=rhosp-rhel9/openstack-mariadb) Feb 2 08:13:21 np0005604725 podman[103491]: 2026-02-02 08:13:21.281771951 +0000 UTC m=+0.092953467 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, release=1766032510, vendor=Red Hat, Inc., vcs-type=git, io.buildah.version=1.41.5, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-mariadb, com.redhat.component=openstack-mariadb-container, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step2, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, build-date=2026-01-12T22:10:18Z, container_name=clustercheck, summary=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, managed_by=tripleo_ansible, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb) Feb 2 08:13:21 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:13:21 np0005604725 python3[103492]: ansible-systemd Invoked with state=restarted name=tripleo_ovn_cluster_north_db_server.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:13:21 np0005604725 systemd[1]: Reloading. Feb 2 08:13:21 np0005604725 systemd-rc-local-generator[103563]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:13:21 np0005604725 systemd-sysv-generator[103566]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:13:21 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:13:21 np0005604725 systemd[1]: Starting ovn_cluster_north_db_server container... Feb 2 08:13:21 np0005604725 systemd[1]: Started ovn_cluster_north_db_server container. Feb 2 08:13:22 np0005604725 python3[103693]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:13:25 np0005604725 python3[103880]: ansible-tripleo_container_manage Invoked with config_id=ovn_cluster_south_db_server config_dir=/var/lib/tripleo-config/container-startup-config/step_0 config_patterns=ovn_cluster_south_db_server.json config_overrides={} concurrency=1 log_base_path=/var/log/containers/stdouts debug=False Feb 2 08:13:25 np0005604725 podman[103920]: 2026-02-02 08:13:25.445416238 +0000 UTC m=+0.087854726 container create 18702631380a61ce2ca444ed30432901b5c715d841d94aab9570def9cabd118f (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1, name=ovn_cluster_south_db_server, release=1766032510, org.opencontainers.image.created=2026-01-12T22:36:46Z, com.redhat.component=openstack-ovn-sb-db-server-container, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., build-date=2026-01-12T22:36:46Z, config_id=ovn_cluster_south_db_server, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-sb-db-server, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 ovn-sb-db-server, container_name=ovn_cluster_south_db_server, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_south_db_server.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/var/lib/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/var/lib/ovn:shared,z', '/var/lib/openvswitch/ovn:/etc/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/etc/ovn:shared,z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, io.buildah.version=1.41.5, managed_by=tripleo_ansible, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-sb-db-server, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-ovn-sb-db-server, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-sb-db-server, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 ovn-sb-db-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true) Feb 2 08:13:25 np0005604725 systemd[1]: Started libpod-conmon-18702631380a61ce2ca444ed30432901b5c715d841d94aab9570def9cabd118f.scope. Feb 2 08:13:25 np0005604725 podman[103920]: 2026-02-02 08:13:25.395164867 +0000 UTC m=+0.037603375 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 Feb 2 08:13:25 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:13:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/afa9c0f4710a86e6ef3d0f5586645965e829c9a20dd068fe8a90fd6eb63d695a/merged/etc/openvswitch supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/afa9c0f4710a86e6ef3d0f5586645965e829c9a20dd068fe8a90fd6eb63d695a/merged/etc/ovn supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/afa9c0f4710a86e6ef3d0f5586645965e829c9a20dd068fe8a90fd6eb63d695a/merged/run/openvswitch supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/afa9c0f4710a86e6ef3d0f5586645965e829c9a20dd068fe8a90fd6eb63d695a/merged/run/ovn supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/afa9c0f4710a86e6ef3d0f5586645965e829c9a20dd068fe8a90fd6eb63d695a/merged/var/log/ovn supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/afa9c0f4710a86e6ef3d0f5586645965e829c9a20dd068fe8a90fd6eb63d695a/merged/var/lib/openvswitch supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/afa9c0f4710a86e6ef3d0f5586645965e829c9a20dd068fe8a90fd6eb63d695a/merged/var/lib/ovn supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/afa9c0f4710a86e6ef3d0f5586645965e829c9a20dd068fe8a90fd6eb63d695a/merged/var/log/openvswitch supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:25 np0005604725 podman[103920]: 2026-02-02 08:13:25.534929306 +0000 UTC m=+0.177367734 container init 18702631380a61ce2ca444ed30432901b5c715d841d94aab9570def9cabd118f (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1, name=ovn_cluster_south_db_server, org.opencontainers.image.created=2026-01-12T22:36:46Z, io.buildah.version=1.41.5, com.redhat.component=openstack-ovn-sb-db-server-container, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, container_name=ovn_cluster_south_db_server, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_south_db_server.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/var/lib/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/var/lib/ovn:shared,z', '/var/lib/openvswitch/ovn:/etc/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/etc/ovn:shared,z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-sb-db-server, name=rhosp-rhel9/openstack-ovn-sb-db-server, config_id=ovn_cluster_south_db_server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:36:46Z, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-sb-db-server, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-sb-db-server, version=17.1.13, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 ovn-sb-db-server, summary=Red Hat OpenStack Platform 17.1 ovn-sb-db-server, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, managed_by=tripleo_ansible, vcs-type=git, tcib_managed=true, io.openshift.expose-services=) Feb 2 08:13:25 np0005604725 podman[103920]: 2026-02-02 08:13:25.547354153 +0000 UTC m=+0.189792591 container start 18702631380a61ce2ca444ed30432901b5c715d841d94aab9570def9cabd118f (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1, name=ovn_cluster_south_db_server, container_name=ovn_cluster_south_db_server, release=1766032510, config_id=ovn_cluster_south_db_server, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-sb-db-server, managed_by=tripleo_ansible, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_south_db_server.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/var/lib/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/var/lib/ovn:shared,z', '/var/lib/openvswitch/ovn:/etc/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/etc/ovn:shared,z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, summary=Red Hat OpenStack Platform 17.1 ovn-sb-db-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, name=rhosp-rhel9/openstack-ovn-sb-db-server, io.openshift.expose-services=, io.buildah.version=1.41.5, com.redhat.component=openstack-ovn-sb-db-server-container, distribution-scope=public, build-date=2026-01-12T22:36:46Z, version=17.1.13, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-sb-db-server, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-sb-db-server, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, org.opencontainers.image.created=2026-01-12T22:36:46Z, description=Red Hat OpenStack Platform 17.1 ovn-sb-db-server) Feb 2 08:13:25 np0005604725 python3[103880]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name ovn_cluster_south_db_server --conmon-pidfile /run/ovn_cluster_south_db_server.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --label config_id=ovn_cluster_south_db_server --label container_name=ovn_cluster_south_db_server --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_south_db_server.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/var/lib/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/var/lib/ovn:shared,z', '/var/lib/openvswitch/ovn:/etc/openvswitch:shared,z', '/var/lib/openvswitch/ovn:/etc/ovn:shared,z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/ovn_cluster_south_db_server.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/ovn_cluster_south_db_server.json:/var/lib/kolla/config_files/config.json:ro --volume /lib/modules:/lib/modules:ro --volume /var/lib/openvswitch/ovn:/var/lib/openvswitch:shared,z --volume /var/lib/openvswitch/ovn:/run/openvswitch:shared,z --volume /var/log/containers/openvswitch:/var/log/openvswitch:z --volume /var/lib/openvswitch/ovn:/var/lib/ovn:shared,z --volume /var/lib/openvswitch/ovn:/etc/openvswitch:shared,z --volume /var/lib/openvswitch/ovn:/etc/ovn:shared,z --volume /var/lib/openvswitch/ovn:/run/ovn:shared,z --volume /var/log/containers/openvswitch:/var/log/ovn:z --volume /var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro --volume /etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 Feb 2 08:13:25 np0005604725 ovsdb-server[103969]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Feb 2 08:13:25 np0005604725 ovsdb-server[103969]: ovs|00002|raft|INFO|local server ID is 51d0 Feb 2 08:13:25 np0005604725 ovsdb-server[103969]: ovs|00003|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.6-141.el9fdp Feb 2 08:13:25 np0005604725 ovsdb-server[103969]: ovs|00004|reconnect|INFO|ssl:172.17.0.103:6644: connecting... Feb 2 08:13:25 np0005604725 ovsdb-server[103969]: ovs|00005|reconnect|INFO|ssl:172.17.0.103:6644: connected Feb 2 08:13:25 np0005604725 ovsdb-server[103969]: ovs|00006|raft_rpc|INFO|learned cluster ID 4627 Feb 2 08:13:25 np0005604725 ovsdb-server[103969]: ovs|00007|raft|INFO|ssl:172.17.0.103:6644: learned server ID 2e9f Feb 2 08:13:25 np0005604725 ovsdb-server[103969]: ovs|00008|raft|INFO|server 2e9f is leader for term 2 Feb 2 08:13:25 np0005604725 ovsdb-server[103969]: ovs|00009|raft|INFO|rejecting append_request because previous entry 2,5 not in local log (mismatch past end of log) Feb 2 08:13:25 np0005604725 ovsdb-server[103969]: ovs|00010|raft|INFO|server 2e9f added to configuration Feb 2 08:13:25 np0005604725 ovsdb-server[103969]: ovs|00011|raft|INFO|Election timer changed from 16000 to 16000 Feb 2 08:13:25 np0005604725 ovsdb-server[103969]: ovs|00012|raft|INFO|server 51d0 added to configuration Feb 2 08:13:25 np0005604725 ovsdb-server[103969]: ovs|00013|raft|INFO|ssl:172.17.0.103:59906: learned server ID 2e9f Feb 2 08:13:25 np0005604725 ovsdb-server[103969]: ovs|00014|raft|INFO|ssl:172.17.0.103:59906: learned remote address ssl:172.17.0.103:6644 Feb 2 08:13:26 np0005604725 python3[104108]: ansible-file Invoked with path=/etc/systemd/system/tripleo_ovn_cluster_south_db_server.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:13:26 np0005604725 python3[104173]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_ovn_cluster_south_db_server_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:13:26 np0005604725 ovsdb-server[103969]: ovs|00015|raft|INFO|server fecb added to configuration Feb 2 08:13:26 np0005604725 ovsdb-server[103969]: ovs|00016|reconnect|INFO|ssl:172.17.0.105:6644: connecting... Feb 2 08:13:26 np0005604725 ovsdb-server[103969]: ovs|00017|raft|INFO|ssl:172.17.0.105:40752: learned server ID fecb Feb 2 08:13:26 np0005604725 ovsdb-server[103969]: ovs|00018|raft|INFO|ssl:172.17.0.105:40752: learned remote address ssl:172.17.0.105:6644 Feb 2 08:13:26 np0005604725 ovsdb-server[103969]: ovs|00019|raft|INFO|adding fecb (fecb at ssl:172.17.0.105:6644) to cluster 4627 failed (not leader) Feb 2 08:13:26 np0005604725 ovsdb-server[103969]: ovs|00020|reconnect|INFO|ssl:172.17.0.105:6644: connected Feb 2 08:13:27 np0005604725 python3[104242]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020006.4019012-139016-39204637042865/source dest=/etc/systemd/system/tripleo_ovn_cluster_south_db_server.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:13:27 np0005604725 python3[104274]: ansible-systemd Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Feb 2 08:13:27 np0005604725 systemd[1]: Reloading. Feb 2 08:13:27 np0005604725 systemd-sysv-generator[104298]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:13:27 np0005604725 systemd-rc-local-generator[104295]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:13:27 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:13:28 np0005604725 ovsdb-server[103079]: ovs|00021|memory|INFO|12244 kB peak resident set size after 10.0 seconds Feb 2 08:13:28 np0005604725 ovsdb-server[103079]: ovs|00022|memory|INFO|atoms:41 cells:43 monitors:0 n-weak-refs:0 raft-connections:4 raft-log:6 txn-history:1 txn-history-atoms:30 Feb 2 08:13:28 np0005604725 python3[104407]: ansible-systemd Invoked with state=restarted name=tripleo_ovn_cluster_south_db_server.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:13:28 np0005604725 systemd[1]: Reloading. Feb 2 08:13:28 np0005604725 systemd-rc-local-generator[104450]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:13:28 np0005604725 systemd-sysv-generator[104453]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:13:29 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:13:29 np0005604725 systemd[1]: Starting ovn_cluster_south_db_server container... Feb 2 08:13:29 np0005604725 systemd[1]: Started ovn_cluster_south_db_server container. Feb 2 08:13:29 np0005604725 python3[104566]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:13:32 np0005604725 python3[104832]: ansible-tripleo_container_manage Invoked with config_id=ovn_cluster_northd config_dir=/var/lib/tripleo-config/container-startup-config/step_0 config_patterns=ovn_cluster_northd.json config_overrides={} concurrency=1 log_base_path=/var/log/containers/stdouts debug=False Feb 2 08:13:32 np0005604725 podman[104870]: 2026-02-02 08:13:32.757831216 +0000 UTC m=+0.086296268 container create e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, description=Red Hat OpenStack Platform 17.1 ovn-northd, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, version=17.1.13, build-date=2026-01-12T22:34:06Z, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:06Z, distribution-scope=public, batch=17.1_20260112.1, container_name=ovn_cluster_northd, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-ovn-northd, vendor=Red Hat, Inc., managed_by=tripleo_ansible, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, vcs-type=git, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, com.redhat.component=openstack-ovn-northd-container, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, summary=Red Hat OpenStack Platform 17.1 ovn-northd, io.openshift.expose-services=, config_id=ovn_cluster_northd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd) Feb 2 08:13:32 np0005604725 podman[104870]: 2026-02-02 08:13:32.707958347 +0000 UTC m=+0.036423469 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 Feb 2 08:13:32 np0005604725 systemd[1]: Started libpod-conmon-e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.scope. Feb 2 08:13:32 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:13:32 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5d2ee8a1430dba10d9a60effb14689588f9e9214d082d79f4e662f6ab828d3bd/merged/run/openvswitch supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:32 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5d2ee8a1430dba10d9a60effb14689588f9e9214d082d79f4e662f6ab828d3bd/merged/run/ovn supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:32 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5d2ee8a1430dba10d9a60effb14689588f9e9214d082d79f4e662f6ab828d3bd/merged/var/log/ovn supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:32 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5d2ee8a1430dba10d9a60effb14689588f9e9214d082d79f4e662f6ab828d3bd/merged/var/log/openvswitch supports timestamps until 2038 (0x7fffffff) Feb 2 08:13:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:13:32 np0005604725 podman[104870]: 2026-02-02 08:13:32.852100093 +0000 UTC m=+0.180565155 container init e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, distribution-scope=public, url=https://www.redhat.com, io.openshift.expose-services=, name=rhosp-rhel9/openstack-ovn-northd, build-date=2026-01-12T22:34:06Z, tcib_managed=true, vcs-type=git, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, config_id=ovn_cluster_northd, summary=Red Hat OpenStack Platform 17.1 ovn-northd, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:34:06Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, managed_by=tripleo_ansible, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, description=Red Hat OpenStack Platform 17.1 ovn-northd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, container_name=ovn_cluster_northd, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-ovn-northd-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64) Feb 2 08:13:32 np0005604725 systemd[1]: tmp-crun.TrR1mf.mount: Deactivated successfully. Feb 2 08:13:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:13:32 np0005604725 podman[104870]: 2026-02-02 08:13:32.885523687 +0000 UTC m=+0.213988749 container start e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, version=17.1.13, build-date=2026-01-12T22:34:06Z, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-ovn-northd-container, config_id=ovn_cluster_northd, vcs-type=git, container_name=ovn_cluster_northd, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, managed_by=tripleo_ansible, tcib_managed=true, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, release=1766032510, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, name=rhosp-rhel9/openstack-ovn-northd, org.opencontainers.image.created=2026-01-12T22:34:06Z, distribution-scope=public, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 ovn-northd, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 ovn-northd) Feb 2 08:13:32 np0005604725 python3[104832]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name ovn_cluster_northd --conmon-pidfile /run/ovn_cluster_northd.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --healthcheck-command /openstack/healthcheck --label config_id=ovn_cluster_northd --label container_name=ovn_cluster_northd --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/ovn_cluster_northd.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro --volume /lib/modules:/lib/modules:ro --volume /var/lib/openvswitch/ovn:/run/openvswitch:shared,z --volume /var/log/containers/openvswitch:/var/log/openvswitch:z --volume /var/lib/openvswitch/ovn:/run/ovn:shared,z --volume /var/log/containers/openvswitch:/var/log/ovn:z --volume /var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro --volume /etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 Feb 2 08:13:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:13:33 np0005604725 podman[104899]: 2026-02-02 08:13:33.015580472 +0000 UTC m=+0.123974576 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=starting, container_name=ovn_cluster_northd, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, config_id=ovn_cluster_northd, vendor=Red Hat, Inc., vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-ovn-northd, description=Red Hat OpenStack Platform 17.1 ovn-northd, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, com.redhat.component=openstack-ovn-northd-container, managed_by=tripleo_ansible, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, vcs-type=git, architecture=x86_64, batch=17.1_20260112.1, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:34:06Z, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, summary=Red Hat OpenStack Platform 17.1 ovn-northd, build-date=2026-01-12T22:34:06Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, version=17.1.13) Feb 2 08:13:33 np0005604725 podman[104939]: 2026-02-02 08:13:33.078032613 +0000 UTC m=+0.058664683 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, build-date=2026-01-12T22:12:26Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-memcached, release=1766032510, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-memcached-container, container_name=memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, vendor=Red Hat, Inc., tcib_managed=true, io.buildah.version=1.41.5, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, description=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, managed_by=tripleo_ansible, url=https://www.redhat.com, version=17.1.13) Feb 2 08:13:33 np0005604725 podman[104939]: 2026-02-02 08:13:33.090533694 +0000 UTC m=+0.071165764 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, container_name=memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, architecture=x86_64, io.buildah.version=1.41.5, vcs-type=git, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 memcached, description=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1, config_id=tripleo_step1, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., distribution-scope=public, url=https://www.redhat.com, build-date=2026-01-12T22:12:26Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-memcached-container, org.opencontainers.image.created=2026-01-12T22:12:26Z, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, name=rhosp-rhel9/openstack-memcached, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, version=17.1.13) Feb 2 08:13:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:13:33 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:13:33 np0005604725 podman[104899]: 2026-02-02 08:13:33.130300537 +0000 UTC m=+0.238694681 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.buildah.version=1.41.5, build-date=2026-01-12T22:34:06Z, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:34:06Z, config_id=ovn_cluster_northd, distribution-scope=public, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, com.redhat.component=openstack-ovn-northd-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, container_name=ovn_cluster_northd, version=17.1.13, io.openshift.expose-services=, batch=17.1_20260112.1, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 ovn-northd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, description=Red Hat OpenStack Platform 17.1 ovn-northd, name=rhosp-rhel9/openstack-ovn-northd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible) Feb 2 08:13:33 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:13:33 np0005604725 podman[104978]: 2026-02-02 08:13:33.181736574 +0000 UTC m=+0.065683963 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, version=17.1.13, maintainer=OpenStack TripleO Team, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=metrics_qdr, release=1766032510, batch=17.1_20260112.1, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp-rhel9/openstack-qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_step1, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-type=git, managed_by=tripleo_ansible, distribution-scope=public, build-date=2026-01-12T22:10:14Z, vendor=Red Hat, Inc., com.redhat.component=openstack-qdrouterd-container) Feb 2 08:13:33 np0005604725 podman[104978]: 2026-02-02 08:13:33.370920387 +0000 UTC m=+0.254867726 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=metrics_qdr, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, name=rhosp-rhel9/openstack-qdrouterd, release=1766032510, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, tcib_managed=true, io.openshift.expose-services=, build-date=2026-01-12T22:10:14Z, batch=17.1_20260112.1, config_id=tripleo_step1, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:13:33 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:13:33 np0005604725 python3[105030]: ansible-file Invoked with path=/etc/systemd/system/tripleo_ovn_cluster_northd.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:13:33 np0005604725 python3[105046]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_ovn_cluster_northd_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:13:34 np0005604725 python3[105175]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020013.87734-139433-191461625688094/source dest=/etc/systemd/system/tripleo_ovn_cluster_northd.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:13:34 np0005604725 python3[105191]: ansible-systemd Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Feb 2 08:13:34 np0005604725 systemd[1]: Reloading. Feb 2 08:13:34 np0005604725 systemd-rc-local-generator[105227]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:13:34 np0005604725 systemd-sysv-generator[105230]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:13:35 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:13:35 np0005604725 ovsdb-server[103969]: ovs|00021|memory|INFO|12192 kB peak resident set size after 10.0 seconds Feb 2 08:13:35 np0005604725 ovsdb-server[103969]: ovs|00022|memory|INFO|atoms:380 cells:332 monitors:0 n-weak-refs:10 raft-connections:4 raft-log:6 txn-history:1 txn-history-atoms:361 Feb 2 08:13:36 np0005604725 python3[105281]: ansible-systemd Invoked with state=restarted name=tripleo_ovn_cluster_northd.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:13:36 np0005604725 systemd[1]: Reloading. Feb 2 08:13:36 np0005604725 systemd-sysv-generator[105361]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:13:36 np0005604725 systemd-rc-local-generator[105357]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:13:36 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:13:36 np0005604725 systemd[1]: Starting ovn_cluster_northd container... Feb 2 08:13:36 np0005604725 systemd[1]: Started ovn_cluster_northd container. Feb 2 08:13:37 np0005604725 python3[105420]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_4 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:13:38 np0005604725 ansible-async_wrapper.py[105690]: Invoked with 525648751318 3600 /home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020018.3572047-139544-259291147986451/AnsiballZ_command.py _ Feb 2 08:13:38 np0005604725 ansible-async_wrapper.py[105701]: Starting module and watcher Feb 2 08:13:38 np0005604725 ansible-async_wrapper.py[105701]: Start watching 105702 (3600) Feb 2 08:13:38 np0005604725 ansible-async_wrapper.py[105702]: Start module (105702) Feb 2 08:13:38 np0005604725 ansible-async_wrapper.py[105690]: Return async_wrapper task started. Feb 2 08:13:39 np0005604725 python3[105722]: ansible-ansible.legacy.async_status Invoked with jid=525648751318.105690 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:13:43 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:13:43 np0005604725 systemd[1]: tmp-crun.OGaDGi.mount: Deactivated successfully. Feb 2 08:13:43 np0005604725 podman[106028]: 2026-02-02 08:13:43.309062508 +0000 UTC m=+0.064153286 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, container_name=collectd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., tcib_managed=true, com.redhat.component=openstack-collectd-container, description=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, io.openshift.expose-services=, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:15Z, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:15Z, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 collectd, io.buildah.version=1.41.5, batch=17.1_20260112.1, version=17.1.13, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, managed_by=tripleo_ansible, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, name=rhosp-rhel9/openstack-collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}) Feb 2 08:13:43 np0005604725 podman[106028]: 2026-02-02 08:13:43.351875346 +0000 UTC m=+0.106966124 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, distribution-scope=public, io.buildah.version=1.41.5, version=17.1.13, build-date=2026-01-12T22:10:15Z, container_name=collectd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step3, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 collectd, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 collectd, name=rhosp-rhel9/openstack-collectd, com.redhat.component=openstack-collectd-container, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:15Z) Feb 2 08:13:43 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:13:43 np0005604725 ansible-async_wrapper.py[105701]: 105702 still running (3600) Feb 2 08:13:45 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:13:45 np0005604725 puppet-user[105719]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:13:45 np0005604725 puppet-user[105719]: (file: /etc/puppet/hiera.yaml) Feb 2 08:13:45 np0005604725 puppet-user[105719]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:13:45 np0005604725 puppet-user[105719]: (file & line not available) Feb 2 08:13:45 np0005604725 puppet-user[105719]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:13:45 np0005604725 puppet-user[105719]: (file & line not available) Feb 2 08:13:45 np0005604725 puppet-user[105719]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/database/mysql/client.pp, line: 89, column: 8) Feb 2 08:13:45 np0005604725 podman[106315]: 2026-02-02 08:13:45.330325369 +0000 UTC m=+0.076566544 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, vcs-type=git, io.openshift.expose-services=, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:34:41Z, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, distribution-scope=public, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, description=Red Hat OpenStack Platform 17.1 horizon, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, batch=17.1_20260112.1, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:34:41Z, name=rhosp-rhel9/openstack-horizon, summary=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, config_id=tripleo_step3, com.redhat.component=openstack-horizon-container, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:13:45 np0005604725 podman[106315]: 2026-02-02 08:13:45.362809315 +0000 UTC m=+0.109050480 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, io.buildah.version=1.41.5, vcs-ref=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, managed_by=tripleo_ansible, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, vcs-type=git, io.openshift.expose-services=, com.redhat.component=openstack-horizon-container, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:34:41Z, distribution-scope=public, architecture=x86_64, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-horizon, summary=Red Hat OpenStack Platform 17.1 horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:34:41Z, container_name=horizon, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 horizon) Feb 2 08:13:45 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:13:45 np0005604725 puppet-user[105719]: Warning: This method is deprecated, please use match expressions with Stdlib::Compat::String instead. They are described at https://docs.puppet.com/puppet/latest/reference/lang_data_type.html#match-expressions. at ["/etc/puppet/modules/snmp/manifests/params.pp", 310]:["/var/lib/tripleo-config/puppet_step_config.pp", 7] Feb 2 08:13:45 np0005604725 puppet-user[105719]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Feb 2 08:13:45 np0005604725 puppet-user[105719]: Warning: This method is deprecated, please use the stdlib validate_legacy function, Feb 2 08:13:45 np0005604725 puppet-user[105719]: with Stdlib::Compat::Bool. There is further documentation for validate_legacy function in the README. at ["/etc/puppet/modules/snmp/manifests/init.pp", 358]:["/var/lib/tripleo-config/puppet_step_config.pp", 7] Feb 2 08:13:45 np0005604725 puppet-user[105719]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Feb 2 08:13:45 np0005604725 puppet-user[105719]: Warning: This method is deprecated, please use the stdlib validate_legacy function, Feb 2 08:13:45 np0005604725 puppet-user[105719]: with Stdlib::Compat::Array. There is further documentation for validate_legacy function in the README. at ["/etc/puppet/modules/snmp/manifests/init.pp", 367]:["/var/lib/tripleo-config/puppet_step_config.pp", 7] Feb 2 08:13:45 np0005604725 puppet-user[105719]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Feb 2 08:13:45 np0005604725 puppet-user[105719]: Warning: This method is deprecated, please use the stdlib validate_legacy function, Feb 2 08:13:45 np0005604725 puppet-user[105719]: with Stdlib::Compat::String. There is further documentation for validate_legacy function in the README. at ["/etc/puppet/modules/snmp/manifests/init.pp", 382]:["/var/lib/tripleo-config/puppet_step_config.pp", 7] Feb 2 08:13:45 np0005604725 puppet-user[105719]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Feb 2 08:13:45 np0005604725 puppet-user[105719]: Warning: This method is deprecated, please use the stdlib validate_legacy function, Feb 2 08:13:45 np0005604725 puppet-user[105719]: with Stdlib::Compat::Numeric. There is further documentation for validate_legacy function in the README. at ["/etc/puppet/modules/snmp/manifests/init.pp", 388]:["/var/lib/tripleo-config/puppet_step_config.pp", 7] Feb 2 08:13:45 np0005604725 puppet-user[105719]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Feb 2 08:13:45 np0005604725 puppet-user[105719]: Warning: This method is deprecated, please use the stdlib validate_legacy function, Feb 2 08:13:45 np0005604725 puppet-user[105719]: with Pattern[]. There is further documentation for validate_legacy function in the README. at ["/etc/puppet/modules/snmp/manifests/init.pp", 393]:["/var/lib/tripleo-config/puppet_step_config.pp", 7] Feb 2 08:13:45 np0005604725 puppet-user[105719]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Feb 2 08:13:45 np0005604725 puppet-user[105719]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/packages.pp, line: 39, column: 69) Feb 2 08:13:45 np0005604725 puppet-user[105719]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.52 seconds Feb 2 08:13:48 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:13:48 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:13:48 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:13:48 np0005604725 systemd[1]: tmp-crun.tLTHiJ.mount: Deactivated successfully. Feb 2 08:13:48 np0005604725 podman[106497]: 2026-02-02 08:13:48.312616316 +0000 UTC m=+0.061885125 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-iscsid, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, vendor=Red Hat, Inc., com.redhat.component=openstack-iscsid-container, io.openshift.expose-services=, container_name=iscsid, vcs-type=git, io.buildah.version=1.41.5, config_id=tripleo_step3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, architecture=x86_64, distribution-scope=public, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:43Z, build-date=2026-01-12T22:34:43Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 iscsid, maintainer=OpenStack TripleO Team) Feb 2 08:13:48 np0005604725 podman[106497]: 2026-02-02 08:13:48.320374588 +0000 UTC m=+0.069643437 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, batch=17.1_20260112.1, io.buildah.version=1.41.5, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:34:43Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-iscsid, release=1766032510, summary=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_step3, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=iscsid, build-date=2026-01-12T22:34:43Z, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, managed_by=tripleo_ansible, com.redhat.component=openstack-iscsid-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 iscsid, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13) Feb 2 08:13:48 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:13:48 np0005604725 systemd[1]: tmp-crun.WWtumN.mount: Deactivated successfully. Feb 2 08:13:48 np0005604725 podman[106495]: 2026-02-02 08:13:48.364400174 +0000 UTC m=+0.118356410 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, summary=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., vcs-type=git, vcs-ref=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, build-date=2026-01-12T22:33:53Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.component=openstack-keystone-container, org.opencontainers.image.created=2026-01-12T22:33:53Z, version=17.1.13, batch=17.1_20260112.1, io.buildah.version=1.41.5, url=https://www.redhat.com, io.openshift.expose-services=, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step3) Feb 2 08:13:48 np0005604725 podman[106496]: 2026-02-02 08:13:48.441186885 +0000 UTC m=+0.187004456 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, vcs-ref=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:33:53Z, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 keystone, build-date=2026-01-12T22:33:53Z, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, summary=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, io.openshift.expose-services=, container_name=keystone_cron, com.redhat.component=openstack-keystone-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, architecture=x86_64, release=1766032510, managed_by=tripleo_ansible, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone) Feb 2 08:13:48 np0005604725 podman[106496]: 2026-02-02 08:13:48.472624567 +0000 UTC m=+0.218442148 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, release=1766032510, description=Red Hat OpenStack Platform 17.1 keystone, build-date=2026-01-12T22:33:53Z, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:33:53Z, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone_cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, io.openshift.expose-services=, io.buildah.version=1.41.5, config_id=tripleo_step3, name=rhosp-rhel9/openstack-keystone, com.redhat.component=openstack-keystone-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, vcs-type=git, version=17.1.13) Feb 2 08:13:48 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:13:48 np0005604725 podman[106495]: 2026-02-02 08:13:48.493322693 +0000 UTC m=+0.247278929 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, container_name=keystone, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step3, io.openshift.expose-services=, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, distribution-scope=public, release=1766032510, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:33:53Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, managed_by=tripleo_ansible, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:33:53Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, version=17.1.13, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-keystone, description=Red Hat OpenStack Platform 17.1 keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:13:48 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:13:48 np0005604725 ansible-async_wrapper.py[105701]: 105702 still running (3595) Feb 2 08:13:49 np0005604725 systemd[1]: tmp-crun.iEW2l4.mount: Deactivated successfully. Feb 2 08:13:49 np0005604725 python3[106596]: ansible-ansible.legacy.async_status Invoked with jid=525648751318.105690 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:13:52 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:13:52 np0005604725 podman[106726]: 2026-02-02 08:13:52.207075551 +0000 UTC m=+0.095857896 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, distribution-scope=public, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step2, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, io.buildah.version=1.41.5, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:18Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., tcib_managed=true, batch=17.1_20260112.1, com.redhat.component=openstack-mariadb-container, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, container_name=clustercheck) Feb 2 08:13:52 np0005604725 podman[106726]: 2026-02-02 08:13:52.25725757 +0000 UTC m=+0.146039935 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, managed_by=tripleo_ansible, config_id=tripleo_step2, name=rhosp-rhel9/openstack-mariadb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-mariadb-container, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-type=git, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, container_name=clustercheck, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, tcib_managed=true, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, release=1766032510, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:18Z) Feb 2 08:13:52 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:13:52 np0005604725 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 2 08:13:52 np0005604725 systemd[1]: Starting man-db-cache-update.service... Feb 2 08:13:52 np0005604725 systemd[1]: Reloading. Feb 2 08:13:52 np0005604725 systemd-rc-local-generator[106830]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:13:52 np0005604725 systemd-sysv-generator[106836]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:13:52 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:13:52 np0005604725 systemd[1]: Queuing reload/restart jobs for marked units… Feb 2 08:13:52 np0005604725 systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 2 08:13:52 np0005604725 systemd[1]: Finished man-db-cache-update.service. Feb 2 08:13:52 np0005604725 systemd[1]: run-r5d1f5b99ba6d4e6e9673b51d6ec82538.service: Deactivated successfully. Feb 2 08:13:53 np0005604725 puppet-user[105719]: Notice: /Stage[main]/Snmp/Package[snmpd]/ensure: created Feb 2 08:13:53 np0005604725 puppet-user[105719]: Notice: /Stage[main]/Snmp/File[snmpd.conf]/content: content changed '{sha256}2b743f970e80e2150759bfc66f2d8d0fbd8b31624f79e2991248d1a5ac57494e' to '{sha256}958b61f96bf9de559db0bb2030b9b22eeac94a666971f51405045538216c0b2e' Feb 2 08:13:53 np0005604725 puppet-user[105719]: Notice: /Stage[main]/Snmp/File[snmpd.sysconfig]/content: content changed '{sha256}b63afb2dee7419b6834471f88581d981c8ae5c8b27b9d329ba67a02f3ddd8221' to '{sha256}3917ee8bbc680ad50d77186ad4a1d2705c2025c32fc32f823abbda7f2328dfbd' Feb 2 08:13:53 np0005604725 ansible-async_wrapper.py[105701]: 105702 still running (3590) Feb 2 08:13:53 np0005604725 puppet-user[105719]: Notice: /Stage[main]/Snmp/File[snmptrapd.conf]/content: content changed '{sha256}2e1ca894d609ef337b6243909bf5623c87fd5df98ecbd00c7d4c12cf12f03c4e' to '{sha256}3ecf18da1ba84ea3932607f2b903ee6a038b6f9ac4e1e371e48f3ef61c5052ea' Feb 2 08:13:53 np0005604725 puppet-user[105719]: Notice: /Stage[main]/Snmp/File[snmptrapd.sysconfig]/content: content changed '{sha256}86ee5797ad10cb1ea0f631e9dfa6ae278ecf4f4d16f4c80f831cdde45601b23c' to '{sha256}2244553364afcca151958f8e2003e4c182f5e2ecfbe55405cec73fd818581e97' Feb 2 08:13:54 np0005604725 puppet-user[105719]: Notice: /Stage[main]/Snmp/Service[snmptrapd]: Triggered 'refresh' from 2 events Feb 2 08:13:58 np0005604725 ansible-async_wrapper.py[105701]: 105702 still running (3585) Feb 2 08:13:59 np0005604725 puppet-user[105719]: Notice: /Stage[main]/Tripleo::Profile::Base::Snmp/Snmp::Snmpv3_user[ro_snmp_user]/Exec[create-snmpv3-user-ro_snmp_user]/returns: executed successfully Feb 2 08:13:59 np0005604725 systemd[1]: Reloading. Feb 2 08:13:59 np0005604725 systemd-rc-local-generator[107517]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:13:59 np0005604725 systemd-sysv-generator[107521]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:13:59 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:13:59 np0005604725 systemd[1]: Starting Simple Network Management Protocol (SNMP) Daemon.... Feb 2 08:13:59 np0005604725 snmpd[107533]: Can't find directory of RPM packages Feb 2 08:13:59 np0005604725 snmpd[107533]: Duplicate IPv4 address detected, some interfaces may not be visible in IP-MIB Feb 2 08:13:59 np0005604725 systemd[1]: Started Simple Network Management Protocol (SNMP) Daemon.. Feb 2 08:13:59 np0005604725 systemd[1]: Reloading. Feb 2 08:13:59 np0005604725 systemd-sysv-generator[107590]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:13:59 np0005604725 systemd-rc-local-generator[107586]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:13:59 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:14:00 np0005604725 systemd[1]: Reloading. Feb 2 08:14:00 np0005604725 systemd-sysv-generator[107693]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:14:00 np0005604725 systemd-rc-local-generator[107690]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:14:00 np0005604725 python3[107643]: ansible-ansible.legacy.async_status Invoked with jid=525648751318.105690 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:14:00 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:14:00 np0005604725 puppet-user[105719]: Notice: /Stage[main]/Snmp/Service[snmpd]/ensure: ensure changed 'stopped' to 'running' Feb 2 08:14:00 np0005604725 puppet-user[105719]: Notice: Applied catalog in 14.56 seconds Feb 2 08:14:00 np0005604725 puppet-user[105719]: Application: Feb 2 08:14:00 np0005604725 puppet-user[105719]: Initial environment: production Feb 2 08:14:00 np0005604725 puppet-user[105719]: Converged environment: production Feb 2 08:14:00 np0005604725 puppet-user[105719]: Run mode: user Feb 2 08:14:00 np0005604725 puppet-user[105719]: Changes: Feb 2 08:14:00 np0005604725 puppet-user[105719]: Total: 8 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Events: Feb 2 08:14:00 np0005604725 puppet-user[105719]: Success: 8 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Total: 8 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Resources: Feb 2 08:14:00 np0005604725 puppet-user[105719]: Restarted: 1 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Changed: 8 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Out of sync: 8 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Total: 32 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Time: Feb 2 08:14:00 np0005604725 puppet-user[105719]: Filebucket: 0.00 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Schedule: 0.00 Feb 2 08:14:00 np0005604725 puppet-user[105719]: File line: 0.00 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Augeas: 0.01 Feb 2 08:14:00 np0005604725 puppet-user[105719]: User: 0.01 Feb 2 08:14:00 np0005604725 puppet-user[105719]: File: 0.07 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Config retrieval: 0.58 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Service: 1.42 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Transaction evaluation: 14.55 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Catalog application: 14.56 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Last run: 1770020040 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Exec: 6.19 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Package: 6.64 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Total: 14.56 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Version: Feb 2 08:14:00 np0005604725 puppet-user[105719]: Config: 1770020025 Feb 2 08:14:00 np0005604725 puppet-user[105719]: Puppet: 7.10.0 Feb 2 08:14:00 np0005604725 ansible-async_wrapper.py[105702]: Module complete (105702) Feb 2 08:14:01 np0005604725 podman[107748]: 2026-02-02 08:14:01.939201764 +0000 UTC m=+0.072615039 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-mariadb-container, build-date=2026-01-12T22:10:18Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, name=rhosp-rhel9/openstack-mariadb, tcib_managed=true, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, version=17.1.13, url=https://www.redhat.com, io.openshift.expose-services=, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:10:18Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, batch=17.1_20260112.1, release=1766032510) Feb 2 08:14:01 np0005604725 podman[107748]: 2026-02-02 08:14:01.972770869 +0000 UTC m=+0.106184114 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-mariadb-container, version=17.1.13, distribution-scope=public, name=rhosp-rhel9/openstack-mariadb, vcs-type=git, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, url=https://www.redhat.com) Feb 2 08:14:02 np0005604725 podman[107786]: 2026-02-02 08:14:02.382459059 +0000 UTC m=+0.072817785 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, architecture=x86_64, release=1766032510, tcib_managed=true, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-redis, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:16Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 redis, org.opencontainers.image.created=2026-01-12T22:10:16Z, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc.) Feb 2 08:14:02 np0005604725 podman[107786]: 2026-02-02 08:14:02.416123087 +0000 UTC m=+0.106481833 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:16Z, version=17.1.13, io.openshift.expose-services=, release=1766032510, com.redhat.component=openstack-redis-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, name=rhosp-rhel9/openstack-redis, tcib_managed=true, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 redis, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, architecture=x86_64, build-date=2026-01-12T22:10:16Z) Feb 2 08:14:02 np0005604725 podman[107822]: 2026-02-02 08:14:02.50725217 +0000 UTC m=+0.128003280 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, com.redhat.component=openstack-haproxy-container, vcs-type=git, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, architecture=x86_64, build-date=2026-01-12T22:10:12Z, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:12Z, url=https://www.redhat.com, name=rhosp-rhel9/openstack-haproxy, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, description=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 haproxy) Feb 2 08:14:02 np0005604725 podman[107822]: 2026-02-02 08:14:02.544677232 +0000 UTC m=+0.165428362 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, org.opencontainers.image.created=2026-01-12T22:10:12Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, architecture=x86_64, io.buildah.version=1.41.5, tcib_managed=true, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-haproxy, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 haproxy, maintainer=OpenStack TripleO Team, vcs-type=git, com.redhat.component=openstack-haproxy-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 haproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, build-date=2026-01-12T22:10:12Z, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:14:02 np0005604725 podman[107784]: 2026-02-02 08:14:02.555036649 +0000 UTC m=+0.246887760 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, io.openshift.expose-services=, com.redhat.component=openstack-rabbitmq-container, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:14Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, vendor=Red Hat, Inc., version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, architecture=x86_64, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, build-date=2026-01-12T22:10:14Z, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp-rhel9/openstack-rabbitmq) Feb 2 08:14:02 np0005604725 podman[107784]: 2026-02-02 08:14:02.587997245 +0000 UTC m=+0.279848336 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:14Z, com.redhat.component=openstack-rabbitmq-container, description=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-type=git, maintainer=OpenStack TripleO Team, version=17.1.13, io.openshift.expose-services=, io.buildah.version=1.41.5, architecture=x86_64, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20260112.1, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:14Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-rabbitmq, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:14:02 np0005604725 systemd[1]: tmp-crun.mXLZZX.mount: Deactivated successfully. Feb 2 08:14:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:14:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:14:03 np0005604725 podman[107897]: 2026-02-02 08:14:03.337336048 +0000 UTC m=+0.080619623 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 ovn-northd, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, version=17.1.13, container_name=ovn_cluster_northd, io.openshift.expose-services=, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, io.buildah.version=1.41.5, build-date=2026-01-12T22:34:06Z, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, release=1766032510, config_id=ovn_cluster_northd, maintainer=OpenStack TripleO Team, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, com.redhat.component=openstack-ovn-northd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, name=rhosp-rhel9/openstack-ovn-northd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, org.opencontainers.image.created=2026-01-12T22:34:06Z, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 ovn-northd) Feb 2 08:14:03 np0005604725 podman[107897]: 2026-02-02 08:14:03.347636483 +0000 UTC m=+0.090920048 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, summary=Red Hat OpenStack Platform 17.1 ovn-northd, tcib_managed=true, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:34:06Z, container_name=ovn_cluster_northd, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, name=rhosp-rhel9/openstack-ovn-northd, build-date=2026-01-12T22:34:06Z, architecture=x86_64, version=17.1.13, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, url=https://www.redhat.com, io.openshift.expose-services=, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_id=ovn_cluster_northd, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, com.redhat.component=openstack-ovn-northd-container, description=Red Hat OpenStack Platform 17.1 ovn-northd, vcs-type=git) Feb 2 08:14:03 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:14:03 np0005604725 systemd[1]: tmp-crun.vXPzcD.mount: Deactivated successfully. Feb 2 08:14:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:14:03 np0005604725 podman[107896]: 2026-02-02 08:14:03.41044166 +0000 UTC m=+0.156233452 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, url=https://www.redhat.com, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=memcached, release=1766032510, config_id=tripleo_step1, name=rhosp-rhel9/openstack-memcached, summary=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, description=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:12:26Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, build-date=2026-01-12T22:12:26Z) Feb 2 08:14:03 np0005604725 podman[107896]: 2026-02-02 08:14:03.431578196 +0000 UTC m=+0.177369928 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, com.redhat.component=openstack-memcached-container, release=1766032510, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, name=rhosp-rhel9/openstack-memcached, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step1, summary=Red Hat OpenStack Platform 17.1 memcached, description=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, tcib_managed=true, vcs-type=git, container_name=memcached, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:12:26Z, vendor=Red Hat, Inc., io.openshift.expose-services=, build-date=2026-01-12T22:12:26Z, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, url=https://www.redhat.com) Feb 2 08:14:03 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:14:03 np0005604725 podman[107937]: 2026-02-02 08:14:03.482104069 +0000 UTC m=+0.067927146 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp-rhel9/openstack-qdrouterd, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-qdrouterd-container, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:14Z, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step1, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, release=1766032510, container_name=metrics_qdr, batch=17.1_20260112.1, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:14Z, io.openshift.expose-services=, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, maintainer=OpenStack TripleO Team) Feb 2 08:14:03 np0005604725 podman[107937]: 2026-02-02 08:14:03.698189767 +0000 UTC m=+0.284012864 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, version=17.1.13, container_name=metrics_qdr, build-date=2026-01-12T22:10:14Z, com.redhat.component=openstack-qdrouterd-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, tcib_managed=true, batch=17.1_20260112.1, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.buildah.version=1.41.5) Feb 2 08:14:03 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:14:03 np0005604725 ansible-async_wrapper.py[105701]: Done in kid B. Feb 2 08:14:10 np0005604725 python3[108290]: ansible-ansible.legacy.async_status Invoked with jid=525648751318.105690 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:14:11 np0005604725 python3[108371]: ansible-file Invoked with path=/var/lib/container-puppet/puppetlabs state=directory setype=svirt_sandbox_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Feb 2 08:14:11 np0005604725 python3[108402]: ansible-stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:11 np0005604725 python3[108469]: ansible-ansible.legacy.stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:14:12 np0005604725 python3[108540]: ansible-ansible.legacy.file Invoked with setype=svirt_sandbox_file_t selevel=s0 dest=/var/lib/container-puppet/puppetlabs/facter.conf _original_basename=tmpbnqs33pu recurse=False state=file path=/var/lib/container-puppet/puppetlabs/facter.conf force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Feb 2 08:14:12 np0005604725 python3[108585]: ansible-file Invoked with path=/opt/puppetlabs/facter state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:13 np0005604725 python3[108765]: ansible-ansible.posix.synchronize Invoked with src=/opt/puppetlabs/ dest=/var/lib/container-puppet/puppetlabs/ _local_rsync_path=rsync _local_rsync_password=NOT_LOGGING_PARAMETER rsync_path=None delete=False _substitute_controller=False archive=True checksum=False compress=True existing_only=False dirs=False copy_links=False set_remote_user=True rsync_timeout=0 rsync_opts=[] ssh_connection_multiplexing=False partial=False verify_host=False mode=push dest_port=None private_key=None recursive=None links=None perms=None times=None owner=None group=None ssh_args=None link_dest=None Feb 2 08:14:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:14:13 np0005604725 podman[108799]: 2026-02-02 08:14:13.902653127 +0000 UTC m=+0.057572448 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, config_id=tripleo_step3, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, name=rhosp-rhel9/openstack-collectd, vendor=Red Hat, Inc., config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, release=1766032510, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:15Z, architecture=x86_64, container_name=collectd, maintainer=OpenStack TripleO Team, distribution-scope=public, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 collectd, url=https://www.redhat.com, build-date=2026-01-12T22:10:15Z, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, com.redhat.component=openstack-collectd-container, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd) Feb 2 08:14:13 np0005604725 podman[108799]: 2026-02-02 08:14:13.933877881 +0000 UTC m=+0.088797192 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, batch=17.1_20260112.1, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, summary=Red Hat OpenStack Platform 17.1 collectd, name=rhosp-rhel9/openstack-collectd, com.redhat.component=openstack-collectd-container, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, org.opencontainers.image.created=2026-01-12T22:10:15Z, url=https://www.redhat.com, distribution-scope=public, managed_by=tripleo_ansible, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 collectd, vcs-type=git, architecture=x86_64, container_name=collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:15Z, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:14:13 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:14:13 np0005604725 python3[108798]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:14 np0005604725 python3[108917]: ansible-stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:15 np0005604725 python3[108975]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-container-shutdown follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:14:15 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:14:15 np0005604725 systemd[1]: tmp-crun.78lqtZ.mount: Deactivated successfully. Feb 2 08:14:15 np0005604725 podman[109002]: 2026-02-02 08:14:15.469822903 +0000 UTC m=+0.068838163 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, com.redhat.component=openstack-horizon-container, config_id=tripleo_step3, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, summary=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=horizon, vendor=Red Hat, Inc., distribution-scope=public, io.buildah.version=1.41.5, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:41Z, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-horizon, build-date=2026-01-12T22:34:41Z) Feb 2 08:14:15 np0005604725 python3[109001]: ansible-ansible.legacy.file Invoked with mode=0700 owner=root group=root dest=/usr/libexec/tripleo-container-shutdown _original_basename=tripleo-container-shutdown recurse=False state=file path=/usr/libexec/tripleo-container-shutdown force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:15 np0005604725 podman[109002]: 2026-02-02 08:14:15.526911906 +0000 UTC m=+0.125927126 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:41Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, config_id=tripleo_step3, managed_by=tripleo_ansible, architecture=x86_64, batch=17.1_20260112.1, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, name=rhosp-rhel9/openstack-horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.buildah.version=1.41.5, com.redhat.component=openstack-horizon-container, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 horizon) Feb 2 08:14:15 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:14:15 np0005604725 python3[109098]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-start-podman-container follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:14:16 np0005604725 python3[109124]: ansible-ansible.legacy.file Invoked with mode=0700 owner=root group=root dest=/usr/libexec/tripleo-start-podman-container _original_basename=tripleo-start-podman-container recurse=False state=file path=/usr/libexec/tripleo-start-podman-container force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:16 np0005604725 python3[109235]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/tripleo-container-shutdown.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:14:17 np0005604725 python3[109261]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system/tripleo-container-shutdown.service _original_basename=tripleo-container-shutdown-service recurse=False state=file path=/usr/lib/systemd/system/tripleo-container-shutdown.service force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:17 np0005604725 python3[109339]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:14:17 np0005604725 python3[109357]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset _original_basename=91-tripleo-container-shutdown-preset recurse=False state=file path=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:18 np0005604725 python3[109402]: ansible-systemd Invoked with name=tripleo-container-shutdown state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:14:18 np0005604725 systemd[1]: Reloading. Feb 2 08:14:18 np0005604725 systemd-rc-local-generator[109440]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:14:18 np0005604725 systemd-sysv-generator[109444]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:14:18 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:14:18 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:14:18 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:14:18 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:14:18 np0005604725 podman[109451]: 2026-02-02 08:14:18.591950932 +0000 UTC m=+0.092633350 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, com.redhat.component=openstack-iscsid-container, vendor=Red Hat, Inc., io.buildah.version=1.41.5, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.expose-services=, release=1766032510, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, url=https://www.redhat.com, architecture=x86_64, build-date=2026-01-12T22:34:43Z, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, container_name=iscsid, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, version=17.1.13, config_id=tripleo_step3, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:14:18 np0005604725 podman[109468]: 2026-02-02 08:14:18.619098341 +0000 UTC m=+0.073539926 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.openshift.expose-services=, com.redhat.component=openstack-keystone-container, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-keystone, summary=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, version=17.1.13, vcs-type=git, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, architecture=x86_64, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, container_name=keystone, build-date=2026-01-12T22:33:53Z, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:33:53Z) Feb 2 08:14:18 np0005604725 podman[109468]: 2026-02-02 08:14:18.695801283 +0000 UTC m=+0.150242888 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vcs-type=git, io.buildah.version=1.41.5, vendor=Red Hat, Inc., config_id=tripleo_step3, build-date=2026-01-12T22:33:53Z, org.opencontainers.image.created=2026-01-12T22:33:53Z, com.redhat.component=openstack-keystone-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-keystone, batch=17.1_20260112.1, container_name=keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:14:18 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:14:18 np0005604725 podman[109450]: 2026-02-02 08:14:18.714247217 +0000 UTC m=+0.213625085 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.openshift.expose-services=, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=keystone_cron, release=1766032510, vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, description=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, config_id=tripleo_step3, build-date=2026-01-12T22:33:53Z, org.opencontainers.image.created=2026-01-12T22:33:53Z, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, architecture=x86_64, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-keystone) Feb 2 08:14:18 np0005604725 podman[109450]: 2026-02-02 08:14:18.724018974 +0000 UTC m=+0.223396882 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, container_name=keystone_cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:33:53Z, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., vcs-type=git, architecture=x86_64, tcib_managed=true, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, com.redhat.component=openstack-keystone-container, distribution-scope=public, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, config_id=tripleo_step3) Feb 2 08:14:18 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:14:18 np0005604725 podman[109451]: 2026-02-02 08:14:18.778671054 +0000 UTC m=+0.279353532 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, summary=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, build-date=2026-01-12T22:34:43Z, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, container_name=iscsid, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, name=rhosp-rhel9/openstack-iscsid, managed_by=tripleo_ansible, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, io.buildah.version=1.41.5, distribution-scope=public, com.redhat.component=openstack-iscsid-container, version=17.1.13, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.openshift.expose-services=, url=https://www.redhat.com, release=1766032510, config_id=tripleo_step3, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:14:18 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:14:19 np0005604725 python3[109570]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/netns-placeholder.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:14:19 np0005604725 python3[109596]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system/netns-placeholder.service _original_basename=netns-placeholder-service recurse=False state=file path=/usr/lib/systemd/system/netns-placeholder.service force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:19 np0005604725 python3[109676]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-netns-placeholder.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:14:20 np0005604725 python3[109694]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system-preset/91-netns-placeholder.preset _original_basename=91-netns-placeholder-preset recurse=False state=file path=/usr/lib/systemd/system-preset/91-netns-placeholder.preset force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:20 np0005604725 python3[109793]: ansible-systemd Invoked with name=netns-placeholder state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:14:20 np0005604725 systemd[1]: Reloading. Feb 2 08:14:20 np0005604725 systemd-rc-local-generator[109823]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:14:20 np0005604725 systemd-sysv-generator[109827]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:14:20 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:14:21 np0005604725 systemd[1]: Starting Create netns directory... Feb 2 08:14:21 np0005604725 systemd[1]: run-netns-placeholder.mount: Deactivated successfully. Feb 2 08:14:21 np0005604725 systemd[1]: netns-placeholder.service: Deactivated successfully. Feb 2 08:14:21 np0005604725 systemd[1]: Finished Create netns directory. Feb 2 08:14:21 np0005604725 python3[109875]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Feb 2 08:14:23 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:14:23 np0005604725 podman[110077]: 2026-02-02 08:14:23.314389149 +0000 UTC m=+0.059819098 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, batch=17.1_20260112.1, config_id=tripleo_step2, managed_by=tripleo_ansible, architecture=x86_64, tcib_managed=true, com.redhat.component=openstack-mariadb-container, container_name=clustercheck, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-mariadb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, summary=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:18Z, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.buildah.version=1.41.5) Feb 2 08:14:23 np0005604725 podman[110077]: 2026-02-02 08:14:23.348137499 +0000 UTC m=+0.093567438 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, architecture=x86_64, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:18Z, url=https://www.redhat.com, name=rhosp-rhel9/openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, config_id=tripleo_step2, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, container_name=clustercheck, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, vendor=Red Hat, Inc., com.redhat.component=openstack-mariadb-container, build-date=2026-01-12T22:10:18Z, io.openshift.expose-services=, io.buildah.version=1.41.5, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible) Feb 2 08:14:23 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:14:24 np0005604725 python3[110147]: ansible-tripleo_container_manage Invoked with config_id=tripleo_step4 config_dir=/var/lib/tripleo-config/container-startup-config/step_4 config_patterns=*.json config_overrides={} concurrency=5 log_base_path=/var/log/containers/stdouts debug=False Feb 2 08:14:24 np0005604725 podman[110331]: 2026-02-02 08:14:24.408921042 +0000 UTC m=+0.096647913 container create bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-cinder-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, architecture=x86_64, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, vcs-type=git, tcib_managed=true, io.buildah.version=1.41.5, url=https://www.redhat.com, config_id=tripleo_step4, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-cinder-api, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, container_name=cinder_api_cron, version=17.1.13, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, description=Red Hat OpenStack Platform 17.1 cinder-api, build-date=2026-01-12T22:58:44Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e) Feb 2 08:14:24 np0005604725 podman[110336]: 2026-02-02 08:14:24.43079485 +0000 UTC m=+0.114100535 container create ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, build-date=2026-01-12T23:07:25Z, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, url=https://www.redhat.com, release=1766032510, org.opencontainers.image.created=2026-01-12T23:07:25Z, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, vendor=Red Hat, Inc., com.redhat.component=openstack-ceilometer-notification-container, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=ceilometer_agent_notification, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, name=rhosp-rhel9/openstack-ceilometer-notification, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}) Feb 2 08:14:24 np0005604725 systemd[1]: Started libpod-conmon-bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.scope. Feb 2 08:14:24 np0005604725 podman[110331]: 2026-02-02 08:14:24.355645115 +0000 UTC m=+0.043372006 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Feb 2 08:14:24 np0005604725 podman[110336]: 2026-02-02 08:14:24.357868043 +0000 UTC m=+0.041173748 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 Feb 2 08:14:24 np0005604725 podman[110378]: 2026-02-02 08:14:24.459231618 +0000 UTC m=+0.108972108 container create 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., container_name=ceilometer_agent_central, name=rhosp-rhel9/openstack-ceilometer-central, architecture=x86_64, release=1766032510, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, description=Red Hat OpenStack Platform 17.1 ceilometer-central, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, tcib_managed=true, managed_by=tripleo_ansible, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, config_id=tripleo_step4, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, batch=17.1_20260112.1, build-date=2026-01-12T23:07:24Z, org.opencontainers.image.created=2026-01-12T23:07:24Z, com.redhat.component=openstack-ceilometer-central-container, url=https://www.redhat.com, vcs-type=git, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13) Feb 2 08:14:24 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:24 np0005604725 systemd[1]: Started libpod-conmon-ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.scope. Feb 2 08:14:24 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/439fe7528963472757df1ca05ff86944c97e5083a89460c9ecb7861ee3f5e66c/merged/var/log/cinder supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:24 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/439fe7528963472757df1ca05ff86944c97e5083a89460c9ecb7861ee3f5e66c/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:24 np0005604725 podman[110342]: 2026-02-02 08:14:24.368622091 +0000 UTC m=+0.046195011 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 Feb 2 08:14:24 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:24 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e29a6c1e66e3f7de64f44f264cdb6f188e00b4367a3ebe159ae6fa4c5c5842d7/merged/var/log/ceilometer supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:24 np0005604725 podman[110378]: 2026-02-02 08:14:24.392244083 +0000 UTC m=+0.041984613 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Feb 2 08:14:24 np0005604725 podman[110382]: 2026-02-02 08:14:24.399592827 +0000 UTC m=+0.047199532 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Feb 2 08:14:24 np0005604725 systemd[1]: Started libpod-conmon-064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.scope. Feb 2 08:14:24 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:14:24 np0005604725 podman[110331]: 2026-02-02 08:14:24.506065728 +0000 UTC m=+0.193792599 container init bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:58:44Z, summary=Red Hat OpenStack Platform 17.1 cinder-api, build-date=2026-01-12T22:58:44Z, vendor=Red Hat, Inc., org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, tcib_managed=true, config_id=tripleo_step4, batch=17.1_20260112.1, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, name=rhosp-rhel9/openstack-cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, release=1766032510, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 cinder-api, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, version=17.1.13, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-cinder-api-container, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, container_name=cinder_api_cron, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:14:24 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:24 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:14:24 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a0215ad0e18ace1bc8b3828049755c5b0f9d387e2e9f19eb98bcfc9a0499c675/merged/var/log/ceilometer supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:24 np0005604725 podman[110342]: 2026-02-02 08:14:24.523633425 +0000 UTC m=+0.201206345 container create 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, batch=17.1_20260112.1, com.redhat.component=openstack-cinder-scheduler-container, build-date=2026-01-12T22:58:47Z, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:58:47Z, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-scheduler, io.buildah.version=1.41.5, container_name=cinder_scheduler, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, release=1766032510, distribution-scope=public, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, architecture=x86_64, version=17.1.13, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, config_id=tripleo_step4) Feb 2 08:14:24 np0005604725 podman[110336]: 2026-02-02 08:14:24.526032088 +0000 UTC m=+0.209337793 container init ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, config_id=tripleo_step4, distribution-scope=public, com.redhat.component=openstack-ceilometer-notification-container, architecture=x86_64, container_name=ceilometer_agent_notification, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:07:25Z, tcib_managed=true, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, build-date=2026-01-12T23:07:25Z, vendor=Red Hat, Inc., vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, name=rhosp-rhel9/openstack-ceilometer-notification, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, vcs-type=git, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, url=https://www.redhat.com, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=) Feb 2 08:14:24 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:14:24 np0005604725 podman[110331]: 2026-02-02 08:14:24.532666021 +0000 UTC m=+0.220392892 container start bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, build-date=2026-01-12T22:58:44Z, maintainer=OpenStack TripleO Team, architecture=x86_64, release=1766032510, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-api, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, tcib_managed=true, container_name=cinder_api_cron, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, summary=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, batch=17.1_20260112.1, com.redhat.component=openstack-cinder-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, vendor=Red Hat, Inc., io.openshift.expose-services=, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, vcs-type=git, url=https://www.redhat.com) Feb 2 08:14:24 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name cinder_api_cron --conmon-pidfile /run/cinder_api_cron.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=bb6b8a5d9470c5e09d1e4beb6638faa7 --healthcheck-command /usr/share/openstack-tripleo-common/healthcheck/cron cinder --label config_id=tripleo_step4 --label container_name=cinder_api_cron --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/cinder_api_cron.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro --volume /var/log/containers/cinder:/var/log/cinder:z --volume /var/log/containers/httpd/cinder-api:/var/log/httpd:z registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Feb 2 08:14:24 np0005604725 podman[110382]: 2026-02-02 08:14:24.545470232 +0000 UTC m=+0.193076927 container create 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, container_name=cinder_api, config_id=tripleo_step4, vcs-type=git, name=rhosp-rhel9/openstack-cinder-api, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, architecture=x86_64, io.openshift.expose-services=, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, build-date=2026-01-12T22:58:44Z, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.component=openstack-cinder-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 cinder-api, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., release=1766032510, distribution-scope=public, url=https://www.redhat.com) Feb 2 08:14:24 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:14:24 np0005604725 podman[110336]: 2026-02-02 08:14:24.573383863 +0000 UTC m=+0.256689548 container start ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, version=17.1.13, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=ceilometer_agent_notification, config_id=tripleo_step4, build-date=2026-01-12T23:07:25Z, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, url=https://www.redhat.com, com.redhat.component=openstack-ceilometer-notification-container, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, batch=17.1_20260112.1, release=1766032510, distribution-scope=public, org.opencontainers.image.created=2026-01-12T23:07:25Z, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, name=rhosp-rhel9/openstack-ceilometer-notification, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, vendor=Red Hat, Inc., io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, maintainer=OpenStack TripleO Team) Feb 2 08:14:24 np0005604725 systemd[1]: Started libpod-conmon-0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.scope. Feb 2 08:14:24 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:14:24 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name ceilometer_agent_notification --conmon-pidfile /run/ceilometer_agent_notification.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=8edb2eeeece67be8549d65057558ff12 --healthcheck-command /openstack/healthcheck 5672 --label config_id=tripleo_step4 --label container_name=ceilometer_agent_notification --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/ceilometer_agent_notification.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro --volume /var/log/containers/ceilometer:/var/log/ceilometer:z registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 Feb 2 08:14:24 np0005604725 podman[110378]: 2026-02-02 08:14:24.579705937 +0000 UTC m=+0.229446427 container init 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, batch=17.1_20260112.1, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 ceilometer-central, distribution-scope=public, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, build-date=2026-01-12T23:07:24Z, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, version=17.1.13, com.redhat.component=openstack-ceilometer-central-container, release=1766032510, container_name=ceilometer_agent_central, org.opencontainers.image.created=2026-01-12T23:07:24Z, architecture=x86_64, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-ceilometer-central, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, io.openshift.expose-services=, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06) Feb 2 08:14:24 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:24 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/53043881fee82fe9318d3bdfba766c376b7492eaaece7002b8ecf69bcf53c6c3/merged/var/log/cinder supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:24 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/53043881fee82fe9318d3bdfba766c376b7492eaaece7002b8ecf69bcf53c6c3/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:24 np0005604725 systemd[1]: Started libpod-conmon-1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.scope. Feb 2 08:14:24 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:14:24 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:24 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/03972a85dca763c0c5fbc12c3e0d6ecc727a365e384252597f61a2e14dd91966/merged/var/log/cinder supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:24 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:14:24 np0005604725 podman[110382]: 2026-02-02 08:14:24.643617289 +0000 UTC m=+0.291224004 container init 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, vendor=Red Hat, Inc., io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, config_id=tripleo_step4, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, distribution-scope=public, architecture=x86_64, url=https://www.redhat.com, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, org.opencontainers.image.created=2026-01-12T22:58:44Z, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 cinder-api, container_name=cinder_api, release=1766032510, com.redhat.component=openstack-cinder-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, build-date=2026-01-12T22:58:44Z) Feb 2 08:14:24 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:14:24 np0005604725 podman[110382]: 2026-02-02 08:14:24.677032469 +0000 UTC m=+0.324639164 container start 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, build-date=2026-01-12T22:58:44Z, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, com.redhat.component=openstack-cinder-api-container, org.opencontainers.image.created=2026-01-12T22:58:44Z, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=cinder_api, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 cinder-api, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 cinder-api, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, url=https://www.redhat.com, architecture=x86_64, config_id=tripleo_step4, io.openshift.expose-services=, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, version=17.1.13) Feb 2 08:14:24 np0005604725 podman[110378]: 2026-02-02 08:14:24.679517975 +0000 UTC m=+0.329258465 container start 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, architecture=x86_64, version=17.1.13, com.redhat.component=openstack-ceilometer-central-container, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=ceilometer_agent_central, build-date=2026-01-12T23:07:24Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-ceilometer-central, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 ceilometer-central, batch=17.1_20260112.1, vendor=Red Hat, Inc., io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, config_id=tripleo_step4, vcs-type=git, org.opencontainers.image.created=2026-01-12T23:07:24Z, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, url=https://www.redhat.com) Feb 2 08:14:24 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name cinder_api --conmon-pidfile /run/cinder_api.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=bb6b8a5d9470c5e09d1e4beb6638faa7 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=cinder_api --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/cinder_api.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro --volume /var/log/containers/cinder:/var/log/cinder:z --volume /var/log/containers/httpd/cinder-api:/var/log/httpd:z --volume /etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro --volume /etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Feb 2 08:14:24 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name ceilometer_agent_central --conmon-pidfile /run/ceilometer_agent_central.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=8edb2eeeece67be8549d65057558ff12 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=ceilometer_agent_central --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/ceilometer_agent_central.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro --volume /var/log/containers/ceilometer:/var/log/ceilometer:z registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Feb 2 08:14:24 np0005604725 podman[110495]: 2026-02-02 08:14:24.68949079 +0000 UTC m=+0.151449786 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=starting, batch=17.1_20260112.1, build-date=2026-01-12T22:58:44Z, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, config_id=tripleo_step4, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 cinder-api, container_name=cinder_api_cron, io.buildah.version=1.41.5, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-cinder-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, name=rhosp-rhel9/openstack-cinder-api, architecture=x86_64, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true) Feb 2 08:14:24 np0005604725 podman[110495]: 2026-02-02 08:14:24.773358221 +0000 UTC m=+0.235317227 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, url=https://www.redhat.com, com.redhat.component=openstack-cinder-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, config_id=tripleo_step4, io.buildah.version=1.41.5, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:58:44Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, release=1766032510, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, name=rhosp-rhel9/openstack-cinder-api, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, container_name=cinder_api_cron, build-date=2026-01-12T22:58:44Z) Feb 2 08:14:24 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:14:24 np0005604725 podman[110342]: 2026-02-02 08:14:24.779389655 +0000 UTC m=+0.456962595 container init 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, com.redhat.component=openstack-cinder-scheduler-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, name=rhosp-rhel9/openstack-cinder-scheduler, release=1766032510, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.openshift.expose-services=, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, config_id=tripleo_step4, io.buildah.version=1.41.5, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, org.opencontainers.image.created=2026-01-12T22:58:47Z, vendor=Red Hat, Inc., container_name=cinder_scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, version=17.1.13, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, build-date=2026-01-12T22:58:47Z) Feb 2 08:14:24 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:14:24 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:14:24 np0005604725 podman[110342]: 2026-02-02 08:14:24.812227448 +0000 UTC m=+0.489800378 container start 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, com.redhat.component=openstack-cinder-scheduler-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, batch=17.1_20260112.1, container_name=cinder_scheduler, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.buildah.version=1.41.5, config_id=tripleo_step4, io.openshift.expose-services=, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, url=https://www.redhat.com, release=1766032510, build-date=2026-01-12T22:58:47Z, version=17.1.13, name=rhosp-rhel9/openstack-cinder-scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, architecture=x86_64, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, managed_by=tripleo_ansible, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:58:47Z, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e) Feb 2 08:14:24 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name cinder_scheduler --conmon-pidfile /run/cinder_scheduler.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=bb6b8a5d9470c5e09d1e4beb6638faa7 --healthcheck-command /openstack/healthcheck 5672 --label config_id=tripleo_step4 --label container_name=cinder_scheduler --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/cinder_scheduler.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro --volume /var/log/containers/cinder:/var/log/cinder:z --volume /var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 Feb 2 08:14:24 np0005604725 podman[110657]: 2026-02-02 08:14:24.914305014 +0000 UTC m=+0.101967254 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=starting, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, architecture=x86_64, name=rhosp-rhel9/openstack-cinder-scheduler, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:58:47Z, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vendor=Red Hat, Inc., vcs-type=git, release=1766032510, io.buildah.version=1.41.5, batch=17.1_20260112.1, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:58:47Z, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, container_name=cinder_scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, com.redhat.component=openstack-cinder-scheduler-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, config_id=tripleo_step4) Feb 2 08:14:24 np0005604725 podman[110657]: 2026-02-02 08:14:24.941091723 +0000 UTC m=+0.128753993 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:58:47Z, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, container_name=cinder_scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, version=17.1.13, tcib_managed=true, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, name=rhosp-rhel9/openstack-cinder-scheduler, config_id=tripleo_step4, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:58:47Z, com.redhat.component=openstack-cinder-scheduler-container, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, architecture=x86_64, release=1766032510) Feb 2 08:14:24 np0005604725 podman[110657]: unhealthy Feb 2 08:14:24 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:24 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Failed with result 'exit-code'. Feb 2 08:14:25 np0005604725 podman[110548]: 2026-02-02 08:14:24.952845842 +0000 UTC m=+0.320992674 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=starting, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=ceilometer_agent_central, distribution-scope=public, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-type=git, io.openshift.expose-services=, build-date=2026-01-12T23:07:24Z, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 ceilometer-central, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-ceilometer-central, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 ceilometer-central, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, com.redhat.component=openstack-ceilometer-central-container, release=1766032510, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, version=17.1.13, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T23:07:24Z, url=https://www.redhat.com, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.buildah.version=1.41.5) Feb 2 08:14:25 np0005604725 podman[110579]: 2026-02-02 08:14:25.007555942 +0000 UTC m=+0.322579352 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=starting, vcs-type=git, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:58:44Z, description=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, build-date=2026-01-12T22:58:44Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, container_name=cinder_api, io.buildah.version=1.41.5, release=1766032510, batch=17.1_20260112.1, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, name=rhosp-rhel9/openstack-cinder-api, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-cinder-api-container, config_id=tripleo_step4, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 cinder-api) Feb 2 08:14:25 np0005604725 podman[110548]: 2026-02-02 08:14:25.031639637 +0000 UTC m=+0.399786489 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, name=rhosp-rhel9/openstack-ceilometer-central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, build-date=2026-01-12T23:07:24Z, container_name=ceilometer_agent_central, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, com.redhat.component=openstack-ceilometer-central-container, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, managed_by=tripleo_ansible, io.openshift.expose-services=, vcs-type=git, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., url=https://www.redhat.com, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:07:24Z, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 ceilometer-central, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.buildah.version=1.41.5) Feb 2 08:14:25 np0005604725 podman[110548]: unhealthy Feb 2 08:14:25 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:25 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Failed with result 'exit-code'. Feb 2 08:14:25 np0005604725 podman[110516]: 2026-02-02 08:14:25.084551523 +0000 UTC m=+0.512963015 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=starting, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, config_id=tripleo_step4, vcs-type=git, release=1766032510, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T23:07:25Z, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-ceilometer-notification-container, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, version=17.1.13, build-date=2026-01-12T23:07:25Z, name=rhosp-rhel9/openstack-ceilometer-notification, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, container_name=ceilometer_agent_notification) Feb 2 08:14:25 np0005604725 podman[110516]: 2026-02-02 08:14:25.167774135 +0000 UTC m=+0.596185627 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, build-date=2026-01-12T23:07:25Z, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, tcib_managed=true, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.buildah.version=1.41.5, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=ceilometer_agent_notification, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T23:07:25Z, com.redhat.component=openstack-ceilometer-notification-container, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, maintainer=OpenStack TripleO Team, distribution-scope=public, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, managed_by=tripleo_ansible, release=1766032510, name=rhosp-rhel9/openstack-ceilometer-notification, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, config_id=tripleo_step4) Feb 2 08:14:25 np0005604725 podman[110516]: unhealthy Feb 2 08:14:25 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:25 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Failed with result 'exit-code'. Feb 2 08:14:25 np0005604725 podman[110783]: 2026-02-02 08:14:25.19939641 +0000 UTC m=+0.161456111 container create 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, org.opencontainers.image.created=2026-01-12T22:53:19Z, vcs-type=git, io.openshift.expose-services=, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, container_name=heat_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., com.redhat.component=openstack-heat-api-container, config_id=tripleo_step4, build-date=2026-01-12T22:53:19Z, distribution-scope=public, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, name=rhosp-rhel9/openstack-heat-api, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1) Feb 2 08:14:25 np0005604725 podman[110783]: 2026-02-02 08:14:25.11948514 +0000 UTC m=+0.081544871 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Feb 2 08:14:25 np0005604725 systemd[1]: Started libpod-conmon-229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.scope. Feb 2 08:14:25 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e57fe9ca52eac06bd0397f9f902fb36150ecaa392860412a470b9894e2398a64/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e57fe9ca52eac06bd0397f9f902fb36150ecaa392860412a470b9894e2398a64/merged/var/log/heat supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:14:25 np0005604725 podman[110783]: 2026-02-02 08:14:25.316577559 +0000 UTC m=+0.278637280 container init 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, release=1766032510, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, container_name=heat_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, vcs-type=git, url=https://www.redhat.com, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:53:19Z, build-date=2026-01-12T22:53:19Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, name=rhosp-rhel9/openstack-heat-api, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, managed_by=tripleo_ansible, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., vcs-ref=755001522886c265e88561b4997cab642504a845, com.redhat.component=openstack-heat-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, version=17.1.13) Feb 2 08:14:25 np0005604725 podman[110874]: 2026-02-02 08:14:25.334603429 +0000 UTC m=+0.123416030 container create 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, config_id=tripleo_step4, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:54:02Z, vendor=Red Hat, Inc., com.redhat.component=openstack-heat-api-cfn-container, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, release=1766032510, url=https://www.redhat.com, vcs-ref=755001522886c265e88561b4997cab642504a845, container_name=heat_api_cfn, architecture=x86_64, managed_by=tripleo_ansible, batch=17.1_20260112.1, io.openshift.expose-services=, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, maintainer=OpenStack TripleO Team, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-heat-api-cfn, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, distribution-scope=public, build-date=2026-01-12T22:54:02Z) Feb 2 08:14:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:14:25 np0005604725 podman[110783]: 2026-02-02 08:14:25.379559972 +0000 UTC m=+0.341619683 container start 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, vendor=Red Hat, Inc., distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, summary=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-heat-api, vcs-type=git, description=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, com.redhat.component=openstack-heat-api-container, container_name=heat_api, config_id=tripleo_step4, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:53:19Z, vcs-ref=755001522886c265e88561b4997cab642504a845, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, batch=17.1_20260112.1, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, tcib_managed=true) Feb 2 08:14:25 np0005604725 podman[110874]: 2026-02-02 08:14:25.279156625 +0000 UTC m=+0.067969246 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Feb 2 08:14:25 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name heat_api --conmon-pidfile /run/heat_api.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=9fe8b459c1d20e59bcd177e00032de6d --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=heat_api --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/heat_api.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/heat:/var/log/heat:z --volume /var/log/containers/httpd/heat-api:/var/log/httpd:z --volume /var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro --volume /etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Feb 2 08:14:25 np0005604725 systemd[1]: Started libpod-conmon-4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.scope. Feb 2 08:14:25 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/dfdbcce07e2573de4b60d679fa495455c8c106a9f5ff1e8cd9c53a9115353fc9/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/dfdbcce07e2573de4b60d679fa495455c8c106a9f5ff1e8cd9c53a9115353fc9/merged/var/log/heat supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:25 np0005604725 podman[110898]: 2026-02-02 08:14:25.444374591 +0000 UTC m=+0.175733027 container create 2944e1fda3c4b560065917f01de8012d626b1b0fd3a464ff3a022bcf97ce31aa (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=configure_cms_options, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, config_data={'command': ['/bin/bash', '-c', 'CMS_OPTS=$(hiera ovn::controller::ovn_cms_options -c /etc/puppet/hiera.yaml); if [ X"$CMS_OPTS" != X ]; then ovs-vsctl set open . external_ids:ovn-cms-options=$CMS_OPTS;else ovs-vsctl remove open . external_ids ovn-cms-options; fi'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z']}, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:36:40Z, build-date=2026-01-12T22:36:40Z, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, managed_by=tripleo_ansible, release=1766032510, config_id=tripleo_step4, container_name=configure_cms_options, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 ovn-controller, version=17.1.13, io.buildah.version=1.41.5, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, summary=Red Hat OpenStack Platform 17.1 ovn-controller, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, tcib_managed=true, name=rhosp-rhel9/openstack-ovn-controller, com.redhat.component=openstack-ovn-controller-container, batch=17.1_20260112.1, architecture=x86_64, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:14:25 np0005604725 podman[110939]: 2026-02-02 08:14:25.453996195 +0000 UTC m=+0.089551416 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=starting, container_name=heat_api, io.buildah.version=1.41.5, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:53:19Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, com.redhat.component=openstack-heat-api-container, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, vendor=Red Hat, Inc., distribution-scope=public, tcib_managed=true, release=1766032510, summary=Red Hat OpenStack Platform 17.1 heat-api, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:53:19Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-ref=755001522886c265e88561b4997cab642504a845, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible, url=https://www.redhat.com, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-heat-api) Feb 2 08:14:25 np0005604725 systemd[1]: Started libpod-conmon-2944e1fda3c4b560065917f01de8012d626b1b0fd3a464ff3a022bcf97ce31aa.scope. Feb 2 08:14:25 np0005604725 podman[110898]: 2026-02-02 08:14:25.391774865 +0000 UTC m=+0.123133301 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Feb 2 08:14:25 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:14:25 np0005604725 podman[110874]: 2026-02-02 08:14:25.522129695 +0000 UTC m=+0.310942296 container init 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, batch=17.1_20260112.1, vendor=Red Hat, Inc., architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, name=rhosp-rhel9/openstack-heat-api-cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, tcib_managed=true, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, version=17.1.13, build-date=2026-01-12T22:54:02Z, container_name=heat_api_cfn, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:54:02Z, maintainer=OpenStack TripleO Team, release=1766032510, vcs-ref=755001522886c265e88561b4997cab642504a845, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, distribution-scope=public, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, config_id=tripleo_step4, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, com.redhat.component=openstack-heat-api-cfn-container) Feb 2 08:14:25 np0005604725 podman[110898]: 2026-02-02 08:14:25.547147009 +0000 UTC m=+0.278505445 container init 2944e1fda3c4b560065917f01de8012d626b1b0fd3a464ff3a022bcf97ce31aa (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=configure_cms_options, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:36:40Z, io.buildah.version=1.41.5, vendor=Red Hat, Inc., batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 ovn-controller, config_data={'command': ['/bin/bash', '-c', 'CMS_OPTS=$(hiera ovn::controller::ovn_cms_options -c /etc/puppet/hiera.yaml); if [ X"$CMS_OPTS" != X ]; then ovs-vsctl set open . external_ids:ovn-cms-options=$CMS_OPTS;else ovs-vsctl remove open . external_ids ovn-cms-options; fi'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z']}, io.openshift.expose-services=, com.redhat.component=openstack-ovn-controller-container, vcs-type=git, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, build-date=2026-01-12T22:36:40Z, release=1766032510, distribution-scope=public, name=rhosp-rhel9/openstack-ovn-controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=configure_cms_options, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, url=https://www.redhat.com, version=17.1.13, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c) Feb 2 08:14:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:14:25 np0005604725 podman[110898]: 2026-02-02 08:14:25.562184358 +0000 UTC m=+0.293542794 container start 2944e1fda3c4b560065917f01de8012d626b1b0fd3a464ff3a022bcf97ce31aa (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=configure_cms_options, container_name=configure_cms_options, config_data={'command': ['/bin/bash', '-c', 'CMS_OPTS=$(hiera ovn::controller::ovn_cms_options -c /etc/puppet/hiera.yaml); if [ X"$CMS_OPTS" != X ]; then ovs-vsctl set open . external_ids:ovn-cms-options=$CMS_OPTS;else ovs-vsctl remove open . external_ids ovn-cms-options; fi'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z']}, tcib_managed=true, name=rhosp-rhel9/openstack-ovn-controller, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:36:40Z, release=1766032510, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, com.redhat.component=openstack-ovn-controller-container, vcs-type=git, build-date=2026-01-12T22:36:40Z, vendor=Red Hat, Inc., io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 ovn-controller, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, version=17.1.13, url=https://www.redhat.com) Feb 2 08:14:25 np0005604725 podman[110898]: 2026-02-02 08:14:25.562352654 +0000 UTC m=+0.293711080 container attach 2944e1fda3c4b560065917f01de8012d626b1b0fd3a464ff3a022bcf97ce31aa (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=configure_cms_options, description=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vendor=Red Hat, Inc., batch=17.1_20260112.1, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, name=rhosp-rhel9/openstack-ovn-controller, config_data={'command': ['/bin/bash', '-c', 'CMS_OPTS=$(hiera ovn::controller::ovn_cms_options -c /etc/puppet/hiera.yaml); if [ X"$CMS_OPTS" != X ]; then ovs-vsctl set open . external_ids:ovn-cms-options=$CMS_OPTS;else ovs-vsctl remove open . external_ids ovn-cms-options; fi'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z']}, com.redhat.component=openstack-ovn-controller-container, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, io.openshift.expose-services=, vcs-type=git, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, build-date=2026-01-12T22:36:40Z, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, container_name=configure_cms_options, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:36:40Z, io.buildah.version=1.41.5, release=1766032510, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, summary=Red Hat OpenStack Platform 17.1 ovn-controller) Feb 2 08:14:25 np0005604725 podman[110874]: 2026-02-02 08:14:25.57862957 +0000 UTC m=+0.367442171 container start 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, vcs-ref=755001522886c265e88561b4997cab642504a845, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, version=17.1.13, distribution-scope=public, release=1766032510, batch=17.1_20260112.1, container_name=heat_api_cfn, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, tcib_managed=true, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, build-date=2026-01-12T22:54:02Z, com.redhat.component=openstack-heat-api-cfn-container, architecture=x86_64, name=rhosp-rhel9/openstack-heat-api-cfn, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, url=https://www.redhat.com, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, org.opencontainers.image.created=2026-01-12T22:54:02Z, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, vendor=Red Hat, Inc.) Feb 2 08:14:25 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name heat_api_cfn --conmon-pidfile /run/heat_api_cfn.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=c34de4047376a18922c4fddbe99616f0 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=heat_api_cfn --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/heat_api_cfn.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/heat:/var/log/heat:z --volume /var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z --volume /var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro --volume /etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Feb 2 08:14:25 np0005604725 podman[111025]: 2026-02-02 08:14:25.667081492 +0000 UTC m=+0.098316223 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=starting, vcs-ref=755001522886c265e88561b4997cab642504a845, version=17.1.13, vcs-type=git, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, name=rhosp-rhel9/openstack-heat-api-cfn, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-heat-api-cfn-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=heat_api_cfn, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, build-date=2026-01-12T22:54:02Z, tcib_managed=true, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:54:02Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, io.openshift.expose-services=, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:14:25 np0005604725 podman[110990]: 2026-02-02 08:14:25.571985108 +0000 UTC m=+0.092965290 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Feb 2 08:14:25 np0005604725 podman[110990]: 2026-02-02 08:14:25.705634779 +0000 UTC m=+0.226614951 container create 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:53:19Z, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, version=17.1.13, container_name=heat_api_cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:53:19Z, description=Red Hat OpenStack Platform 17.1 heat-api, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, name=rhosp-rhel9/openstack-heat-api, com.redhat.component=openstack-heat-api-container, vcs-type=git, tcib_managed=true, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, release=1766032510, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4) Feb 2 08:14:25 np0005604725 ovs-vsctl[111093]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set open . external_ids:ovn-cms-options=enable-chassis-as-gw Feb 2 08:14:25 np0005604725 systemd[1]: libpod-2944e1fda3c4b560065917f01de8012d626b1b0fd3a464ff3a022bcf97ce31aa.scope: Deactivated successfully. Feb 2 08:14:25 np0005604725 systemd[1]: Started libpod-conmon-0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.scope. Feb 2 08:14:25 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/af775fe80667a898e76ce68fe1d45ce42716735be12dd1e4370760cbd5f40473/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/af775fe80667a898e76ce68fe1d45ce42716735be12dd1e4370760cbd5f40473/merged/var/log/heat supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:14:25 np0005604725 podman[110990]: 2026-02-02 08:14:25.832133972 +0000 UTC m=+0.353114134 container init 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, io.buildah.version=1.41.5, architecture=x86_64, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, vcs-type=git, managed_by=tripleo_ansible, vcs-ref=755001522886c265e88561b4997cab642504a845, url=https://www.redhat.com, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.created=2026-01-12T22:53:19Z, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, build-date=2026-01-12T22:53:19Z, name=rhosp-rhel9/openstack-heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container, distribution-scope=public, container_name=heat_api_cron) Feb 2 08:14:25 np0005604725 podman[111105]: 2026-02-02 08:14:25.868264145 +0000 UTC m=+0.111506916 container died 2944e1fda3c4b560065917f01de8012d626b1b0fd3a464ff3a022bcf97ce31aa (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=configure_cms_options, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:36:40Z, description=Red Hat OpenStack Platform 17.1 ovn-controller, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-ovn-controller, release=1766032510, container_name=configure_cms_options, url=https://www.redhat.com, distribution-scope=public, com.redhat.component=openstack-ovn-controller-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'command': ['/bin/bash', '-c', 'CMS_OPTS=$(hiera ovn::controller::ovn_cms_options -c /etc/puppet/hiera.yaml); if [ X"$CMS_OPTS" != X ]; then ovs-vsctl set open . external_ids:ovn-cms-options=$CMS_OPTS;else ovs-vsctl remove open . external_ids ovn-cms-options; fi'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z']}, io.openshift.expose-services=, tcib_managed=true, vendor=Red Hat, Inc., architecture=x86_64, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, build-date=2026-01-12T22:36:40Z, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, summary=Red Hat OpenStack Platform 17.1 ovn-controller) Feb 2 08:14:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:14:25 np0005604725 podman[111094]: 2026-02-02 08:14:25.805602481 +0000 UTC m=+0.058921410 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 Feb 2 08:14:25 np0005604725 podman[111094]: 2026-02-02 08:14:25.978660396 +0000 UTC m=+0.231979305 container create 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-heat-engine-container, container_name=heat_engine, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, managed_by=tripleo_ansible, vcs-type=git, description=Red Hat OpenStack Platform 17.1 heat-engine, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, release=1766032510, distribution-scope=public, tcib_managed=true, name=rhosp-rhel9/openstack-heat-engine, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, build-date=2026-01-12T22:53:38Z, vcs-ref=755001522886c265e88561b4997cab642504a845, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:53:38Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, architecture=x86_64, batch=17.1_20260112.1, config_id=tripleo_step4, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, summary=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.expose-services=, url=https://www.redhat.com, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845) Feb 2 08:14:25 np0005604725 podman[110990]: 2026-02-02 08:14:25.993657284 +0000 UTC m=+0.514637486 container start 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, tcib_managed=true, io.buildah.version=1.41.5, managed_by=tripleo_ansible, container_name=heat_api_cron, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, version=17.1.13, description=Red Hat OpenStack Platform 17.1 heat-api, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=755001522886c265e88561b4997cab642504a845, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, architecture=x86_64, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, release=1766032510, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:53:19Z, com.redhat.component=openstack-heat-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, url=https://www.redhat.com, maintainer=OpenStack TripleO Team) Feb 2 08:14:26 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name heat_api_cron --conmon-pidfile /run/heat_api_cron.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=9fe8b459c1d20e59bcd177e00032de6d --healthcheck-command /usr/share/openstack-tripleo-common/healthcheck/cron heat --label config_id=tripleo_step4 --label container_name=heat_api_cron --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/heat_api_cron.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/heat:/var/log/heat:z --volume /var/log/containers/httpd/heat-api:/var/log/httpd:z --volume /var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Feb 2 08:14:26 np0005604725 podman[111105]: 2026-02-02 08:14:26.041262287 +0000 UTC m=+0.284505028 container cleanup 2944e1fda3c4b560065917f01de8012d626b1b0fd3a464ff3a022bcf97ce31aa (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=configure_cms_options, release=1766032510, io.openshift.expose-services=, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, com.redhat.component=openstack-ovn-controller-container, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, summary=Red Hat OpenStack Platform 17.1 ovn-controller, batch=17.1_20260112.1, url=https://www.redhat.com, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:36:40Z, config_data={'command': ['/bin/bash', '-c', 'CMS_OPTS=$(hiera ovn::controller::ovn_cms_options -c /etc/puppet/hiera.yaml); if [ X"$CMS_OPTS" != X ]; then ovs-vsctl set open . external_ids:ovn-cms-options=$CMS_OPTS;else ovs-vsctl remove open . external_ids ovn-cms-options; fi'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z']}, distribution-scope=public, tcib_managed=true, name=rhosp-rhel9/openstack-ovn-controller, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, container_name=configure_cms_options, description=Red Hat OpenStack Platform 17.1 ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., build-date=2026-01-12T22:36:40Z, io.buildah.version=1.41.5, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, version=17.1.13, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:14:26 np0005604725 systemd[1]: libpod-conmon-2944e1fda3c4b560065917f01de8012d626b1b0fd3a464ff3a022bcf97ce31aa.scope: Deactivated successfully. Feb 2 08:14:26 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name configure_cms_options --conmon-pidfile /run/configure_cms_options.pid --detach=False --env TRIPLEO_DEPLOY_IDENTIFIER=1770018187 --label config_id=tripleo_step4 --label container_name=configure_cms_options --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'CMS_OPTS=$(hiera ovn::controller::ovn_cms_options -c /etc/puppet/hiera.yaml); if [ X"$CMS_OPTS" != X ]; then ovs-vsctl set open . external_ids:ovn-cms-options=$CMS_OPTS;else ovs-vsctl remove open . external_ids ovn-cms-options; fi'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1770018187'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/configure_cms_options.log --network host --privileged=True --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /lib/modules:/lib/modules:ro --volume /run/openvswitch:/run/openvswitch:shared,z registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 /bin/bash -c CMS_OPTS=$(hiera ovn::controller::ovn_cms_options -c /etc/puppet/hiera.yaml); if [ X"$CMS_OPTS" != X ]; then ovs-vsctl set open . external_ids:ovn-cms-options=$CMS_OPTS;else ovs-vsctl remove open . external_ids ovn-cms-options; fi Feb 2 08:14:26 np0005604725 systemd[1]: Started libpod-conmon-8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.scope. Feb 2 08:14:26 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:26 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b8fd9f35f1f82b9c0ae7d2d8ad9e0cbc85366f2bfc3b868eff3782735fe24f72/merged/var/log/heat supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:26 np0005604725 podman[111162]: 2026-02-02 08:14:26.049044495 +0000 UTC m=+0.155410496 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=starting, managed_by=tripleo_ansible, architecture=x86_64, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.created=2026-01-12T22:53:19Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, build-date=2026-01-12T22:53:19Z, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=, com.redhat.component=openstack-heat-api-container, vendor=Red Hat, Inc., vcs-type=git, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-heat-api, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, container_name=heat_api_cron) Feb 2 08:14:26 np0005604725 podman[111162]: 2026-02-02 08:14:26.190922698 +0000 UTC m=+0.297288689 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, vcs-type=git, managed_by=tripleo_ansible, io.openshift.expose-services=, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, release=1766032510, com.redhat.component=openstack-heat-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, name=rhosp-rhel9/openstack-heat-api, tcib_managed=true, distribution-scope=public, build-date=2026-01-12T22:53:19Z, architecture=x86_64, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-ref=755001522886c265e88561b4997cab642504a845, url=https://www.redhat.com, config_id=tripleo_step4, io.buildah.version=1.41.5, container_name=heat_api_cron, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.created=2026-01-12T22:53:19Z, summary=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:14:26 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:14:26 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:14:26 np0005604725 podman[111094]: 2026-02-02 08:14:26.260620007 +0000 UTC m=+0.513938916 container init 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, release=1766032510, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-ref=755001522886c265e88561b4997cab642504a845, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.openshift.expose-services=, io.buildah.version=1.41.5, version=17.1.13, build-date=2026-01-12T22:53:38Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, vcs-type=git, name=rhosp-rhel9/openstack-heat-engine, com.redhat.component=openstack-heat-engine-container, container_name=heat_engine, description=Red Hat OpenStack Platform 17.1 heat-engine, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:53:38Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 heat-engine, url=https://www.redhat.com) Feb 2 08:14:26 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:14:26 np0005604725 podman[111094]: 2026-02-02 08:14:26.385557011 +0000 UTC m=+0.638875910 container start 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, summary=Red Hat OpenStack Platform 17.1 heat-engine, config_id=tripleo_step4, io.buildah.version=1.41.5, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, name=rhosp-rhel9/openstack-heat-engine, release=1766032510, org.opencontainers.image.created=2026-01-12T22:53:38Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., architecture=x86_64, container_name=heat_engine, com.redhat.component=openstack-heat-engine-container, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, description=Red Hat OpenStack Platform 17.1 heat-engine, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, vcs-type=git, batch=17.1_20260112.1, build-date=2026-01-12T22:53:38Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=, url=https://www.redhat.com, version=17.1.13, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true) Feb 2 08:14:26 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name heat_engine --conmon-pidfile /run/heat_engine.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=3b9828291d650a0cb3f28eaed8d5f04d --healthcheck-command /openstack/healthcheck 5672 --label config_id=tripleo_step4 --label container_name=heat_engine --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/heat_engine.log --network host --privileged=False --stop-timeout 60 --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/heat:/var/log/heat:z --volume /var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 Feb 2 08:14:26 np0005604725 systemd[1]: var-lib-containers-storage-overlay-96a798284729b391fd5a80d007d9ef505be6589e5f3b35168b244f988d1401c7-merged.mount: Deactivated successfully. Feb 2 08:14:26 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-2944e1fda3c4b560065917f01de8012d626b1b0fd3a464ff3a022bcf97ce31aa-userdata-shm.mount: Deactivated successfully. Feb 2 08:14:26 np0005604725 podman[111319]: 2026-02-02 08:14:26.360465875 +0000 UTC m=+0.078106875 image pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Feb 2 08:14:26 np0005604725 podman[111336]: 2026-02-02 08:14:26.490701912 +0000 UTC m=+0.157431898 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=starting, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, org.opencontainers.image.created=2026-01-12T22:53:38Z, architecture=x86_64, container_name=heat_engine, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-heat-engine, io.buildah.version=1.41.5, io.openshift.expose-services=, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, vcs-type=git, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 heat-engine, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, version=17.1.13, url=https://www.redhat.com, managed_by=tripleo_ansible, com.redhat.component=openstack-heat-engine-container, vcs-ref=755001522886c265e88561b4997cab642504a845, description=Red Hat OpenStack Platform 17.1 heat-engine, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:53:38Z) Feb 2 08:14:26 np0005604725 podman[111319]: 2026-02-02 08:14:26.500534962 +0000 UTC m=+0.218175932 container create 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, tcib_managed=true, managed_by=tripleo_ansible, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:10:15Z, release=1766032510, io.openshift.expose-services=, version=17.1.13, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, batch=17.1_20260112.1, distribution-scope=public, vcs-type=git, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:15Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, description=Red Hat OpenStack Platform 17.1 cron, container_name=logrotate_crond, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, com.redhat.component=openstack-cron-container, vendor=Red Hat, Inc., vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 cron, name=rhosp-rhel9/openstack-cron, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, io.buildah.version=1.41.5) Feb 2 08:14:26 np0005604725 podman[111336]: 2026-02-02 08:14:26.543740982 +0000 UTC m=+0.210470968 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, io.buildah.version=1.41.5, container_name=heat_engine, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, summary=Red Hat OpenStack Platform 17.1 heat-engine, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:53:38Z, version=17.1.13, maintainer=OpenStack TripleO Team, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, managed_by=tripleo_ansible, vendor=Red Hat, Inc., com.redhat.component=openstack-heat-engine-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, vcs-ref=755001522886c265e88561b4997cab642504a845, name=rhosp-rhel9/openstack-heat-engine, vcs-type=git, architecture=x86_64, config_id=tripleo_step4, io.openshift.expose-services=, url=https://www.redhat.com, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 heat-engine, build-date=2026-01-12T22:53:38Z) Feb 2 08:14:26 np0005604725 podman[111336]: unhealthy Feb 2 08:14:26 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:26 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Failed with result 'exit-code'. Feb 2 08:14:26 np0005604725 systemd[1]: Started libpod-conmon-2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.scope. Feb 2 08:14:26 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:26 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a9d51b94457636eddb66ad67ae44d0a4020f588996c52df81c2a1b774e567424/merged/var/log/containers supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:26 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:14:26 np0005604725 podman[111319]: 2026-02-02 08:14:26.67598724 +0000 UTC m=+0.393628220 container init 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, architecture=x86_64, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:15Z, com.redhat.component=openstack-cron-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 cron, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 cron, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:10:15Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=logrotate_crond, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-cron, vcs-type=git, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, config_id=tripleo_step4, managed_by=tripleo_ansible, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:14:26 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:14:26 np0005604725 podman[111319]: 2026-02-02 08:14:26.7372146 +0000 UTC m=+0.454855580 container start 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, io.buildah.version=1.41.5, io.openshift.expose-services=, distribution-scope=public, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=logrotate_crond, architecture=x86_64, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:15Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, summary=Red Hat OpenStack Platform 17.1 cron, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, description=Red Hat OpenStack Platform 17.1 cron, version=17.1.13, vcs-type=git, build-date=2026-01-12T22:10:15Z, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-cron, vendor=Red Hat, Inc., com.redhat.component=openstack-cron-container) Feb 2 08:14:26 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name logrotate_crond --conmon-pidfile /run/logrotate_crond.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=53ed83bb0cae779ff95edb2002262c6f --healthcheck-command /usr/share/openstack-tripleo-common/healthcheck/cron --label config_id=tripleo_step4 --label container_name=logrotate_crond --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/logrotate_crond.log --network none --pid host --privileged=True --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro --volume /var/log/containers:/var/log/containers:z registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Feb 2 08:14:26 np0005604725 podman[111517]: 2026-02-02 08:14:26.75719323 +0000 UTC m=+0.121744218 container create ba54284e9672388291304873ed69f1c607cd03dbb2f65acfa3766d0f5f5421be (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api, vcs-type=git, com.redhat.component=openstack-manila-api-container, version=17.1.13, url=https://www.redhat.com, container_name=manila_api, maintainer=OpenStack TripleO Team, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, batch=17.1_20260112.1, build-date=2026-01-12T22:52:22Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, description=Red Hat OpenStack Platform 17.1 manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, org.opencontainers.image.created=2026-01-12T22:52:22Z, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-manila-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, summary=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.41.5, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, config_id=tripleo_step4) Feb 2 08:14:26 np0005604725 podman[111517]: 2026-02-02 08:14:26.683244132 +0000 UTC m=+0.047795120 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Feb 2 08:14:26 np0005604725 podman[111518]: 2026-02-02 08:14:26.799977846 +0000 UTC m=+0.162218455 container create 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, build-date=2026-01-12T22:52:54Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, version=17.1.13, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 manila-scheduler, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, vendor=Red Hat, Inc., container_name=manila_scheduler, name=rhosp-rhel9/openstack-manila-scheduler, com.redhat.component=openstack-manila-scheduler-container, io.buildah.version=1.41.5, distribution-scope=public, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:52:54Z, managed_by=tripleo_ansible, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb) Feb 2 08:14:26 np0005604725 systemd[1]: Started libpod-conmon-ba54284e9672388291304873ed69f1c607cd03dbb2f65acfa3766d0f5f5421be.scope. Feb 2 08:14:26 np0005604725 podman[111518]: 2026-02-02 08:14:26.718165778 +0000 UTC m=+0.080406397 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 Feb 2 08:14:26 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:26 np0005604725 systemd[1]: Started libpod-conmon-8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.scope. Feb 2 08:14:26 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/fd4dc6445fd98a858e3a597265520d6acb6175383bf4f8d671b4a384429eb10b/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:26 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/fd4dc6445fd98a858e3a597265520d6acb6175383bf4f8d671b4a384429eb10b/merged/var/log/manila supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:26 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:26 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/181f1d648cf5922807e9e1ea8695b29f76dd37782cb40aaca992fd9599d7f423/merged/var/log/manila supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:26 np0005604725 podman[111559]: 2026-02-02 08:14:26.877626557 +0000 UTC m=+0.138622223 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=starting, summary=Red Hat OpenStack Platform 17.1 cron, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:15Z, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, release=1766032510, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 cron, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-cron-container, container_name=logrotate_crond, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., tcib_managed=true, build-date=2026-01-12T22:10:15Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, architecture=x86_64, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-cron, vcs-type=git) Feb 2 08:14:26 np0005604725 podman[111533]: 2026-02-02 08:14:26.796583663 +0000 UTC m=+0.140717238 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Feb 2 08:14:26 np0005604725 podman[111559]: 2026-02-02 08:14:26.924323894 +0000 UTC m=+0.185319540 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, io.buildah.version=1.41.5, version=17.1.13, tcib_managed=true, url=https://www.redhat.com, vcs-type=git, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, summary=Red Hat OpenStack Platform 17.1 cron, name=rhosp-rhel9/openstack-cron, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:15Z, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 cron, com.redhat.component=openstack-cron-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, batch=17.1_20260112.1, managed_by=tripleo_ansible, architecture=x86_64, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=logrotate_crond, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, org.opencontainers.image.created=2026-01-12T22:10:15Z, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:14:26 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:14:26 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:14:26 np0005604725 podman[111518]: 2026-02-02 08:14:26.954523355 +0000 UTC m=+0.316763964 container init 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, org.opencontainers.image.created=2026-01-12T22:52:54Z, distribution-scope=public, vendor=Red Hat, Inc., com.redhat.component=openstack-manila-scheduler-container, release=1766032510, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.buildah.version=1.41.5, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:52:54Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, config_id=tripleo_step4, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, container_name=manila_scheduler, name=rhosp-rhel9/openstack-manila-scheduler, description=Red Hat OpenStack Platform 17.1 manila-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, batch=17.1_20260112.1, url=https://www.redhat.com) Feb 2 08:14:26 np0005604725 podman[111517]: 2026-02-02 08:14:26.973649819 +0000 UTC m=+0.338200817 container init ba54284e9672388291304873ed69f1c607cd03dbb2f65acfa3766d0f5f5421be (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, tcib_managed=true, release=1766032510, version=17.1.13, description=Red Hat OpenStack Platform 17.1 manila-api, name=rhosp-rhel9/openstack-manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=manila_api, managed_by=tripleo_ansible, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, build-date=2026-01-12T22:52:22Z, org.opencontainers.image.created=2026-01-12T22:52:22Z, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 manila-api, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, com.redhat.component=openstack-manila-api-container, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.41.5, batch=17.1_20260112.1, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, vcs-type=git, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb) Feb 2 08:14:26 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:14:27 np0005604725 podman[111517]: 2026-02-02 08:14:27.001875211 +0000 UTC m=+0.366426199 container start ba54284e9672388291304873ed69f1c607cd03dbb2f65acfa3766d0f5f5421be (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, description=Red Hat OpenStack Platform 17.1 manila-api, vcs-type=git, architecture=x86_64, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 manila-api, release=1766032510, container_name=manila_api, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-manila-api, com.redhat.component=openstack-manila-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, managed_by=tripleo_ansible, version=17.1.13, url=https://www.redhat.com, build-date=2026-01-12T22:52:22Z, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, vendor=Red Hat, Inc., io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, org.opencontainers.image.created=2026-01-12T22:52:22Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api) Feb 2 08:14:27 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name manila_api --conmon-pidfile /run/manila_api.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=d8e2b9fe37394fa4702f0b4840e2be72 --label config_id=tripleo_step4 --label container_name=manila_api --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/manila_api.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/manila_api.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro --volume /var/log/containers/manila:/var/log/manila:z --volume /var/log/containers/httpd/manila-api:/var/log/httpd:z --volume /etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro --volume /etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Feb 2 08:14:27 np0005604725 podman[111518]: 2026-02-02 08:14:27.023590225 +0000 UTC m=+0.385830844 container start 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, config_id=tripleo_step4, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 manila-scheduler, architecture=x86_64, build-date=2026-01-12T22:52:54Z, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, name=rhosp-rhel9/openstack-manila-scheduler, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, distribution-scope=public, com.redhat.component=openstack-manila-scheduler-container, io.buildah.version=1.41.5, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, version=17.1.13, release=1766032510, org.opencontainers.image.created=2026-01-12T22:52:54Z, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=manila_scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com) Feb 2 08:14:27 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name manila_scheduler --conmon-pidfile /run/manila_scheduler.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=d8e2b9fe37394fa4702f0b4840e2be72 --healthcheck-command /openstack/healthcheck 5672 --label config_id=tripleo_step4 --label container_name=manila_scheduler --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/manila_scheduler.log --network host --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro --volume /var/log/containers/manila:/var/log/manila:z registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 Feb 2 08:14:27 np0005604725 podman[111533]: 2026-02-02 08:14:27.063596406 +0000 UTC m=+0.407730011 container create 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, container_name=manila_api_cron, vcs-type=git, vendor=Red Hat, Inc., org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, com.redhat.component=openstack-manila-api-container, build-date=2026-01-12T22:52:22Z, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, io.buildah.version=1.41.5, release=1766032510, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-manila-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, tcib_managed=true, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:52:22Z, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, maintainer=OpenStack TripleO Team, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:14:27 np0005604725 systemd[1]: Started libpod-conmon-408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.scope. Feb 2 08:14:27 np0005604725 podman[111647]: 2026-02-02 08:14:27.085297359 +0000 UTC m=+0.076050893 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Feb 2 08:14:27 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1f5bb1e3a3fc6ed6fd82d151c7f120d39403bb47c1a6e8ea2799070e64ec1b02/merged/var/log/manila supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1f5bb1e3a3fc6ed6fd82d151c7f120d39403bb47c1a6e8ea2799070e64ec1b02/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:27 np0005604725 podman[111647]: 2026-02-02 08:14:27.221728425 +0000 UTC m=+0.212481949 container create 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 neutron-server, vendor=Red Hat, Inc., container_name=neutron_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, io.buildah.version=1.41.5, version=17.1.13, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, name=rhosp-rhel9/openstack-neutron-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, managed_by=tripleo_ansible, com.redhat.component=openstack-neutron-server-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, org.opencontainers.image.created=2026-01-12T22:57:35Z, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, build-date=2026-01-12T22:57:35Z, distribution-scope=public, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 neutron-server, vcs-type=git, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, url=https://www.redhat.com) Feb 2 08:14:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:14:27 np0005604725 podman[111533]: 2026-02-02 08:14:27.230266956 +0000 UTC m=+0.574400571 container init 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, release=1766032510, version=17.1.13, vcs-type=git, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 manila-api, org.opencontainers.image.created=2026-01-12T22:52:22Z, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, build-date=2026-01-12T22:52:22Z, batch=17.1_20260112.1, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 manila-api, container_name=manila_api_cron, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-manila-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, tcib_managed=true, distribution-scope=public, name=rhosp-rhel9/openstack-manila-api, io.buildah.version=1.41.5, io.openshift.expose-services=, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb) Feb 2 08:14:27 np0005604725 podman[111646]: 2026-02-02 08:14:27.14854091 +0000 UTC m=+0.141709218 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=starting, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, distribution-scope=public, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, maintainer=OpenStack TripleO Team, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, version=17.1.13, name=rhosp-rhel9/openstack-manila-scheduler, org.opencontainers.image.created=2026-01-12T22:52:54Z, description=Red Hat OpenStack Platform 17.1 manila-scheduler, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, build-date=2026-01-12T22:52:54Z, com.redhat.component=openstack-manila-scheduler-container, architecture=x86_64, batch=17.1_20260112.1, container_name=manila_scheduler, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, vcs-type=git, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb) Feb 2 08:14:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:14:27 np0005604725 podman[111533]: 2026-02-02 08:14:27.261644044 +0000 UTC m=+0.605777639 container start 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, release=1766032510, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, container_name=manila_api_cron, summary=Red Hat OpenStack Platform 17.1 manila-api, tcib_managed=true, managed_by=tripleo_ansible, batch=17.1_20260112.1, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, name=rhosp-rhel9/openstack-manila-api, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:52:22Z, maintainer=OpenStack TripleO Team, distribution-scope=public, com.redhat.component=openstack-manila-api-container, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, vcs-type=git, vendor=Red Hat, Inc., build-date=2026-01-12T22:52:22Z, description=Red Hat OpenStack Platform 17.1 manila-api, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:14:27 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name manila_api_cron --conmon-pidfile /run/manila_api_cron.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=d8e2b9fe37394fa4702f0b4840e2be72 --healthcheck-command /usr/share/openstack-tripleo-common/healthcheck/cron manila --label config_id=tripleo_step4 --label container_name=manila_api_cron --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/manila_api_cron.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro --volume /var/log/containers/manila:/var/log/manila:z --volume /var/log/containers/httpd/manila-api:/var/log/httpd:z registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Feb 2 08:14:27 np0005604725 systemd[1]: Started libpod-conmon-5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.scope. Feb 2 08:14:27 np0005604725 podman[111646]: 2026-02-02 08:14:27.31160843 +0000 UTC m=+0.304776748 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, config_id=tripleo_step4, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-manila-scheduler, vcs-type=git, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, vendor=Red Hat, Inc., distribution-scope=public, description=Red Hat OpenStack Platform 17.1 manila-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, org.opencontainers.image.created=2026-01-12T22:52:54Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, tcib_managed=true, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:52:54Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, com.redhat.component=openstack-manila-scheduler-container, url=https://www.redhat.com, architecture=x86_64, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, container_name=manila_scheduler, maintainer=OpenStack TripleO Team, io.openshift.expose-services=) Feb 2 08:14:27 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/72148d73744630af1b770c96e9956b7b16c0629cfd4d79707128d646337940e5/merged/var/log/neutron supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/72148d73744630af1b770c96e9956b7b16c0629cfd4d79707128d646337940e5/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:27 np0005604725 podman[111646]: unhealthy Feb 2 08:14:27 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:27 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Failed with result 'exit-code'. Feb 2 08:14:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:14:27 np0005604725 podman[111647]: 2026-02-02 08:14:27.380538005 +0000 UTC m=+0.371291539 container init 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, org.opencontainers.image.created=2026-01-12T22:57:35Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-neutron-server, release=1766032510, vendor=Red Hat, Inc., distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, version=17.1.13, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, build-date=2026-01-12T22:57:35Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 neutron-server, architecture=x86_64, url=https://www.redhat.com, com.redhat.component=openstack-neutron-server-container, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, description=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=neutron_api, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, io.buildah.version=1.41.5) Feb 2 08:14:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:14:27 np0005604725 podman[111745]: 2026-02-02 08:14:27.360178073 +0000 UTC m=+0.100234471 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=starting, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, com.redhat.component=openstack-manila-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 manila-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, org.opencontainers.image.created=2026-01-12T22:52:22Z, name=rhosp-rhel9/openstack-manila-api, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, tcib_managed=true, architecture=x86_64, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=manila_api_cron, summary=Red Hat OpenStack Platform 17.1 manila-api, version=17.1.13, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, build-date=2026-01-12T22:52:22Z, release=1766032510) Feb 2 08:14:27 np0005604725 podman[111745]: 2026-02-02 08:14:27.554875928 +0000 UTC m=+0.294932356 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, architecture=x86_64, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:52:22Z, io.openshift.expose-services=, tcib_managed=true, com.redhat.component=openstack-manila-api-container, summary=Red Hat OpenStack Platform 17.1 manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, managed_by=tripleo_ansible, config_id=tripleo_step4, name=rhosp-rhel9/openstack-manila-api, io.buildah.version=1.41.5, build-date=2026-01-12T22:52:22Z, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, container_name=manila_api_cron) Feb 2 08:14:27 np0005604725 podman[111745]: unhealthy Feb 2 08:14:27 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:27 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Failed with result 'exit-code'. Feb 2 08:14:27 np0005604725 podman[110939]: 2026-02-02 08:14:27.594644923 +0000 UTC m=+2.230200134 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.expose-services=, architecture=x86_64, com.redhat.component=openstack-heat-api-container, version=17.1.13, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_step4, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, org.opencontainers.image.created=2026-01-12T22:53:19Z, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp-rhel9/openstack-heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:53:19Z, release=1766032510, container_name=heat_api, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., managed_by=tripleo_ansible, vcs-ref=755001522886c265e88561b4997cab642504a845, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 heat-api) Feb 2 08:14:27 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:14:27 np0005604725 podman[111647]: 2026-02-02 08:14:27.611718024 +0000 UTC m=+0.602471538 container start 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 neutron-server, build-date=2026-01-12T22:57:35Z, release=1766032510, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, version=17.1.13, name=rhosp-rhel9/openstack-neutron-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:57:35Z, description=Red Hat OpenStack Platform 17.1 neutron-server, architecture=x86_64, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, container_name=neutron_api, vendor=Red Hat, Inc., com.redhat.component=openstack-neutron-server-container, io.openshift.expose-services=, url=https://www.redhat.com, batch=17.1_20260112.1, config_id=tripleo_step4, io.buildah.version=1.41.5) Feb 2 08:14:27 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name neutron_api --conmon-pidfile /run/neutron_api.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=ed61d1adcabe12fe3dffa08621622e77 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=neutron_api --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/neutron_api.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/neutron:/var/log/neutron:z --volume /var/log/containers/httpd/neutron-api:/var/log/httpd:z --volume /var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro --volume /etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Feb 2 08:14:27 np0005604725 podman[110579]: 2026-02-02 08:14:27.682835975 +0000 UTC m=+2.997859335 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, config_id=tripleo_step4, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:58:44Z, build-date=2026-01-12T22:58:44Z, maintainer=OpenStack TripleO Team, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, url=https://www.redhat.com, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, release=1766032510, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, com.redhat.component=openstack-cinder-api-container, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, distribution-scope=public, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, container_name=cinder_api) Feb 2 08:14:27 np0005604725 podman[111820]: 2026-02-02 08:14:27.641303918 +0000 UTC m=+0.185658891 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=starting, tcib_managed=true, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, io.buildah.version=1.41.5, version=17.1.13, name=rhosp-rhel9/openstack-neutron-server, summary=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, vcs-type=git, container_name=neutron_api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, config_id=tripleo_step4, vendor=Red Hat, Inc., managed_by=tripleo_ansible, com.redhat.component=openstack-neutron-server-container, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, batch=17.1_20260112.1, build-date=2026-01-12T22:57:35Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:14:27 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:14:27 np0005604725 podman[111912]: 2026-02-02 08:14:27.791576996 +0000 UTC m=+0.122745329 container create 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, io.buildah.version=1.41.5, batch=17.1_20260112.1, version=17.1.13, com.redhat.component=openstack-nova-conductor-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T23:32:18Z, url=https://www.redhat.com, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 nova-conductor, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, container_name=nova_conductor, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, vendor=Red Hat, Inc., config_id=tripleo_step4, name=rhosp-rhel9/openstack-nova-conductor, summary=Red Hat OpenStack Platform 17.1 nova-conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, vcs-type=git, tcib_managed=true, build-date=2026-01-12T23:32:18Z) Feb 2 08:14:27 np0005604725 podman[111912]: 2026-02-02 08:14:27.750392329 +0000 UTC m=+0.081560662 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 Feb 2 08:14:27 np0005604725 systemd[1]: Started libpod-conmon-14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.scope. Feb 2 08:14:27 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:27 np0005604725 podman[111930]: 2026-02-02 08:14:27.883673218 +0000 UTC m=+0.176894252 container create 1cb316d98e954e0141c00c747c3faaf1e4fd267fd0d642b5b07962ce35f5017b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_server_tls_proxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, description=Red Hat OpenStack Platform 17.1 neutron-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, container_name=neutron_server_tls_proxy, url=https://www.redhat.com, vcs-type=git, release=1766032510, com.redhat.component=openstack-neutron-server-container, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:57:35Z, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, io.buildah.version=1.41.5, tcib_managed=true, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, name=rhosp-rhel9/openstack-neutron-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_server_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.expose-services=, config_id=tripleo_step4, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:57:35Z, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, vendor=Red Hat, Inc., managed_by=tripleo_ansible, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server) Feb 2 08:14:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7863c247a13e672c0497d70147f4ccc568e3b065f8be1fc6ea13016531709882/merged/var/log/nova supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:27 np0005604725 systemd[1]: Started libpod-conmon-1cb316d98e954e0141c00c747c3faaf1e4fd267fd0d642b5b07962ce35f5017b.scope. Feb 2 08:14:27 np0005604725 podman[111930]: 2026-02-02 08:14:27.817365333 +0000 UTC m=+0.110586347 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Feb 2 08:14:27 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:27 np0005604725 podman[111025]: 2026-02-02 08:14:27.932098287 +0000 UTC m=+2.363333048 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, maintainer=OpenStack TripleO Team, vcs-type=git, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_id=tripleo_step4, vcs-ref=755001522886c265e88561b4997cab642504a845, tcib_managed=true, managed_by=tripleo_ansible, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, url=https://www.redhat.com, com.redhat.component=openstack-heat-api-cfn-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.buildah.version=1.41.5, container_name=heat_api_cfn, org.opencontainers.image.created=2026-01-12T22:54:02Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:54:02Z, vendor=Red Hat, Inc., org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, name=rhosp-rhel9/openstack-heat-api-cfn, architecture=x86_64, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:14:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d49e1a0091b479dc7cc455b175828cef8bba5a1ccc7b110be51bccc37cd1371a/merged/var/log/neutron supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:27 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d49e1a0091b479dc7cc455b175828cef8bba5a1ccc7b110be51bccc37cd1371a/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:14:27 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:14:27 np0005604725 podman[111912]: 2026-02-02 08:14:27.945999021 +0000 UTC m=+0.277167324 container init 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, batch=17.1_20260112.1, com.redhat.component=openstack-nova-conductor-container, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=nova_conductor, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-nova-conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, distribution-scope=public, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 nova-conductor, build-date=2026-01-12T23:32:18Z, vcs-type=git, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, org.opencontainers.image.created=2026-01-12T23:32:18Z, tcib_managed=true, architecture=x86_64) Feb 2 08:14:27 np0005604725 podman[111930]: 2026-02-02 08:14:27.950048386 +0000 UTC m=+0.243269400 container init 1cb316d98e954e0141c00c747c3faaf1e4fd267fd0d642b5b07962ce35f5017b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_server_tls_proxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, distribution-scope=public, vendor=Red Hat, Inc., tcib_managed=true, batch=17.1_20260112.1, managed_by=tripleo_ansible, io.buildah.version=1.41.5, version=17.1.13, container_name=neutron_server_tls_proxy, maintainer=OpenStack TripleO Team, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_server_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:57:35Z, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, name=rhosp-rhel9/openstack-neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z, description=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container) Feb 2 08:14:27 np0005604725 podman[111930]: 2026-02-02 08:14:27.96393482 +0000 UTC m=+0.257155844 container start 1cb316d98e954e0141c00c747c3faaf1e4fd267fd0d642b5b07962ce35f5017b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_server_tls_proxy, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, version=17.1.13, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:57:35Z, description=Red Hat OpenStack Platform 17.1 neutron-server, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, name=rhosp-rhel9/openstack-neutron-server, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, release=1766032510, architecture=x86_64, container_name=neutron_server_tls_proxy, vcs-type=git, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, summary=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_server_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.buildah.version=1.41.5, com.redhat.component=openstack-neutron-server-container) Feb 2 08:14:27 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name neutron_server_tls_proxy --conmon-pidfile /run/neutron_server_tls_proxy.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=ed61d1adcabe12fe3dffa08621622e77 --label config_id=tripleo_step4 --label container_name=neutron_server_tls_proxy --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_server_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/neutron_server_tls_proxy.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/neutron:/var/log/neutron:z --volume /var/log/containers/httpd/neutron-api:/var/log/httpd:z --volume /var/lib/kolla/config_files/neutron_server_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro --volume /etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Feb 2 08:14:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:14:28 np0005604725 podman[111912]: 2026-02-02 08:14:28.015561076 +0000 UTC m=+0.346729369 container start 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, version=17.1.13, tcib_managed=true, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-conductor-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, org.opencontainers.image.created=2026-01-12T23:32:18Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 nova-conductor, build-date=2026-01-12T23:32:18Z, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, managed_by=tripleo_ansible, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 nova-conductor, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-nova-conductor, release=1766032510, vendor=Red Hat, Inc., container_name=nova_conductor, vcs-type=git) Feb 2 08:14:28 np0005604725 podman[111820]: 2026-02-02 08:14:28.042964023 +0000 UTC m=+0.587318956 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, batch=17.1_20260112.1, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:57:35Z, distribution-scope=public, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, io.buildah.version=1.41.5, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, description=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, name=rhosp-rhel9/openstack-neutron-server, architecture=x86_64, config_id=tripleo_step4, release=1766032510, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 neutron-server, container_name=neutron_api, io.openshift.expose-services=, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:14:28 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name nova_conductor --conmon-pidfile /run/nova_conductor.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=0f33bf354435ad6e844c942ca95c792b --healthcheck-command /openstack/healthcheck 5672 --label config_id=tripleo_step4 --label container_name=nova_conductor --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/nova_conductor.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/nova:/var/log/nova --volume /var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 Feb 2 08:14:28 np0005604725 podman[111820]: unhealthy Feb 2 08:14:28 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:28 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Failed with result 'exit-code'. Feb 2 08:14:28 np0005604725 podman[111962]: 2026-02-02 08:14:27.990028846 +0000 UTC m=+0.187204368 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 Feb 2 08:14:28 np0005604725 podman[112033]: 2026-02-02 08:14:28.149031122 +0000 UTC m=+0.144671029 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=starting, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.expose-services=, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, summary=Red Hat OpenStack Platform 17.1 nova-conductor, tcib_managed=true, name=rhosp-rhel9/openstack-nova-conductor, description=Red Hat OpenStack Platform 17.1 nova-conductor, url=https://www.redhat.com, com.redhat.component=openstack-nova-conductor-container, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., version=17.1.13, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, distribution-scope=public, io.buildah.version=1.41.5, vcs-type=git, org.opencontainers.image.created=2026-01-12T23:32:18Z, build-date=2026-01-12T23:32:18Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, container_name=nova_conductor, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1) Feb 2 08:14:28 np0005604725 podman[111962]: 2026-02-02 08:14:28.165378231 +0000 UTC m=+0.362553743 container create ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 nova-scheduler, io.openshift.expose-services=, url=https://www.redhat.com, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, managed_by=tripleo_ansible, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, architecture=x86_64, build-date=2026-01-12T23:32:05Z, name=rhosp-rhel9/openstack-nova-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, org.opencontainers.image.created=2026-01-12T23:32:05Z, com.redhat.component=openstack-nova-scheduler-container, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, description=Red Hat OpenStack Platform 17.1 nova-scheduler, release=1766032510, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, container_name=nova_scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, distribution-scope=public, tcib_managed=true) Feb 2 08:14:28 np0005604725 systemd[1]: Started libpod-conmon-ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.scope. Feb 2 08:14:28 np0005604725 podman[112087]: 2026-02-02 08:14:28.223443784 +0000 UTC m=+0.143798192 container create b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, release=1766032510, com.redhat.component=openstack-nova-novncproxy-container, io.buildah.version=1.41.5, build-date=2026-01-12T23:32:22Z, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, vcs-type=git, maintainer=OpenStack TripleO Team, container_name=nova_vnc_proxy, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, name=rhosp-rhel9/openstack-nova-novncproxy, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, version=17.1.13, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, org.opencontainers.image.created=2026-01-12T23:32:22Z, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, distribution-scope=public, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com) Feb 2 08:14:28 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/4863b4e34b2c00396a32d41c2d771713e281bc6bd537f2fc36b9a09a0b838205/merged/var/log/nova supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:28 np0005604725 podman[112087]: 2026-02-02 08:14:28.16271761 +0000 UTC m=+0.083072018 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 Feb 2 08:14:28 np0005604725 systemd[1]: Started libpod-conmon-b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.scope. Feb 2 08:14:28 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:14:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1e8d3209c805b3e1691ea8301ff26d4532dc6fd44b81a31868522c25b39fb7f3/merged/var/log/nova supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:28 np0005604725 podman[111962]: 2026-02-02 08:14:28.291583625 +0000 UTC m=+0.488759167 container init ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, managed_by=tripleo_ansible, vcs-type=git, batch=17.1_20260112.1, release=1766032510, name=rhosp-rhel9/openstack-nova-scheduler, io.buildah.version=1.41.5, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 nova-scheduler, tcib_managed=true, org.opencontainers.image.created=2026-01-12T23:32:05Z, build-date=2026-01-12T23:32:05Z, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, container_name=nova_scheduler, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, com.redhat.component=openstack-nova-scheduler-container, vendor=Red Hat, Inc., architecture=x86_64, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:14:28 np0005604725 podman[112033]: 2026-02-02 08:14:28.330194814 +0000 UTC m=+0.325834721 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, org.opencontainers.image.created=2026-01-12T23:32:18Z, build-date=2026-01-12T23:32:18Z, container_name=nova_conductor, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, batch=17.1_20260112.1, tcib_managed=true, url=https://www.redhat.com, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.expose-services=, com.redhat.component=openstack-nova-conductor-container, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-conductor, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-nova-conductor, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, vendor=Red Hat, Inc., architecture=x86_64) Feb 2 08:14:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:14:28 np0005604725 podman[112087]: 2026-02-02 08:14:28.332757442 +0000 UTC m=+0.253111860 container init b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, distribution-scope=public, name=rhosp-rhel9/openstack-nova-novncproxy, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, batch=17.1_20260112.1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T23:32:22Z, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, managed_by=tripleo_ansible, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T23:32:22Z, com.redhat.component=openstack-nova-novncproxy-container, release=1766032510, vcs-type=git, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, tcib_managed=true, io.buildah.version=1.41.5, container_name=nova_vnc_proxy, architecture=x86_64, config_id=tripleo_step4, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.openshift.expose-services=) Feb 2 08:14:28 np0005604725 podman[112033]: unhealthy Feb 2 08:14:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:14:28 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:28 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Failed with result 'exit-code'. Feb 2 08:14:28 np0005604725 podman[111962]: 2026-02-02 08:14:28.360560211 +0000 UTC m=+0.557735733 container start ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, io.buildah.version=1.41.5, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, io.openshift.expose-services=, version=17.1.13, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, container_name=nova_scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-scheduler, name=rhosp-rhel9/openstack-nova-scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, config_id=tripleo_step4, com.redhat.component=openstack-nova-scheduler-container, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T23:32:05Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, tcib_managed=true, build-date=2026-01-12T23:32:05Z, maintainer=OpenStack TripleO Team) Feb 2 08:14:28 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name nova_scheduler --conmon-pidfile /run/nova_scheduler.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=0f33bf354435ad6e844c942ca95c792b --healthcheck-command /openstack/healthcheck 5672 --label config_id=tripleo_step4 --label container_name=nova_scheduler --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/nova_scheduler.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/nova:/var/log/nova --volume /var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 Feb 2 08:14:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:14:28 np0005604725 podman[112087]: 2026-02-02 08:14:28.378986624 +0000 UTC m=+0.299341042 container start b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, com.redhat.component=openstack-nova-novncproxy-container, managed_by=tripleo_ansible, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, container_name=nova_vnc_proxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, io.buildah.version=1.41.5, io.openshift.expose-services=, architecture=x86_64, name=rhosp-rhel9/openstack-nova-novncproxy, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, tcib_managed=true, vendor=Red Hat, Inc., batch=17.1_20260112.1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, maintainer=OpenStack TripleO Team, build-date=2026-01-12T23:32:22Z) Feb 2 08:14:28 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name nova_vnc_proxy --conmon-pidfile /run/nova_vnc_proxy.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=0f33bf354435ad6e844c942ca95c792b --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=nova_vnc_proxy --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/nova_vnc_proxy.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/nova:/var/log/nova --volume /var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro --volume /etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro --volume /etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro --volume /etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro --volume /etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro --volume /etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 Feb 2 08:14:28 np0005604725 systemd[1]: tmp-crun.UDmugF.mount: Deactivated successfully. Feb 2 08:14:28 np0005604725 podman[112197]: 2026-02-02 08:14:28.532840852 +0000 UTC m=+0.174011795 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=starting, url=https://www.redhat.com, com.redhat.component=openstack-nova-scheduler-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, version=17.1.13, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-nova-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T23:32:05Z, build-date=2026-01-12T23:32:05Z, description=Red Hat OpenStack Platform 17.1 nova-scheduler, release=1766032510, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, distribution-scope=public, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, container_name=nova_scheduler, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, vcs-type=git, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, tcib_managed=true) Feb 2 08:14:28 np0005604725 podman[112197]: 2026-02-02 08:14:28.665284606 +0000 UTC m=+0.306455519 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.created=2026-01-12T23:32:05Z, container_name=nova_scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T23:32:05Z, distribution-scope=public, managed_by=tripleo_ansible, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, version=17.1.13, com.redhat.component=openstack-nova-scheduler-container, description=Red Hat OpenStack Platform 17.1 nova-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, architecture=x86_64, name=rhosp-rhel9/openstack-nova-scheduler, url=https://www.redhat.com, config_id=tripleo_step4, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler) Feb 2 08:14:28 np0005604725 podman[112197]: unhealthy Feb 2 08:14:28 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:28 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Failed with result 'exit-code'. Feb 2 08:14:28 np0005604725 podman[112228]: 2026-02-02 08:14:28.691212308 +0000 UTC m=+0.302915771 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=starting, build-date=2026-01-12T23:32:22Z, version=17.1.13, io.openshift.expose-services=, url=https://www.redhat.com, com.redhat.component=openstack-nova-novncproxy-container, org.opencontainers.image.created=2026-01-12T23:32:22Z, release=1766032510, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, container_name=nova_vnc_proxy, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, vendor=Red Hat, Inc., vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, name=rhosp-rhel9/openstack-nova-novncproxy, distribution-scope=public, managed_by=tripleo_ansible, config_id=tripleo_step4, io.buildah.version=1.41.5, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64) Feb 2 08:14:28 np0005604725 podman[112266]: 2026-02-02 08:14:28.638085935 +0000 UTC m=+0.188376183 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 Feb 2 08:14:28 np0005604725 podman[112266]: 2026-02-02 08:14:28.748634752 +0000 UTC m=+0.298924980 container create 2c87629132aa73f54c0a8a353849f76f5fd258d15e18008ca9ca3e9739ca899a (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_auditor, distribution-scope=public, io.openshift.expose-services=, url=https://www.redhat.com, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:50:44Z, release=1766032510, build-date=2026-01-12T22:50:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, tcib_managed=true, managed_by=tripleo_ansible, architecture=x86_64, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, name=rhosp-rhel9/openstack-swift-account, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.component=openstack-swift-account-container, config_id=tripleo_step4, container_name=swift_account_auditor, summary=Red Hat OpenStack Platform 17.1 swift-account, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift:z', '/var/log/containers/swift:/var/log/swift:z']}) Feb 2 08:14:28 np0005604725 podman[112300]: 2026-02-02 08:14:28.715579802 +0000 UTC m=+0.180479932 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 Feb 2 08:14:28 np0005604725 podman[112300]: 2026-02-02 08:14:28.874709341 +0000 UTC m=+0.339609471 container create 5d08d60a78e92453e9a65eb55c8e95fccbeca0c99386444b664011390ab6ee6c (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_reaper, build-date=2026-01-12T22:50:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:50:44Z, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 swift-account, name=rhosp-rhel9/openstack-swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_reaper.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift:z', '/var/log/containers/swift:/var/log/swift:z']}, managed_by=tripleo_ansible, config_id=tripleo_step4, distribution-scope=public, com.redhat.component=openstack-swift-account-container, batch=17.1_20260112.1, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-account, io.buildah.version=1.41.5, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, maintainer=OpenStack TripleO Team, tcib_managed=true, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=swift_account_reaper, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account) Feb 2 08:14:28 np0005604725 systemd[1]: Started libpod-conmon-2c87629132aa73f54c0a8a353849f76f5fd258d15e18008ca9ca3e9739ca899a.scope. Feb 2 08:14:28 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/77b15ca2eeaa1fcecf80760f601e8a1d351220e4d0ef6e54055b960f4261b752/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/77b15ca2eeaa1fcecf80760f601e8a1d351220e4d0ef6e54055b960f4261b752/merged/var/log/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/77b15ca2eeaa1fcecf80760f601e8a1d351220e4d0ef6e54055b960f4261b752/merged/var/cache/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:28 np0005604725 systemd[1]: Started libpod-conmon-5d08d60a78e92453e9a65eb55c8e95fccbeca0c99386444b664011390ab6ee6c.scope. Feb 2 08:14:28 np0005604725 podman[112266]: 2026-02-02 08:14:28.941258054 +0000 UTC m=+0.491548272 container init 2c87629132aa73f54c0a8a353849f76f5fd258d15e18008ca9ca3e9739ca899a (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_auditor, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, url=https://www.redhat.com, io.buildah.version=1.41.5, config_id=tripleo_step4, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.component=openstack-swift-account-container, container_name=swift_account_auditor, name=rhosp-rhel9/openstack-swift-account, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, architecture=x86_64, io.openshift.expose-services=, vcs-type=git, managed_by=tripleo_ansible, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:44Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, build-date=2026-01-12T22:50:44Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift:z', '/var/log/containers/swift:/var/log/swift:z']}, version=17.1.13, description=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:14:28 np0005604725 podman[112266]: 2026-02-02 08:14:28.955640373 +0000 UTC m=+0.505930601 container start 2c87629132aa73f54c0a8a353849f76f5fd258d15e18008ca9ca3e9739ca899a (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_auditor, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, io.openshift.expose-services=, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 swift-account, container_name=swift_account_auditor, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:44Z, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, url=https://www.redhat.com, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-account, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift:z', '/var/log/containers/swift:/var/log/swift:z']}, tcib_managed=true, architecture=x86_64, batch=17.1_20260112.1, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:50:44Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-swift-account-container, release=1766032510, name=rhosp-rhel9/openstack-swift-account, vendor=Red Hat, Inc.) Feb 2 08:14:28 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_account_auditor --conmon-pidfile /run/swift_account_auditor.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --label config_id=tripleo_step4 --label container_name=swift_account_auditor --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift:z', '/var/log/containers/swift:/var/log/swift:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_account_auditor.log --network host --user swift --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_account_auditor.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /srv/node:/srv/node --volume /dev:/dev --volume /var/cache/swift:/var/cache/swift:z --volume /var/log/containers/swift:/var/log/swift:z registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 Feb 2 08:14:28 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6f82df4d8264ee82069260c31ea6e0a5dcc4974bda90c3bf9ff37ac8ceb6ae0b/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6f82df4d8264ee82069260c31ea6e0a5dcc4974bda90c3bf9ff37ac8ceb6ae0b/merged/var/log/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:28 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6f82df4d8264ee82069260c31ea6e0a5dcc4974bda90c3bf9ff37ac8ceb6ae0b/merged/var/cache/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:28 np0005604725 podman[112300]: 2026-02-02 08:14:28.999621026 +0000 UTC m=+0.464521166 container init 5d08d60a78e92453e9a65eb55c8e95fccbeca0c99386444b664011390ab6ee6c (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_reaper, name=rhosp-rhel9/openstack-swift-account, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 swift-account, distribution-scope=public, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, architecture=x86_64, config_id=tripleo_step4, io.openshift.expose-services=, container_name=swift_account_reaper, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, url=https://www.redhat.com, managed_by=tripleo_ansible, build-date=2026-01-12T22:50:44Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-swift-account-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:50:44Z, version=17.1.13, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_reaper.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift:z', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:14:29 np0005604725 podman[112300]: 2026-02-02 08:14:29.009638212 +0000 UTC m=+0.474538342 container start 5d08d60a78e92453e9a65eb55c8e95fccbeca0c99386444b664011390ab6ee6c (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_reaper, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, vendor=Red Hat, Inc., config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 swift-account, container_name=swift_account_reaper, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:50:44Z, io.buildah.version=1.41.5, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_reaper.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift:z', '/var/log/containers/swift:/var/log/swift:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:44Z, name=rhosp-rhel9/openstack-swift-account, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, com.redhat.component=openstack-swift-account-container, url=https://www.redhat.com, managed_by=tripleo_ansible, version=17.1.13, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, architecture=x86_64) Feb 2 08:14:29 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_account_reaper --conmon-pidfile /run/swift_account_reaper.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --label config_id=tripleo_step4 --label container_name=swift_account_reaper --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_reaper.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift:z', '/var/log/containers/swift:/var/log/swift:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_account_reaper.log --network host --user swift --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_account_reaper.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /srv/node:/srv/node --volume /dev:/dev --volume /var/cache/swift:/var/cache/swift:z --volume /var/log/containers/swift:/var/log/swift:z registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 Feb 2 08:14:29 np0005604725 podman[112502]: 2026-02-02 08:14:29.348609583 +0000 UTC m=+0.187832477 container create 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, name=rhosp-rhel9/openstack-swift-account, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, build-date=2026-01-12T22:50:44Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.expose-services=, tcib_managed=true, container_name=swift_account_replicator, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, com.redhat.component=openstack-swift-account-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, release=1766032510, vcs-type=git) Feb 2 08:14:29 np0005604725 podman[112502]: 2026-02-02 08:14:29.249042613 +0000 UTC m=+0.088265527 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 Feb 2 08:14:29 np0005604725 podman[112504]: 2026-02-02 08:14:29.247103094 +0000 UTC m=+0.078281762 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 Feb 2 08:14:29 np0005604725 podman[112504]: 2026-02-02 08:14:29.377580237 +0000 UTC m=+0.208758875 container create e0ae162e678e8058f20ec88f15a01f67593c22e20a0d9a652448da6732e0d4be (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_auditor, io.openshift.expose-services=, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, name=rhosp-rhel9/openstack-swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, build-date=2026-01-12T22:50:57Z, config_id=tripleo_step4, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, vcs-type=git, com.redhat.component=openstack-swift-container-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, distribution-scope=public, managed_by=tripleo_ansible, version=17.1.13, container_name=swift_container_auditor, description=Red Hat OpenStack Platform 17.1 swift-container, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510) Feb 2 08:14:29 np0005604725 podman[112228]: 2026-02-02 08:14:29.42154955 +0000 UTC m=+1.033252983 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, io.openshift.expose-services=, com.redhat.component=openstack-nova-novncproxy-container, tcib_managed=true, name=rhosp-rhel9/openstack-nova-novncproxy, distribution-scope=public, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, build-date=2026-01-12T23:32:22Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, config_id=tripleo_step4, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, container_name=nova_vnc_proxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, vcs-type=git, release=1766032510, version=17.1.13, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:14:29 np0005604725 podman[112228]: unhealthy Feb 2 08:14:29 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:29 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Failed with result 'exit-code'. Feb 2 08:14:29 np0005604725 systemd[1]: Started libpod-conmon-79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.scope. Feb 2 08:14:29 np0005604725 systemd[1]: tmp-crun.UWLOkn.mount: Deactivated successfully. Feb 2 08:14:29 np0005604725 systemd[1]: Started libpod-conmon-e0ae162e678e8058f20ec88f15a01f67593c22e20a0d9a652448da6732e0d4be.scope. Feb 2 08:14:29 np0005604725 podman[112530]: 2026-02-02 08:14:29.515200181 +0000 UTC m=+0.276293369 container create e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, vcs-type=git, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:50:44Z, description=Red Hat OpenStack Platform 17.1 swift-account, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:50:44Z, batch=17.1_20260112.1, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, name=rhosp-rhel9/openstack-swift-account, io.buildah.version=1.41.5, container_name=swift_account_server, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, com.redhat.component=openstack-swift-account-container, version=17.1.13, maintainer=OpenStack TripleO Team, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}) Feb 2 08:14:29 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:29 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:29 np0005604725 podman[112530]: 2026-02-02 08:14:29.426344007 +0000 UTC m=+0.187437215 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 Feb 2 08:14:29 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/9e5262445c3406ce75d0ed3adbb627ab04b6ba7170eb7ec643d0be0427fff249/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:29 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/9e5262445c3406ce75d0ed3adbb627ab04b6ba7170eb7ec643d0be0427fff249/merged/var/cache/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:29 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/9e5262445c3406ce75d0ed3adbb627ab04b6ba7170eb7ec643d0be0427fff249/merged/var/log/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:29 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c418a5812c14451c770b6045c455237a8fcc608eb9d444445d6079513ec29ee5/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:29 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c418a5812c14451c770b6045c455237a8fcc608eb9d444445d6079513ec29ee5/merged/var/cache/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:29 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c418a5812c14451c770b6045c455237a8fcc608eb9d444445d6079513ec29ee5/merged/var/log/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:29 np0005604725 systemd[1]: Started libpod-conmon-e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.scope. Feb 2 08:14:29 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:14:29 np0005604725 podman[112502]: 2026-02-02 08:14:29.591743608 +0000 UTC m=+0.430966532 container init 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-account-container, build-date=2026-01-12T22:50:44Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_account_replicator, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, tcib_managed=true, vcs-type=git, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, managed_by=tripleo_ansible, architecture=x86_64, release=1766032510, name=rhosp-rhel9/openstack-swift-account, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 swift-account, url=https://www.redhat.com, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:44Z, version=17.1.13) Feb 2 08:14:29 np0005604725 podman[112504]: 2026-02-02 08:14:29.602977861 +0000 UTC m=+0.434156509 container init e0ae162e678e8058f20ec88f15a01f67593c22e20a0d9a652448da6732e0d4be (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_auditor, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, vendor=Red Hat, Inc., container_name=swift_container_auditor, com.redhat.component=openstack-swift-container-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, release=1766032510, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-swift-container, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:57Z, version=17.1.13, description=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:57Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, batch=17.1_20260112.1, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, distribution-scope=public, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:14:29 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:29 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7033b787792e5ebd46704978e900915ef5e81c5ac742da6df530de42624b22b8/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:29 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7033b787792e5ebd46704978e900915ef5e81c5ac742da6df530de42624b22b8/merged/var/cache/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:29 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7033b787792e5ebd46704978e900915ef5e81c5ac742da6df530de42624b22b8/merged/var/log/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:29 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:14:29 np0005604725 podman[112502]: 2026-02-02 08:14:29.64322074 +0000 UTC m=+0.482443644 container start 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, managed_by=tripleo_ansible, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, config_id=tripleo_step4, name=rhosp-rhel9/openstack-swift-account, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, architecture=x86_64, com.redhat.component=openstack-swift-account-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, container_name=swift_account_replicator, release=1766032510, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, build-date=2026-01-12T22:50:44Z, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 swift-account, vendor=Red Hat, Inc.) Feb 2 08:14:29 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_account_replicator --conmon-pidfile /run/swift_account_replicator.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=swift_account_replicator --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_account_replicator.log --network host --user swift --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /srv/node:/srv/node --volume /dev:/dev --volume /var/cache/swift:/var/cache/swift --volume /var/log/containers/swift:/var/log/swift:z registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 Feb 2 08:14:29 np0005604725 podman[112504]: 2026-02-02 08:14:29.672059651 +0000 UTC m=+0.503238309 container start e0ae162e678e8058f20ec88f15a01f67593c22e20a0d9a652448da6732e0d4be (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_auditor, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, build-date=2026-01-12T22:50:57Z, batch=17.1_20260112.1, config_id=tripleo_step4, name=rhosp-rhel9/openstack-swift-container, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, release=1766032510, distribution-scope=public, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 swift-container, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:57Z, container_name=swift_container_auditor, com.redhat.component=openstack-swift-container-container) Feb 2 08:14:29 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_container_auditor --conmon-pidfile /run/swift_container_auditor.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --label config_id=tripleo_step4 --label container_name=swift_container_auditor --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_container_auditor.log --network host --user swift --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_container_auditor.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /srv/node:/srv/node --volume /dev:/dev --volume /var/cache/swift:/var/cache/swift --volume /var/log/containers/swift:/var/log/swift:z registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 Feb 2 08:14:29 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:14:29 np0005604725 podman[112530]: 2026-02-02 08:14:29.688527393 +0000 UTC m=+0.449620601 container init e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, architecture=x86_64, batch=17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, url=https://www.redhat.com, container_name=swift_account_server, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-account-container, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, vendor=Red Hat, Inc., io.buildah.version=1.41.5, config_id=tripleo_step4, vcs-type=git, name=rhosp-rhel9/openstack-swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-account, build-date=2026-01-12T22:50:44Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.created=2026-01-12T22:50:44Z, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 swift-account) Feb 2 08:14:29 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:14:29 np0005604725 podman[112627]: 2026-02-02 08:14:29.785156404 +0000 UTC m=+0.142771511 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=starting, org.opencontainers.image.created=2026-01-12T22:50:44Z, architecture=x86_64, managed_by=tripleo_ansible, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, url=https://www.redhat.com, release=1766032510, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-account, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, build-date=2026-01-12T22:50:44Z, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, name=rhosp-rhel9/openstack-swift-account, com.redhat.component=openstack-swift-account-container, container_name=swift_account_replicator, tcib_managed=true, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}) Feb 2 08:14:29 np0005604725 podman[112530]: 2026-02-02 08:14:29.850905612 +0000 UTC m=+0.611998800 container start e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, name=rhosp-rhel9/openstack-swift-account, release=1766032510, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:50:44Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, container_name=swift_account_server, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, vendor=Red Hat, Inc., batch=17.1_20260112.1, url=https://www.redhat.com, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, managed_by=tripleo_ansible, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.expose-services=, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, config_id=tripleo_step4, vcs-type=git, com.redhat.component=openstack-swift-account-container) Feb 2 08:14:29 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_account_server --conmon-pidfile /run/swift_account_server.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=swift_account_server --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_account_server.log --network host --user swift --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /srv/node:/srv/node --volume /dev:/dev --volume /var/cache/swift:/var/cache/swift --volume /var/log/containers/swift:/var/log/swift:z registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 Feb 2 08:14:29 np0005604725 podman[112627]: 2026-02-02 08:14:29.862887338 +0000 UTC m=+0.220502435 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, managed_by=tripleo_ansible, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-account-container, build-date=2026-01-12T22:50:44Z, container_name=swift_account_replicator, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, config_id=tripleo_step4, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, description=Red Hat OpenStack Platform 17.1 swift-account, url=https://www.redhat.com, version=17.1.13, architecture=x86_64, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-account, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, name=rhosp-rhel9/openstack-swift-account, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:14:29 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:14:29 np0005604725 podman[112647]: 2026-02-02 08:14:29.816409888 +0000 UTC m=+0.136395646 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 Feb 2 08:14:29 np0005604725 podman[112647]: 2026-02-02 08:14:29.930651017 +0000 UTC m=+0.250636755 container create 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:50:57Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, architecture=x86_64, container_name=swift_container_replicator, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, vcs-type=git, name=rhosp-rhel9/openstack-swift-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, tcib_managed=true, io.buildah.version=1.41.5, com.redhat.component=openstack-swift-container-container, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:50:57Z, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, version=17.1.13, url=https://www.redhat.com, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vendor=Red Hat, Inc., distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-container, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:14:29 np0005604725 podman[112680]: 2026-02-02 08:14:29.933552636 +0000 UTC m=+0.183838615 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=starting, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, architecture=x86_64, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, maintainer=OpenStack TripleO Team, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:44Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, build-date=2026-01-12T22:50:44Z, com.redhat.component=openstack-swift-account-container, vcs-type=git, container_name=swift_account_server, tcib_managed=true, managed_by=tripleo_ansible, vendor=Red Hat, Inc., release=1766032510, description=Red Hat OpenStack Platform 17.1 swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, config_id=tripleo_step4, name=rhosp-rhel9/openstack-swift-account, batch=17.1_20260112.1, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}) Feb 2 08:14:29 np0005604725 podman[112689]: 2026-02-02 08:14:29.970838314 +0000 UTC m=+0.191836879 container create 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.component=openstack-swift-container-container, batch=17.1_20260112.1, managed_by=tripleo_ansible, version=17.1.13, io.buildah.version=1.41.5, distribution-scope=public, release=1766032510, container_name=swift_container_server, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:57Z, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, config_id=tripleo_step4, vcs-type=git, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, build-date=2026-01-12T22:50:57Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-container, name=rhosp-rhel9/openstack-swift-container) Feb 2 08:14:29 np0005604725 podman[112689]: 2026-02-02 08:14:29.868940903 +0000 UTC m=+0.089939478 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 Feb 2 08:14:30 np0005604725 systemd[1]: Started libpod-conmon-3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.scope. Feb 2 08:14:30 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:30 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0c50e7a50d9c7ed68bc8afd37463747a58c73df4e88178672daf85ded868c241/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:30 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0c50e7a50d9c7ed68bc8afd37463747a58c73df4e88178672daf85ded868c241/merged/var/log/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:30 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0c50e7a50d9c7ed68bc8afd37463747a58c73df4e88178672daf85ded868c241/merged/var/cache/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:30 np0005604725 systemd[1]: Started libpod-conmon-42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.scope. Feb 2 08:14:30 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:30 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/17c84b08f4f0b89b82a1a36fb1767a233457a85cabb038fa782f53056491fe06/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:30 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/17c84b08f4f0b89b82a1a36fb1767a233457a85cabb038fa782f53056491fe06/merged/var/cache/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:30 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/17c84b08f4f0b89b82a1a36fb1767a233457a85cabb038fa782f53056491fe06/merged/var/log/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:14:30 np0005604725 podman[112647]: 2026-02-02 08:14:30.170947865 +0000 UTC m=+0.490933613 container init 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-container, config_id=tripleo_step4, release=1766032510, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:50:57Z, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 swift-container, container_name=swift_container_replicator, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, com.redhat.component=openstack-swift-container-container, distribution-scope=public, name=rhosp-rhel9/openstack-swift-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, vcs-type=git, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, build-date=2026-01-12T22:50:57Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container) Feb 2 08:14:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:14:30 np0005604725 podman[112689]: 2026-02-02 08:14:30.183369004 +0000 UTC m=+0.404367609 container init 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:50:57Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, url=https://www.redhat.com, container_name=swift_container_server, batch=17.1_20260112.1, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:50:57Z, distribution-scope=public, com.redhat.component=openstack-swift-container-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, release=1766032510, config_id=tripleo_step4, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, name=rhosp-rhel9/openstack-swift-container, vendor=Red Hat, Inc., io.openshift.expose-services=, managed_by=tripleo_ansible) Feb 2 08:14:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:14:30 np0005604725 podman[112647]: 2026-02-02 08:14:30.211971617 +0000 UTC m=+0.531957375 container start 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, description=Red Hat OpenStack Platform 17.1 swift-container, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, config_id=tripleo_step4, name=rhosp-rhel9/openstack-swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, vcs-type=git, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:50:57Z, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=swift_container_replicator, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.buildah.version=1.41.5, com.redhat.component=openstack-swift-container-container, managed_by=tripleo_ansible, version=17.1.13, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:57Z, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 swift-container, batch=17.1_20260112.1) Feb 2 08:14:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:14:30 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_container_replicator --conmon-pidfile /run/swift_container_replicator.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=swift_container_replicator --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_container_replicator.log --network host --user swift --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /srv/node:/srv/node --volume /dev:/dev --volume /var/cache/swift:/var/cache/swift --volume /var/log/containers/swift:/var/log/swift:z registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 Feb 2 08:14:30 np0005604725 podman[112689]: 2026-02-02 08:14:30.306603817 +0000 UTC m=+0.527602362 container start 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.component=openstack-swift-container-container, tcib_managed=true, maintainer=OpenStack TripleO Team, version=17.1.13, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:57Z, managed_by=tripleo_ansible, url=https://www.redhat.com, distribution-scope=public, name=rhosp-rhel9/openstack-swift-container, container_name=swift_container_server, architecture=x86_64, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:50:57Z, release=1766032510, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, io.openshift.expose-services=) Feb 2 08:14:30 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_container_server --conmon-pidfile /run/swift_container_server.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=swift_container_server --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_container_server.log --network host --user swift --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /srv/node:/srv/node --volume /dev:/dev --volume /var/cache/swift:/var/cache/swift --volume /var/log/containers/swift:/var/log/swift:z registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 Feb 2 08:14:30 np0005604725 podman[112680]: 2026-02-02 08:14:30.388796647 +0000 UTC m=+0.639082596 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:50:44Z, build-date=2026-01-12T22:50:44Z, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-account, release=1766032510, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=swift_account_server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.component=openstack-swift-account-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, name=rhosp-rhel9/openstack-swift-account, vcs-type=git, vendor=Red Hat, Inc., io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, tcib_managed=true, batch=17.1_20260112.1, architecture=x86_64) Feb 2 08:14:30 np0005604725 podman[112680]: unhealthy Feb 2 08:14:30 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:30 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Failed with result 'exit-code'. Feb 2 08:14:30 np0005604725 podman[112813]: 2026-02-02 08:14:30.417230506 +0000 UTC m=+0.182437973 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=starting, vcs-type=git, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, architecture=x86_64, managed_by=tripleo_ansible, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-container-container, summary=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, io.buildah.version=1.41.5, version=17.1.13, container_name=swift_container_replicator, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, description=Red Hat OpenStack Platform 17.1 swift-container, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., release=1766032510, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:57Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, build-date=2026-01-12T22:50:57Z, name=rhosp-rhel9/openstack-swift-container) Feb 2 08:14:30 np0005604725 podman[112823]: 2026-02-02 08:14:30.500095916 +0000 UTC m=+0.257965058 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=starting, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, release=1766032510, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.created=2026-01-12T22:50:57Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 swift-container, vendor=Red Hat, Inc., container_name=swift_container_server, batch=17.1_20260112.1, io.openshift.expose-services=, build-date=2026-01-12T22:50:57Z, managed_by=tripleo_ansible, architecture=x86_64, distribution-scope=public, io.buildah.version=1.41.5, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-swift-container-container, name=rhosp-rhel9/openstack-swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git) Feb 2 08:14:30 np0005604725 podman[112813]: 2026-02-02 08:14:30.570889658 +0000 UTC m=+0.336097145 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, url=https://www.redhat.com, tcib_managed=true, release=1766032510, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, name=rhosp-rhel9/openstack-swift-container, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.component=openstack-swift-container-container, architecture=x86_64, distribution-scope=public, io.openshift.expose-services=, container_name=swift_container_replicator, io.buildah.version=1.41.5, vcs-type=git, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:57Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, managed_by=tripleo_ansible, build-date=2026-01-12T22:50:57Z, config_id=tripleo_step4) Feb 2 08:14:30 np0005604725 podman[112813]: unhealthy Feb 2 08:14:30 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:30 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Failed with result 'exit-code'. Feb 2 08:14:30 np0005604725 podman[113022]: 2026-02-02 08:14:30.77658913 +0000 UTC m=+0.193855531 container create 38cd6aa9ef38130620a1c205bdf80b0294929b858dcb1e10e5fdedaa9a1a34c0 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_updater, batch=17.1_20260112.1, tcib_managed=true, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.openshift.expose-services=, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:57Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, architecture=x86_64, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 swift-container, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 swift-container, managed_by=tripleo_ansible, com.redhat.component=openstack-swift-container-container, name=rhosp-rhel9/openstack-swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_updater.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, config_id=tripleo_step4, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=swift_container_updater, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:50:57Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:14:30 np0005604725 podman[113022]: 2026-02-02 08:14:30.692318856 +0000 UTC m=+0.109585257 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 Feb 2 08:14:30 np0005604725 systemd[1]: Started libpod-conmon-38cd6aa9ef38130620a1c205bdf80b0294929b858dcb1e10e5fdedaa9a1a34c0.scope. Feb 2 08:14:30 np0005604725 podman[113076]: 2026-02-02 08:14:30.968569611 +0000 UTC m=+0.177709597 container create 7b861517ba844e990aed3655789e67eb67fa37a3bbafb47199a553218e14bcbc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_object_expirer, org.opencontainers.image.created=2026-01-12T22:50:51Z, name=rhosp-rhel9/openstack-swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, io.buildah.version=1.41.5, io.openshift.expose-services=, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=swift_object_expirer, build-date=2026-01-12T22:50:51Z, distribution-scope=public, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, url=https://www.redhat.com, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_expirer.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, version=17.1.13, maintainer=OpenStack TripleO Team, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, architecture=x86_64, vendor=Red Hat, Inc., release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:14:30 np0005604725 podman[113076]: 2026-02-02 08:14:30.868642801 +0000 UTC m=+0.077782777 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Feb 2 08:14:30 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:31 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5280c21232484882f1e1bbdf1a0ee4cba531553aec54c857221c38a6d707b852/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:31 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5280c21232484882f1e1bbdf1a0ee4cba531553aec54c857221c38a6d707b852/merged/var/log/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:31 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5280c21232484882f1e1bbdf1a0ee4cba531553aec54c857221c38a6d707b852/merged/var/cache/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:31 np0005604725 podman[113022]: 2026-02-02 08:14:31.030991858 +0000 UTC m=+0.448258249 container init 38cd6aa9ef38130620a1c205bdf80b0294929b858dcb1e10e5fdedaa9a1a34c0 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_updater, tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_updater.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vendor=Red Hat, Inc., container_name=swift_container_updater, architecture=x86_64, io.openshift.expose-services=, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, io.buildah.version=1.41.5, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, name=rhosp-rhel9/openstack-swift-container, managed_by=tripleo_ansible, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-swift-container-container, build-date=2026-01-12T22:50:57Z) Feb 2 08:14:31 np0005604725 podman[113119]: 2026-02-02 08:14:31.043530621 +0000 UTC m=+0.147682671 container create c45b2e87342537702fedfecfd85221ac3cd0f17a15eebef60f9ebc7217e6ad00 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_auditor, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, version=17.1.13, vcs-type=git, name=rhosp-rhel9/openstack-swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, container_name=swift_object_auditor, architecture=x86_64, tcib_managed=true, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, release=1766032510, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, distribution-scope=public, build-date=2026-01-12T22:50:56Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-object, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, description=Red Hat OpenStack Platform 17.1 swift-object, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:14:31 np0005604725 systemd[1]: Started libpod-conmon-7b861517ba844e990aed3655789e67eb67fa37a3bbafb47199a553218e14bcbc.scope. Feb 2 08:14:31 np0005604725 podman[113119]: 2026-02-02 08:14:30.974317717 +0000 UTC m=+0.078469787 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Feb 2 08:14:31 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:31 np0005604725 podman[112823]: 2026-02-02 08:14:31.088922916 +0000 UTC m=+0.846792058 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, name=rhosp-rhel9/openstack-swift-container, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-swift-container-container, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 swift-container, io.buildah.version=1.41.5, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, container_name=swift_container_server, io.openshift.expose-services=, build-date=2026-01-12T22:50:57Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:50:57Z, summary=Red Hat OpenStack Platform 17.1 swift-container, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vcs-type=git, maintainer=OpenStack TripleO Team, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, managed_by=tripleo_ansible) Feb 2 08:14:31 np0005604725 systemd[1]: Started libpod-conmon-c45b2e87342537702fedfecfd85221ac3cd0f17a15eebef60f9ebc7217e6ad00.scope. Feb 2 08:14:31 np0005604725 podman[112823]: unhealthy Feb 2 08:14:31 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/f3a8f0bae9016ac48740f573ffd8e8456cfbdc77893cc0512f223871ce80997f/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:31 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/f3a8f0bae9016ac48740f573ffd8e8456cfbdc77893cc0512f223871ce80997f/merged/var/cache/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:31 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/f3a8f0bae9016ac48740f573ffd8e8456cfbdc77893cc0512f223871ce80997f/merged/var/log/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:31 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:31 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Failed with result 'exit-code'. Feb 2 08:14:31 np0005604725 podman[113076]: 2026-02-02 08:14:31.117946103 +0000 UTC m=+0.327086089 container init 7b861517ba844e990aed3655789e67eb67fa37a3bbafb47199a553218e14bcbc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_object_expirer, name=rhosp-rhel9/openstack-swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:50:51Z, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_expirer.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, batch=17.1_20260112.1, distribution-scope=public, tcib_managed=true, vendor=Red Hat, Inc., config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, release=1766032510, container_name=swift_object_expirer, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, build-date=2026-01-12T22:50:51Z) Feb 2 08:14:31 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:31 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/876f7abc30a0bca30f6ddb969f04d460f543df67e3f6da0bdd8b9e0c99600135/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:31 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/876f7abc30a0bca30f6ddb969f04d460f543df67e3f6da0bdd8b9e0c99600135/merged/var/log/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:31 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/876f7abc30a0bca30f6ddb969f04d460f543df67e3f6da0bdd8b9e0c99600135/merged/var/cache/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:31 np0005604725 podman[113076]: 2026-02-02 08:14:31.133419765 +0000 UTC m=+0.342559751 container start 7b861517ba844e990aed3655789e67eb67fa37a3bbafb47199a553218e14bcbc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_object_expirer, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, vendor=Red Hat, Inc., tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_expirer.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, batch=17.1_20260112.1, release=1766032510, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=swift_object_expirer, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-swift-proxy-server, config_id=tripleo_step4, com.redhat.component=openstack-swift-proxy-server-container, org.opencontainers.image.created=2026-01-12T22:50:51Z, build-date=2026-01-12T22:50:51Z, io.openshift.expose-services=, url=https://www.redhat.com, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:14:31 np0005604725 podman[113119]: 2026-02-02 08:14:31.157569263 +0000 UTC m=+0.261721313 container init c45b2e87342537702fedfecfd85221ac3cd0f17a15eebef60f9ebc7217e6ad00 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_auditor, com.redhat.component=openstack-swift-object-container, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, version=17.1.13, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:56Z, vcs-type=git, io.buildah.version=1.41.5, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, managed_by=tripleo_ansible, container_name=swift_object_auditor) Feb 2 08:14:31 np0005604725 podman[113119]: 2026-02-02 08:14:31.179539934 +0000 UTC m=+0.283691984 container start c45b2e87342537702fedfecfd85221ac3cd0f17a15eebef60f9ebc7217e6ad00 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_auditor, com.redhat.component=openstack-swift-object-container, distribution-scope=public, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, container_name=swift_object_auditor, description=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:50:56Z, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, config_id=tripleo_step4, architecture=x86_64, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, vcs-type=git, tcib_managed=true, io.openshift.expose-services=, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-swift-object, version=17.1.13) Feb 2 08:14:31 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_object_auditor --conmon-pidfile /run/swift_object_auditor.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --label config_id=tripleo_step4 --label container_name=swift_object_auditor --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_object_auditor.log --network host --user swift --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_object_auditor.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /srv/node:/srv/node --volume /dev:/dev --volume /var/cache/swift:/var/cache/swift --volume /var/log/containers/swift:/var/log/swift:z registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Feb 2 08:14:31 np0005604725 podman[113154]: 2026-02-02 08:14:31.107472423 +0000 UTC m=+0.106639297 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Feb 2 08:14:31 np0005604725 podman[113022]: 2026-02-02 08:14:31.211603923 +0000 UTC m=+0.628870314 container start 38cd6aa9ef38130620a1c205bdf80b0294929b858dcb1e10e5fdedaa9a1a34c0 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_updater, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-container, name=rhosp-rhel9/openstack-swift-container, container_name=swift_container_updater, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, build-date=2026-01-12T22:50:57Z, vcs-type=git, architecture=x86_64, io.openshift.expose-services=, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-swift-container-container, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, org.opencontainers.image.created=2026-01-12T22:50:57Z, io.buildah.version=1.41.5, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_updater.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, config_id=tripleo_step4, distribution-scope=public) Feb 2 08:14:31 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_container_updater --conmon-pidfile /run/swift_container_updater.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --label config_id=tripleo_step4 --label container_name=swift_container_updater --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_updater.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_container_updater.log --network host --user swift --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_container_updater.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /srv/node:/srv/node --volume /dev:/dev --volume /var/cache/swift:/var/cache/swift --volume /var/log/containers/swift:/var/log/swift:z registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 Feb 2 08:14:31 np0005604725 podman[113154]: 2026-02-02 08:14:31.24458189 +0000 UTC m=+0.243748754 container create bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:56Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, summary=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64, com.redhat.component=openstack-swift-object-container, config_id=tripleo_step4, tcib_managed=true, build-date=2026-01-12T22:50:56Z, io.openshift.expose-services=, container_name=swift_object_replicator, vcs-type=git, description=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, vendor=Red Hat, Inc., io.buildah.version=1.41.5, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, managed_by=tripleo_ansible, version=17.1.13, release=1766032510) Feb 2 08:14:31 np0005604725 podman[113184]: 2026-02-02 08:14:31.152332203 +0000 UTC m=+0.077348503 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Feb 2 08:14:31 np0005604725 systemd[1]: Started libpod-conmon-bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.scope. Feb 2 08:14:31 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:31 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b94cfb23304559cb18ac6758e65adba5304df953ddf779a2981a29a9d9db3f34/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:31 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b94cfb23304559cb18ac6758e65adba5304df953ddf779a2981a29a9d9db3f34/merged/var/log/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:31 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b94cfb23304559cb18ac6758e65adba5304df953ddf779a2981a29a9d9db3f34/merged/var/cache/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:31 np0005604725 podman[113184]: 2026-02-02 08:14:31.47052257 +0000 UTC m=+0.395538850 container create 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, managed_by=tripleo_ansible, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, tcib_managed=true, vcs-type=git, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-object, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-object-container, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_object_server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.openshift.expose-services=, release=1766032510, summary=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:50:56Z, build-date=2026-01-12T22:50:56Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:14:31 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:14:31 np0005604725 podman[113154]: 2026-02-02 08:14:31.48953304 +0000 UTC m=+0.488699924 container init bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, com.redhat.component=openstack-swift-object-container, release=1766032510, vcs-type=git, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, batch=17.1_20260112.1, container_name=swift_object_replicator, architecture=x86_64, name=rhosp-rhel9/openstack-swift-object, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:50:56Z, version=17.1.13, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:56Z, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public) Feb 2 08:14:31 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:14:31 np0005604725 systemd[1]: Started libpod-conmon-97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.scope. Feb 2 08:14:31 np0005604725 podman[113154]: 2026-02-02 08:14:31.555840325 +0000 UTC m=+0.555007189 container start bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:50:56Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, version=17.1.13, vcs-type=git, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, com.redhat.component=openstack-swift-object-container, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-swift-object, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, architecture=x86_64, container_name=swift_object_replicator, build-date=2026-01-12T22:50:56Z, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com) Feb 2 08:14:31 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_object_replicator --conmon-pidfile /run/swift_object_replicator.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=swift_object_replicator --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_object_replicator.log --network host --user swift --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /srv/node:/srv/node --volume /dev:/dev --volume /var/cache/swift:/var/cache/swift --volume /var/log/containers/swift:/var/log/swift:z registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Feb 2 08:14:31 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:31 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ea32b163f483c7c7838ea131c70d5cf2527e9a1bc683c06550ceeeaa40cc282b/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:31 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ea32b163f483c7c7838ea131c70d5cf2527e9a1bc683c06550ceeeaa40cc282b/merged/var/cache/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:31 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ea32b163f483c7c7838ea131c70d5cf2527e9a1bc683c06550ceeeaa40cc282b/merged/var/log/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:31 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:14:31 np0005604725 podman[113184]: 2026-02-02 08:14:31.647232086 +0000 UTC m=+0.572248386 container init 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, release=1766032510, version=17.1.13, url=https://www.redhat.com, build-date=2026-01-12T22:50:56Z, name=rhosp-rhel9/openstack-swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, architecture=x86_64, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:50:56Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, tcib_managed=true, managed_by=tripleo_ansible, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=swift_object_server, com.redhat.component=openstack-swift-object-container, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-object, vcs-type=git, batch=17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, maintainer=OpenStack TripleO Team) Feb 2 08:14:31 np0005604725 podman[113279]: 2026-02-02 08:14:31.670055013 +0000 UTC m=+0.123908485 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=starting, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, build-date=2026-01-12T22:50:56Z, name=rhosp-rhel9/openstack-swift-object, release=1766032510, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:50:56Z, version=17.1.13, com.redhat.component=openstack-swift-object-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, container_name=swift_object_replicator, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 swift-object, vendor=Red Hat, Inc., vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, architecture=x86_64, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:14:31 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:14:31 np0005604725 podman[113184]: 2026-02-02 08:14:31.688842006 +0000 UTC m=+0.613858296 container start 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, release=1766032510, name=rhosp-rhel9/openstack-swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.created=2026-01-12T22:50:56Z, vcs-type=git, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-object, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, url=https://www.redhat.com, version=17.1.13, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-object-container, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, build-date=2026-01-12T22:50:56Z, architecture=x86_64, batch=17.1_20260112.1, container_name=swift_object_server, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4) Feb 2 08:14:31 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_object_server --conmon-pidfile /run/swift_object_server.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=swift_object_server --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_object_server.log --network host --user swift --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /srv/node:/srv/node --volume /dev:/dev --volume /var/cache/swift:/var/cache/swift --volume /var/log/containers/swift:/var/log/swift:z registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Feb 2 08:14:31 np0005604725 podman[113337]: 2026-02-02 08:14:31.844119518 +0000 UTC m=+0.147393932 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=starting, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, config_id=tripleo_step4, version=17.1.13, io.buildah.version=1.41.5, vendor=Red Hat, Inc., architecture=x86_64, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-swift-object-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, batch=17.1_20260112.1, managed_by=tripleo_ansible, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, build-date=2026-01-12T22:50:56Z, container_name=swift_object_server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:56Z) Feb 2 08:14:31 np0005604725 podman[113279]: 2026-02-02 08:14:31.904296505 +0000 UTC m=+0.358149987 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, maintainer=OpenStack TripleO Team, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, tcib_managed=true, name=rhosp-rhel9/openstack-swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, org.opencontainers.image.created=2026-01-12T22:50:56Z, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, managed_by=tripleo_ansible, vcs-type=git, container_name=swift_object_replicator, batch=17.1_20260112.1, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, config_id=tripleo_step4, io.buildah.version=1.41.5) Feb 2 08:14:31 np0005604725 podman[113279]: unhealthy Feb 2 08:14:31 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:31 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Failed with result 'exit-code'. Feb 2 08:14:32 np0005604725 podman[113427]: 2026-02-02 08:14:32.063582369 +0000 UTC m=+0.164642179 container create 9d7154e5919ebd84d337dbff6b39a92fbc8c73b5be29c2bf33334d4702c11918 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_updater, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, batch=17.1_20260112.1, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:50:56Z, name=rhosp-rhel9/openstack-swift-object, url=https://www.redhat.com, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:56Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_object_updater, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_updater.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, com.redhat.component=openstack-swift-object-container, vendor=Red Hat, Inc., io.buildah.version=1.41.5, version=17.1.13, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, vcs-type=git, architecture=x86_64, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:14:32 np0005604725 podman[113427]: 2026-02-02 08:14:31.987796065 +0000 UTC m=+0.088855875 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Feb 2 08:14:32 np0005604725 podman[113450]: 2026-02-02 08:14:32.136469285 +0000 UTC m=+0.134762626 container create f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, description=Red Hat OpenStack Platform 17.1 swift-object, version=17.1.13, name=rhosp-rhel9/openstack-swift-object, config_id=tripleo_step4, build-date=2026-01-12T22:50:56Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, com.redhat.component=openstack-swift-object-container, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, container_name=swift_rsync, architecture=x86_64, batch=17.1_20260112.1, url=https://www.redhat.com) Feb 2 08:14:32 np0005604725 systemd[1]: Started libpod-conmon-9d7154e5919ebd84d337dbff6b39a92fbc8c73b5be29c2bf33334d4702c11918.scope. Feb 2 08:14:32 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_object_expirer --conmon-pidfile /run/swift_object_expirer.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --label config_id=tripleo_step4 --label container_name=swift_object_expirer --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_expirer.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_object_expirer.log --network host --user swift --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_object_expirer.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /srv/node:/srv/node --volume /dev:/dev --volume /var/cache/swift:/var/cache/swift --volume /var/log/containers/swift:/var/log/swift:z registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Feb 2 08:14:32 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:32 np0005604725 podman[113337]: 2026-02-02 08:14:32.159898901 +0000 UTC m=+0.463173325 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, vendor=Red Hat, Inc., version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, distribution-scope=public, io.openshift.expose-services=, name=rhosp-rhel9/openstack-swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, release=1766032510, description=Red Hat OpenStack Platform 17.1 swift-object, maintainer=OpenStack TripleO Team, container_name=swift_object_server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, vcs-type=git, architecture=x86_64, build-date=2026-01-12T22:50:56Z, io.buildah.version=1.41.5, com.redhat.component=openstack-swift-object-container, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:14:32 np0005604725 systemd[1]: Started libpod-conmon-f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.scope. Feb 2 08:14:32 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1c7e10c0dc18d67af65abf12d5b8d1297ac1b43ee1ea53559d915056d9ea1654/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:32 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1c7e10c0dc18d67af65abf12d5b8d1297ac1b43ee1ea53559d915056d9ea1654/merged/var/cache/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:32 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1c7e10c0dc18d67af65abf12d5b8d1297ac1b43ee1ea53559d915056d9ea1654/merged/var/log/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:32 np0005604725 podman[113337]: unhealthy Feb 2 08:14:32 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:32 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Failed with result 'exit-code'. Feb 2 08:14:32 np0005604725 podman[113427]: 2026-02-02 08:14:32.179570072 +0000 UTC m=+0.280629882 container init 9d7154e5919ebd84d337dbff6b39a92fbc8c73b5be29c2bf33334d4702c11918 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_updater, container_name=swift_object_updater, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:56Z, io.buildah.version=1.41.5, io.openshift.expose-services=, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, build-date=2026-01-12T22:50:56Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-swift-object, com.redhat.component=openstack-swift-object-container, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_updater.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, tcib_managed=true, managed_by=tripleo_ansible, config_id=tripleo_step4, maintainer=OpenStack TripleO Team) Feb 2 08:14:32 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:32 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/92e05ce07393d393fbb8d59671a368ae45a267cec69f5a6fbf61cc3b15b5239e/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:32 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/92e05ce07393d393fbb8d59671a368ae45a267cec69f5a6fbf61cc3b15b5239e/merged/var/log/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:32 np0005604725 podman[113450]: 2026-02-02 08:14:32.098430504 +0000 UTC m=+0.096723875 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Feb 2 08:14:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:14:32 np0005604725 podman[113450]: 2026-02-02 08:14:32.224805643 +0000 UTC m=+0.223098984 container init f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_rsync, managed_by=tripleo_ansible, release=1766032510, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-object-container, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, maintainer=OpenStack TripleO Team, vcs-type=git, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, name=rhosp-rhel9/openstack-swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, vendor=Red Hat, Inc., tcib_managed=true, io.openshift.expose-services=, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:50:56Z) Feb 2 08:14:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:14:32 np0005604725 podman[113427]: 2026-02-02 08:14:32.253576821 +0000 UTC m=+0.354636631 container start 9d7154e5919ebd84d337dbff6b39a92fbc8c73b5be29c2bf33334d4702c11918 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_updater, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:56Z, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, version=17.1.13, release=1766032510, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_object_updater, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_updater.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-swift-object, batch=17.1_20260112.1, vendor=Red Hat, Inc., distribution-scope=public, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:56Z, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:14:32 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_object_updater --conmon-pidfile /run/swift_object_updater.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --label config_id=tripleo_step4 --label container_name=swift_object_updater --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_updater.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_object_updater.log --network host --user swift --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_object_updater.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /srv/node:/srv/node --volume /dev:/dev --volume /var/cache/swift:/var/cache/swift --volume /var/log/containers/swift:/var/log/swift:z registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Feb 2 08:14:32 np0005604725 rsyncd[2]: rsyncd version 3.2.3 starting, listening on port 873 Feb 2 08:14:32 np0005604725 podman[113450]: 2026-02-02 08:14:32.413410172 +0000 UTC m=+0.411703503 container start f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, architecture=x86_64, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, distribution-scope=public, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, container_name=swift_rsync, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, name=rhosp-rhel9/openstack-swift-object, url=https://www.redhat.com, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-object-container, managed_by=tripleo_ansible, vcs-type=git, build-date=2026-01-12T22:50:56Z, org.opencontainers.image.created=2026-01-12T22:50:56Z, release=1766032510, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 swift-object, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}) Feb 2 08:14:32 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_rsync --cap-add NET_BIND_SERVICE --conmon-pidfile /run/swift_rsync.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=swift_rsync --label managed_by=tripleo_ansible --label config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_rsync.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /srv/node:/srv/node --volume /dev:/dev --volume /var/log/containers/swift:/var/log/swift:z registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Feb 2 08:14:32 np0005604725 systemd[1]: tmp-crun.NtHWlc.mount: Deactivated successfully. Feb 2 08:14:32 np0005604725 podman[113537]: 2026-02-02 08:14:32.437111836 +0000 UTC m=+0.180382820 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=starting, batch=17.1_20260112.1, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-object-container, name=rhosp-rhel9/openstack-swift-object, config_id=tripleo_step4, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:50:56Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, managed_by=tripleo_ansible, vcs-type=git, vendor=Red Hat, Inc., architecture=x86_64, container_name=swift_rsync, tcib_managed=true, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:14:32 np0005604725 podman[113662]: 2026-02-02 08:14:32.713536207 +0000 UTC m=+0.083588074 container exec 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, com.redhat.component=openstack-keystone-container, description=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, vendor=Red Hat, Inc., managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, release=1766032510, summary=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, maintainer=OpenStack TripleO Team, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.5, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, io.openshift.expose-services=, config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:33:53Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:33:53Z, batch=17.1_20260112.1) Feb 2 08:14:32 np0005604725 podman[113662]: 2026-02-02 08:14:32.753794127 +0000 UTC m=+0.123845984 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, release=1766032510, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-keystone-container, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, tcib_managed=true, distribution-scope=public, vendor=Red Hat, Inc., batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:33:53Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, name=rhosp-rhel9/openstack-keystone) Feb 2 08:14:32 np0005604725 podman[113722]: 2026-02-02 08:14:32.826147925 +0000 UTC m=+0.055731412 container create f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:34:35Z, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-placement-api, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-placement-api-container, io.buildah.version=1.41.5, release=1766032510, architecture=x86_64, tcib_managed=true, io.openshift.expose-services=, config_id=tripleo_step4, vcs-ref=705339545363fec600102567c4e923938e0f43b3, container_name=placement_api, vcs-type=git, build-date=2026-01-12T22:34:35Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team) Feb 2 08:14:32 np0005604725 systemd[1]: Started libpod-conmon-f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.scope. Feb 2 08:14:32 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:32 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/345518655c172e79f52411c7a941e7d16415c1de7af88f49c8ccf4db8ae82d73/merged/var/log/placement supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:32 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/345518655c172e79f52411c7a941e7d16415c1de7af88f49c8ccf4db8ae82d73/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:32 np0005604725 podman[113722]: 2026-02-02 08:14:32.79580656 +0000 UTC m=+0.025390057 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Feb 2 08:14:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:14:32 np0005604725 podman[113722]: 2026-02-02 08:14:32.905602522 +0000 UTC m=+0.135186069 container init f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, distribution-scope=public, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, version=17.1.13, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, url=https://www.redhat.com, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 placement-api, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, vcs-type=git, io.buildah.version=1.41.5, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:34:35Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:35Z, com.redhat.component=openstack-placement-api-container, container_name=placement_api, vendor=Red Hat, Inc., tcib_managed=true, name=rhosp-rhel9/openstack-placement-api) Feb 2 08:14:32 np0005604725 podman[113537]: 2026-02-02 08:14:32.912830592 +0000 UTC m=+0.656101556 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, batch=17.1_20260112.1, config_id=tripleo_step4, architecture=x86_64, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, io.openshift.expose-services=, version=17.1.13, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=swift_rsync, release=1766032510, com.redhat.component=openstack-swift-object-container, build-date=2026-01-12T22:50:56Z, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:14:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:14:32 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:14:32 np0005604725 podman[113722]: 2026-02-02 08:14:32.949604346 +0000 UTC m=+0.179187833 container start f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, summary=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.component=openstack-placement-api-container, io.buildah.version=1.41.5, container_name=placement_api, description=Red Hat OpenStack Platform 17.1 placement-api, architecture=x86_64, url=https://www.redhat.com, release=1766032510, managed_by=tripleo_ansible, vcs-type=git, build-date=2026-01-12T22:34:35Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, name=rhosp-rhel9/openstack-placement-api, tcib_managed=true, config_id=tripleo_step4, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, org.opencontainers.image.created=2026-01-12T22:34:35Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api) Feb 2 08:14:32 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name placement_api --conmon-pidfile /run/placement_api.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=ae2de9ab0db0f109a0e66975aa28d256 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=placement_api --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/placement_api.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/placement:/var/log/placement:z --volume /var/log/containers/httpd/placement:/var/log/httpd:z --volume /var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro --volume /etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Feb 2 08:14:33 np0005604725 podman[113773]: 2026-02-02 08:14:33.010707931 +0000 UTC m=+0.072321678 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=starting, batch=17.1_20260112.1, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 placement-api, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, vendor=Red Hat, Inc., architecture=x86_64, com.redhat.component=openstack-placement-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.5, container_name=placement_api, build-date=2026-01-12T22:34:35Z, org.opencontainers.image.created=2026-01-12T22:34:35Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, url=https://www.redhat.com, managed_by=tripleo_ansible, config_id=tripleo_step4, name=rhosp-rhel9/openstack-placement-api, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 placement-api) Feb 2 08:14:33 np0005604725 podman[113759]: 2026-02-02 08:14:33.03556142 +0000 UTC m=+0.134143157 container create 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, tcib_managed=true, build-date=2026-01-12T22:36:40Z, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:36:40Z, description=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, config_id=tripleo_step4, name=rhosp-rhel9/openstack-ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, managed_by=tripleo_ansible, container_name=ovn_controller, distribution-scope=public, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, com.redhat.component=openstack-ovn-controller-container, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, url=https://www.redhat.com) Feb 2 08:14:33 np0005604725 podman[113759]: 2026-02-02 08:14:32.992993271 +0000 UTC m=+0.091575028 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Feb 2 08:14:33 np0005604725 systemd[1]: Started libpod-conmon-270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.scope. Feb 2 08:14:33 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:33 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e25b5c00470f94d93508218a629f168d44c6501a0af6584ae56f8c06e1b031b6/merged/run/ovn supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:33 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e25b5c00470f94d93508218a629f168d44c6501a0af6584ae56f8c06e1b031b6/merged/var/log/ovn supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:33 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e25b5c00470f94d93508218a629f168d44c6501a0af6584ae56f8c06e1b031b6/merged/var/log/openvswitch supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:33 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e25b5c00470f94d93508218a629f168d44c6501a0af6584ae56f8c06e1b031b6/merged/etc/pki/tls/certs/ovn_controller.crt supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:33 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e25b5c00470f94d93508218a629f168d44c6501a0af6584ae56f8c06e1b031b6/merged/etc/pki/tls/private/ovn_controller.key supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:14:33 np0005604725 podman[113759]: 2026-02-02 08:14:33.199147856 +0000 UTC m=+0.297729613 container init 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, architecture=x86_64, com.redhat.component=openstack-ovn-controller-container, managed_by=tripleo_ansible, version=17.1.13, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, batch=17.1_20260112.1, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, distribution-scope=public, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, io.openshift.expose-services=, vcs-type=git, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 ovn-controller, name=rhosp-rhel9/openstack-ovn-controller, container_name=ovn_controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:36:40Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, build-date=2026-01-12T22:36:40Z) Feb 2 08:14:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:14:33 np0005604725 podman[113759]: 2026-02-02 08:14:33.217476865 +0000 UTC m=+0.316058612 container start 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, build-date=2026-01-12T22:36:40Z, org.opencontainers.image.created=2026-01-12T22:36:40Z, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, summary=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-type=git, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, tcib_managed=true, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, container_name=ovn_controller, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, architecture=x86_64, distribution-scope=public, name=rhosp-rhel9/openstack-ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-ovn-controller-container, url=https://www.redhat.com, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller) Feb 2 08:14:33 np0005604725 systemd-logind[36465]: Existing logind session ID 15 used by new audit session, ignoring. Feb 2 08:14:33 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name ovn_controller --conmon-pidfile /run/ovn_controller.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --healthcheck-command /openstack/healthcheck 6642 --label config_id=tripleo_step4 --label container_name=ovn_controller --label managed_by=tripleo_ansible --label config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/ovn_controller.log --network host --privileged=True --user root --volume /var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro --volume /lib/modules:/lib/modules:ro --volume /run:/run --volume /var/lib/openvswitch/ovn:/run/ovn:shared,z --volume /var/log/containers/openvswitch:/var/log/openvswitch:z --volume /var/log/containers/openvswitch:/var/log/ovn:z --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt --volume /etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Feb 2 08:14:33 np0005604725 systemd[1]: Created slice User Slice of UID 0. Feb 2 08:14:33 np0005604725 systemd[1]: Starting User Runtime Directory /run/user/0... Feb 2 08:14:33 np0005604725 systemd[1]: Finished User Runtime Directory /run/user/0. Feb 2 08:14:33 np0005604725 systemd[1]: Starting User Manager for UID 0... Feb 2 08:14:33 np0005604725 podman[113850]: 2026-02-02 08:14:33.295392755 +0000 UTC m=+0.072399642 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=starting, vcs-type=git, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:36:40Z, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, summary=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 ovn-controller, distribution-scope=public, name=rhosp-rhel9/openstack-ovn-controller, container_name=ovn_controller, architecture=x86_64, com.redhat.component=openstack-ovn-controller-container, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vendor=Red Hat, Inc., build-date=2026-01-12T22:36:40Z, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, io.openshift.expose-services=, batch=17.1_20260112.1) Feb 2 08:14:33 np0005604725 podman[113850]: 2026-02-02 08:14:33.341121021 +0000 UTC m=+0.118127918 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible, io.openshift.expose-services=, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:36:40Z, name=rhosp-rhel9/openstack-ovn-controller, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, config_id=tripleo_step4, build-date=2026-01-12T22:36:40Z, distribution-scope=public, container_name=ovn_controller, architecture=x86_64, version=17.1.13, com.redhat.component=openstack-ovn-controller-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vcs-type=git, vendor=Red Hat, Inc.) Feb 2 08:14:33 np0005604725 podman[113850]: unhealthy Feb 2 08:14:33 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:33 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Failed with result 'exit-code'. Feb 2 08:14:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:14:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:14:33 np0005604725 systemd[113868]: Queued start job for default target Main User Target. Feb 2 08:14:33 np0005604725 systemd[113868]: Created slice User Application Slice. Feb 2 08:14:33 np0005604725 systemd[113868]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Feb 2 08:14:33 np0005604725 systemd[113868]: Started Daily Cleanup of User's Temporary Directories. Feb 2 08:14:33 np0005604725 systemd[113868]: Reached target Paths. Feb 2 08:14:33 np0005604725 systemd[113868]: Reached target Timers. Feb 2 08:14:33 np0005604725 systemd[113868]: Starting D-Bus User Message Bus Socket... Feb 2 08:14:33 np0005604725 systemd[113868]: Starting Create User's Volatile Files and Directories... Feb 2 08:14:33 np0005604725 systemd[113868]: Listening on D-Bus User Message Bus Socket. Feb 2 08:14:33 np0005604725 systemd[113868]: Reached target Sockets. Feb 2 08:14:33 np0005604725 systemd[113868]: Finished Create User's Volatile Files and Directories. Feb 2 08:14:33 np0005604725 systemd[113868]: Reached target Basic System. Feb 2 08:14:33 np0005604725 systemd[113868]: Reached target Main User Target. Feb 2 08:14:33 np0005604725 systemd[113868]: Startup finished in 213ms. Feb 2 08:14:33 np0005604725 systemd[1]: Started User Manager for UID 0. Feb 2 08:14:33 np0005604725 systemd[1]: Started Session c3 of User root. Feb 2 08:14:33 np0005604725 podman[113918]: 2026-02-02 08:14:33.537564879 +0000 UTC m=+0.095233089 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, config_id=ovn_cluster_northd, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, batch=17.1_20260112.1, vcs-type=git, url=https://www.redhat.com, vendor=Red Hat, Inc., architecture=x86_64, distribution-scope=public, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-ovn-northd-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, release=1766032510, version=17.1.13, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 ovn-northd, org.opencontainers.image.created=2026-01-12T22:34:06Z, build-date=2026-01-12T22:34:06Z, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, container_name=ovn_cluster_northd, name=rhosp-rhel9/openstack-ovn-northd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 ovn-northd, tcib_managed=true, io.openshift.expose-services=, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c) Feb 2 08:14:33 np0005604725 podman[113918]: 2026-02-02 08:14:33.571811846 +0000 UTC m=+0.129480036 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 ovn-northd, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, build-date=2026-01-12T22:34:06Z, description=Red Hat OpenStack Platform 17.1 ovn-northd, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=ovn_cluster_northd, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:34:06Z, batch=17.1_20260112.1, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, com.redhat.component=openstack-ovn-northd-container, url=https://www.redhat.com, io.buildah.version=1.41.5, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, container_name=ovn_cluster_northd, io.openshift.expose-services=, release=1766032510, name=rhosp-rhel9/openstack-ovn-northd, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public) Feb 2 08:14:33 np0005604725 systemd[1]: session-c3.scope: Deactivated successfully. Feb 2 08:14:33 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:14:33 np0005604725 podman[113926]: 2026-02-02 08:14:33.658589676 +0000 UTC m=+0.200177244 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=memcached, io.buildah.version=1.41.5, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vcs-type=git, io.openshift.expose-services=, build-date=2026-01-12T22:12:26Z, com.redhat.component=openstack-memcached-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, release=1766032510, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step1) Feb 2 08:14:33 np0005604725 kernel: device br-int entered promiscuous mode Feb 2 08:14:33 np0005604725 NetworkManager[5971]: [1770020073.6637] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/11) Feb 2 08:14:33 np0005604725 systemd-udevd[114041]: Network interface NamePolicy= disabled on kernel command line. Feb 2 08:14:33 np0005604725 kernel: device genev_sys_6081 entered promiscuous mode Feb 2 08:14:33 np0005604725 NetworkManager[5971]: [1770020073.6991] device (genev_sys_6081): carrier: link connected Feb 2 08:14:33 np0005604725 NetworkManager[5971]: [1770020073.6993] manager: (genev_sys_6081): new Generic device (/org/freedesktop/NetworkManager/Devices/12) Feb 2 08:14:33 np0005604725 podman[113926]: 2026-02-02 08:14:33.743269442 +0000 UTC m=+0.284857020 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, release=1766032510, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, summary=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, architecture=x86_64, io.openshift.expose-services=, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:12:26Z, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, config_id=tripleo_step1, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, name=rhosp-rhel9/openstack-memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=memcached, description=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, url=https://www.redhat.com, build-date=2026-01-12T22:12:26Z, maintainer=OpenStack TripleO Team, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:14:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:14:33 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:14:33 np0005604725 podman[114112]: 2026-02-02 08:14:33.905233877 +0000 UTC m=+0.094602490 container create 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, com.redhat.component=openstack-glance-api-container, release=1766032510, vcs-type=git, distribution-scope=public, architecture=x86_64, vcs-ref=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, io.buildah.version=1.41.5, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 glance-api, build-date=2026-01-12T22:34:42Z, description=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp-rhel9/openstack-glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:34:42Z, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, container_name=glance_api_internal, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api) Feb 2 08:14:33 np0005604725 podman[114091]: 2026-02-02 08:14:33.910717465 +0000 UTC m=+0.128530826 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, distribution-scope=public, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2026-01-12T22:10:14Z, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-qdrouterd, batch=17.1_20260112.1, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, container_name=metrics_qdr, maintainer=OpenStack TripleO Team, config_id=tripleo_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-qdrouterd-container, release=1766032510, io.buildah.version=1.41.5, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:14Z, description=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:14:33 np0005604725 podman[114095]: 2026-02-02 08:14:33.845702099 +0000 UTC m=+0.045478760 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:14:33 np0005604725 podman[114112]: 2026-02-02 08:14:33.85851066 +0000 UTC m=+0.047879273 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:14:33 np0005604725 podman[114095]: 2026-02-02 08:14:33.974633416 +0000 UTC m=+0.174410067 container create 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, build-date=2026-01-12T23:31:50Z, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_metadata, managed_by=tripleo_ansible, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_step4, name=rhosp-rhel9/openstack-nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, release=1766032510, version=17.1.13, org.opencontainers.image.created=2026-01-12T23:31:50Z, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-nova-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:14:33 np0005604725 systemd[1]: Started libpod-conmon-50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.scope. Feb 2 08:14:34 np0005604725 podman[114144]: 2026-02-02 08:14:34.011764641 +0000 UTC m=+0.165010590 container create 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, maintainer=OpenStack TripleO Team, release=1766032510, description=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp-rhel9/openstack-nova-api, container_name=nova_api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, architecture=x86_64, com.redhat.component=openstack-nova-api-container, distribution-scope=public, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, url=https://www.redhat.com, io.buildah.version=1.41.5, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=) Feb 2 08:14:34 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0472a18f091c948849eb38f6544601c1d59f945b65dbe60e7b34796923c8abdf/merged/var/log/glance supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0472a18f091c948849eb38f6544601c1d59f945b65dbe60e7b34796923c8abdf/merged/var/lib/glance supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0472a18f091c948849eb38f6544601c1d59f945b65dbe60e7b34796923c8abdf/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0472a18f091c948849eb38f6544601c1d59f945b65dbe60e7b34796923c8abdf/merged/var/lib/kolla/config_files/src-ceph supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0472a18f091c948849eb38f6544601c1d59f945b65dbe60e7b34796923c8abdf/merged/var/lib/kolla/config_files/config.json supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 systemd[1]: Started libpod-conmon-2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.scope. Feb 2 08:14:34 np0005604725 podman[114144]: 2026-02-02 08:14:33.936581715 +0000 UTC m=+0.089827694 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:14:34 np0005604725 podman[114104]: 2026-02-02 08:14:33.95018838 +0000 UTC m=+0.155724097 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:14:34 np0005604725 podman[114104]: 2026-02-02 08:14:34.050925466 +0000 UTC m=+0.256461193 container create 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:42Z, build-date=2026-01-12T22:34:42Z, maintainer=OpenStack TripleO Team, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-glance-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-glance-api, io.openshift.expose-services=, batch=17.1_20260112.1, tcib_managed=true, io.buildah.version=1.41.5, container_name=glance_api_cron, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., config_id=tripleo_step4, vcs-type=git) Feb 2 08:14:34 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:34 np0005604725 podman[114162]: 2026-02-02 08:14:33.956455591 +0000 UTC m=+0.048295645 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6e5e2ba92b2180008b09fb34e813f1dedeccf0cf8c6ade8b047df84ba204c671/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6e5e2ba92b2180008b09fb34e813f1dedeccf0cf8c6ade8b047df84ba204c671/merged/var/log/nova supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:14:34 np0005604725 podman[114162]: 2026-02-02 08:14:34.082319525 +0000 UTC m=+0.174159569 container create bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-type=git, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, url=https://www.redhat.com, tcib_managed=true, version=17.1.13, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-glance-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:34:42Z, io.buildah.version=1.41.5, container_name=glance_api, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, distribution-scope=public, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:42Z) Feb 2 08:14:34 np0005604725 podman[114112]: 2026-02-02 08:14:34.082895922 +0000 UTC m=+0.272264555 container init 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, vendor=Red Hat, Inc., com.redhat.component=openstack-glance-api-container, distribution-scope=public, container_name=glance_api_internal, version=17.1.13, architecture=x86_64, build-date=2026-01-12T22:34:42Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:34:42Z, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, name=rhosp-rhel9/openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:14:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:14:34 np0005604725 podman[114095]: 2026-02-02 08:14:34.095690613 +0000 UTC m=+0.295467254 container init 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, batch=17.1_20260112.1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, url=https://www.redhat.com, build-date=2026-01-12T23:31:50Z, distribution-scope=public, name=rhosp-rhel9/openstack-nova-api, version=17.1.13, io.buildah.version=1.41.5, architecture=x86_64, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_metadata, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, managed_by=tripleo_ansible, release=1766032510, maintainer=OpenStack TripleO Team, tcib_managed=true) Feb 2 08:14:34 np0005604725 podman[113773]: 2026-02-02 08:14:34.095830608 +0000 UTC m=+1.157444355 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 placement-api, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=placement_api, org.opencontainers.image.created=2026-01-12T22:34:35Z, architecture=x86_64, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, version=17.1.13, description=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, tcib_managed=true, config_id=tripleo_step4, build-date=2026-01-12T22:34:35Z, distribution-scope=public, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-placement-api, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.component=openstack-placement-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:14:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:14:34 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:14:34 np0005604725 systemd[1]: Started libpod-conmon-bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.scope. Feb 2 08:14:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:14:34 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:34 np0005604725 podman[114112]: 2026-02-02 08:14:34.137548002 +0000 UTC m=+0.326916615 container start 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, batch=17.1_20260112.1, com.redhat.component=openstack-glance-api-container, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:34:42Z, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, vendor=Red Hat, Inc., io.openshift.expose-services=, architecture=x86_64, build-date=2026-01-12T22:34:42Z, summary=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, container_name=glance_api_internal, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, name=rhosp-rhel9/openstack-glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible) Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e85a1ff9b7142ec5ca5fe4d498817042419d94ddb6b4ac6965520d3c03a239b9/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e85a1ff9b7142ec5ca5fe4d498817042419d94ddb6b4ac6965520d3c03a239b9/merged/var/log/glance supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e85a1ff9b7142ec5ca5fe4d498817042419d94ddb6b4ac6965520d3c03a239b9/merged/var/lib/glance supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e85a1ff9b7142ec5ca5fe4d498817042419d94ddb6b4ac6965520d3c03a239b9/merged/var/lib/kolla/config_files/src-ceph supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e85a1ff9b7142ec5ca5fe4d498817042419d94ddb6b4ac6965520d3c03a239b9/merged/var/lib/kolla/config_files/config.json supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name glance_api_internal --conmon-pidfile /run/glance_api_internal.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=glance_api_internal --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/glance_api_internal.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/glance:/var/log/glance:z --volume /var/log/containers/httpd/glance:/var/log/httpd:z --volume /var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json --volume /var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro --volume /var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z --volume /var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro --volume /var/lib/glance:/var/lib/glance:shared registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:14:34 np0005604725 podman[114091]: 2026-02-02 08:14:34.163810803 +0000 UTC m=+0.381624104 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, release=1766032510, managed_by=tripleo_ansible, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.openshift.expose-services=, com.redhat.component=openstack-qdrouterd-container, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, name=rhosp-rhel9/openstack-qdrouterd, container_name=metrics_qdr, io.buildah.version=1.41.5, tcib_managed=true, build-date=2026-01-12T22:10:14Z, version=17.1.13, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, config_id=tripleo_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:14:34 np0005604725 systemd[1]: Started libpod-conmon-3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.scope. Feb 2 08:14:34 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:14:34 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:34 np0005604725 systemd[1]: Started libpod-conmon-3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.scope. Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a6022746e3be339f2e94f7ae639f484a9f5c181a9f17aed531d02e8a76cd3d6e/merged/var/lib/glance supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a6022746e3be339f2e94f7ae639f484a9f5c181a9f17aed531d02e8a76cd3d6e/merged/var/log/glance supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a6022746e3be339f2e94f7ae639f484a9f5c181a9f17aed531d02e8a76cd3d6e/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a6022746e3be339f2e94f7ae639f484a9f5c181a9f17aed531d02e8a76cd3d6e/merged/var/lib/kolla/config_files/config.json supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:14:34 np0005604725 podman[114162]: 2026-02-02 08:14:34.224532258 +0000 UTC m=+0.316372342 container init bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:34:42Z, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 glance-api, build-date=2026-01-12T22:34:42Z, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-type=git, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step4, version=17.1.13, vendor=Red Hat, Inc., distribution-scope=public, io.openshift.expose-services=, container_name=glance_api) Feb 2 08:14:34 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/2fe9a97c9348f497a5f37b359844fcfd3ececfa7a3343f29981a4639ca4ffa38/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/2fe9a97c9348f497a5f37b359844fcfd3ececfa7a3343f29981a4639ca4ffa38/merged/var/log/nova supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:14:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:14:34 np0005604725 podman[114104]: 2026-02-02 08:14:34.268480659 +0000 UTC m=+0.474016366 container init 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, container_name=glance_api_cron, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, name=rhosp-rhel9/openstack-glance-api, managed_by=tripleo_ansible, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:34:42Z, io.buildah.version=1.41.5, version=17.1.13, distribution-scope=public, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:42Z, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git) Feb 2 08:14:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:14:34 np0005604725 podman[114144]: 2026-02-02 08:14:34.314525846 +0000 UTC m=+0.467771805 container init 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, container_name=nova_api, managed_by=tripleo_ansible, distribution-scope=public, build-date=2026-01-12T23:31:50Z, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, io.openshift.expose-services=, com.redhat.component=openstack-nova-api-container, release=1766032510, io.buildah.version=1.41.5, batch=17.1_20260112.1, config_id=tripleo_step4, name=rhosp-rhel9/openstack-nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T23:31:50Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:14:34 np0005604725 podman[114162]: 2026-02-02 08:14:34.332560566 +0000 UTC m=+0.424400600 container start bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, tcib_managed=true, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:42Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.openshift.expose-services=, vcs-type=git, vendor=Red Hat, Inc., build-date=2026-01-12T22:34:42Z, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=glance_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, name=rhosp-rhel9/openstack-glance-api, com.redhat.component=openstack-glance-api-container, config_id=tripleo_step4, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5) Feb 2 08:14:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:14:34 np0005604725 podman[114095]: 2026-02-02 08:14:34.338664562 +0000 UTC m=+0.538441213 container start 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_metadata, managed_by=tripleo_ansible, vcs-type=git, config_id=tripleo_step4, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, name=rhosp-rhel9/openstack-nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, vendor=Red Hat, Inc., url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, build-date=2026-01-12T23:31:50Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, batch=17.1_20260112.1, com.redhat.component=openstack-nova-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:14:34 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name glance_api --conmon-pidfile /run/glance_api.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=glance_api --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/glance_api.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/glance:/var/log/glance:z --volume /var/log/containers/httpd/glance:/var/log/httpd:z --volume /var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json --volume /var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro --volume /var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z --volume /var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro --volume /var/lib/glance:/var/lib/glance:shared registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:14:34 np0005604725 sshd[114321]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:14:34 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name nova_metadata --conmon-pidfile /run/nova_metadata.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=85ffc2ed75932f3a27d6e0188d1bb69e --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=nova_metadata --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/nova_metadata.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/nova:/var/log/nova:z --volume /var/log/containers/httpd/nova-metadata:/var/log/httpd:z --volume /var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro --volume /etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:14:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:14:34 np0005604725 podman[114144]: 2026-02-02 08:14:34.364852542 +0000 UTC m=+0.518098491 container start 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, distribution-scope=public, version=17.1.13, container_name=nova_api, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vcs-type=git, com.redhat.component=openstack-nova-api-container, release=1766032510, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, name=rhosp-rhel9/openstack-nova-api, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, io.buildah.version=1.41.5) Feb 2 08:14:34 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name nova_api --conmon-pidfile /run/nova_api.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=0f33bf354435ad6e844c942ca95c792b --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=nova_api --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/nova_api.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/nova:/var/log/nova:z --volume /var/log/containers/httpd/nova-api:/var/log/httpd:z --volume /var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro --volume /etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:14:34 np0005604725 podman[114230]: 2026-02-02 08:14:34.336201207 +0000 UTC m=+0.200244695 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=starting, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, container_name=glance_api_internal, config_id=tripleo_step4, tcib_managed=true, com.redhat.component=openstack-glance-api-container, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, batch=17.1_20260112.1, build-date=2026-01-12T22:34:42Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, io.buildah.version=1.41.5, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp-rhel9/openstack-glance-api, vcs-type=git, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:14:34 np0005604725 podman[114104]: 2026-02-02 08:14:34.445217346 +0000 UTC m=+0.650753053 container start 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, managed_by=tripleo_ansible, io.openshift.expose-services=, container_name=glance_api_cron, description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, build-date=2026-01-12T22:34:42Z, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, com.redhat.component=openstack-glance-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, release=1766032510, architecture=x86_64, vendor=Red Hat, Inc., version=17.1.13, name=rhosp-rhel9/openstack-glance-api, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}) Feb 2 08:14:34 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name glance_api_cron --conmon-pidfile /run/glance_api_cron.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=06def20cab1144dca51887b587adc9f4 --healthcheck-command /usr/share/openstack-tripleo-common/healthcheck/cron glance --label config_id=tripleo_step4 --label container_name=glance_api_cron --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/glance_api_cron.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/glance:/var/log/glance:z --volume /var/log/containers/httpd/glance:/var/log/httpd:z --volume /var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json --volume /var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro --volume /var/lib/glance:/var/lib/glance:shared registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:14:34 np0005604725 podman[114219]: 2026-02-02 08:14:34.405679119 +0000 UTC m=+0.280798346 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=starting, description=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp-rhel9/openstack-nova-api, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-api-container, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=nova_metadata, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, version=17.1.13, io.openshift.expose-services=, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:31:50Z, config_id=tripleo_step4, vcs-type=git, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T23:31:50Z, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1) Feb 2 08:14:34 np0005604725 podman[114286]: 2026-02-02 08:14:34.616880218 +0000 UTC m=+0.336304140 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=starting, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, release=1766032510, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, name=rhosp-rhel9/openstack-glance-api, batch=17.1_20260112.1, io.buildah.version=1.41.5, managed_by=tripleo_ansible, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, container_name=glance_api, description=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-glance-api-container, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, build-date=2026-01-12T22:34:42Z, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:42Z, vendor=Red Hat, Inc., vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api) Feb 2 08:14:34 np0005604725 podman[114334]: 2026-02-02 08:14:34.627543823 +0000 UTC m=+0.260860756 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=starting, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, architecture=x86_64, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T23:31:50Z, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, container_name=nova_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, maintainer=OpenStack TripleO Team, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-nova-api, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.created=2026-01-12T23:31:50Z, config_id=tripleo_step4, tcib_managed=true, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.expose-services=) Feb 2 08:14:34 np0005604725 podman[114318]: 2026-02-02 08:14:34.73255286 +0000 UTC m=+0.384488401 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=starting, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:34:42Z, maintainer=OpenStack TripleO Team, tcib_managed=true, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.openshift.expose-services=, name=rhosp-rhel9/openstack-glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, batch=17.1_20260112.1, container_name=glance_api_cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, com.redhat.component=openstack-glance-api-container, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, architecture=x86_64, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step4, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:14:34 np0005604725 podman[114318]: 2026-02-02 08:14:34.816871025 +0000 UTC m=+0.468806556 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, org.opencontainers.image.created=2026-01-12T22:34:42Z, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, name=rhosp-rhel9/openstack-glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step4, com.redhat.component=openstack-glance-api-container, vendor=Red Hat, Inc., container_name=glance_api_cron, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, description=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:42Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, architecture=x86_64, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:14:34 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:14:34 np0005604725 podman[114230]: 2026-02-02 08:14:34.870223344 +0000 UTC m=+0.734266822 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20260112.1, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:34:42Z, container_name=glance_api_internal, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step4, io.openshift.expose-services=, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:34:42Z, distribution-scope=public, name=rhosp-rhel9/openstack-glance-api, release=1766032510, vcs-type=git, description=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, com.redhat.component=openstack-glance-api-container, vendor=Red Hat, Inc., architecture=x86_64, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:14:34 np0005604725 podman[114230]: unhealthy Feb 2 08:14:34 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:34 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Failed with result 'exit-code'. Feb 2 08:14:34 np0005604725 podman[114286]: 2026-02-02 08:14:34.888827053 +0000 UTC m=+0.608250985 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, version=17.1.13, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, vcs-type=git, container_name=glance_api, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-glance-api, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, build-date=2026-01-12T22:34:42Z, architecture=x86_64, com.redhat.component=openstack-glance-api-container, release=1766032510) Feb 2 08:14:34 np0005604725 podman[114286]: unhealthy Feb 2 08:14:34 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:34 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Failed with result 'exit-code'. Feb 2 08:14:35 np0005604725 podman[114608]: 2026-02-02 08:14:35.014743288 +0000 UTC m=+0.076545629 container create 5933867fac9df0f000d920b6298bf4fa6a9a4a26a5a1f71cb8ec7fff72510349 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_wait_for_service, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, name=rhosp-rhel9/openstack-placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api_wait_for_service.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, io.openshift.expose-services=, io.buildah.version=1.41.5, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, com.redhat.component=openstack-placement-api-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, container_name=placement_wait_for_service, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 placement-api, build-date=2026-01-12T22:34:35Z, description=Red Hat OpenStack Platform 17.1 placement-api, version=17.1.13, architecture=x86_64, config_id=tripleo_step4, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:34:35Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:14:35 np0005604725 systemd[1]: Started libpod-conmon-5933867fac9df0f000d920b6298bf4fa6a9a4a26a5a1f71cb8ec7fff72510349.scope. Feb 2 08:14:35 np0005604725 podman[114608]: 2026-02-02 08:14:34.976361536 +0000 UTC m=+0.038163867 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Feb 2 08:14:35 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:35 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/3e6ba2b2b2449833493fdd17676b98aa1322e8f1f84d7c4655cbe87660b9551e/merged/container-config-scripts supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:35 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/3e6ba2b2b2449833493fdd17676b98aa1322e8f1f84d7c4655cbe87660b9551e/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:35 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/3e6ba2b2b2449833493fdd17676b98aa1322e8f1f84d7c4655cbe87660b9551e/merged/var/log/placement supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:35 np0005604725 podman[114608]: 2026-02-02 08:14:35.094898065 +0000 UTC m=+0.156700386 container init 5933867fac9df0f000d920b6298bf4fa6a9a4a26a5a1f71cb8ec7fff72510349 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_wait_for_service, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api_wait_for_service.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-placement-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, release=1766032510, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, com.redhat.component=openstack-placement-api-container, org.opencontainers.image.created=2026-01-12T22:34:35Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, tcib_managed=true, batch=17.1_20260112.1, io.buildah.version=1.41.5, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 placement-api, distribution-scope=public, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=placement_wait_for_service, vcs-type=git, build-date=2026-01-12T22:34:35Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, architecture=x86_64) Feb 2 08:14:35 np0005604725 podman[114608]: 2026-02-02 08:14:35.104850109 +0000 UTC m=+0.166652430 container start 5933867fac9df0f000d920b6298bf4fa6a9a4a26a5a1f71cb8ec7fff72510349 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_wait_for_service, config_id=tripleo_step4, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-placement-api, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api_wait_for_service.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, com.redhat.component=openstack-placement-api-container, distribution-scope=public, tcib_managed=true, release=1766032510, org.opencontainers.image.created=2026-01-12T22:34:35Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, build-date=2026-01-12T22:34:35Z, version=17.1.13, container_name=placement_wait_for_service, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.5, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:14:35 np0005604725 podman[114608]: 2026-02-02 08:14:35.105067956 +0000 UTC m=+0.166870307 container attach 5933867fac9df0f000d920b6298bf4fa6a9a4a26a5a1f71cb8ec7fff72510349 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_wait_for_service, managed_by=tripleo_ansible, batch=17.1_20260112.1, config_id=tripleo_step4, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-placement-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, vendor=Red Hat, Inc., vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 placement-api, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api_wait_for_service.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 placement-api, version=17.1.13, architecture=x86_64, container_name=placement_wait_for_service, org.opencontainers.image.created=2026-01-12T22:34:35Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.5, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, name=rhosp-rhel9/openstack-placement-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, build-date=2026-01-12T22:34:35Z) Feb 2 08:14:35 np0005604725 podman[114619]: 2026-02-02 08:14:35.149879544 +0000 UTC m=+0.176239863 container create 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, distribution-scope=public, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:50:51Z, managed_by=tripleo_ansible, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:51Z, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1766032510, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, container_name=swift_proxy, batch=17.1_20260112.1, com.redhat.component=openstack-swift-proxy-server-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-proxy-server, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true) Feb 2 08:14:35 np0005604725 podman[114619]: 2026-02-02 08:14:35.058478903 +0000 UTC m=+0.084839182 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Feb 2 08:14:35 np0005604725 systemd[1]: Started libpod-conmon-9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.scope. Feb 2 08:14:35 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:35 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c952b8cbe5845ff2614590e6fc99f9697542cc4148f335aafff801e0e6ea9145/merged/srv/node supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:35 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c952b8cbe5845ff2614590e6fc99f9697542cc4148f335aafff801e0e6ea9145/merged/var/log/swift supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:14:35 np0005604725 podman[114619]: 2026-02-02 08:14:35.218553611 +0000 UTC m=+0.244913870 container init 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-swift-proxy-server-container, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, name=rhosp-rhel9/openstack-swift-proxy-server, container_name=swift_proxy, vcs-type=git, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, build-date=2026-01-12T22:50:51Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:51Z, config_id=tripleo_step4, vendor=Red Hat, Inc.) Feb 2 08:14:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:14:35 np0005604725 podman[114619]: 2026-02-02 08:14:35.239656705 +0000 UTC m=+0.266016964 container start 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:51Z, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, distribution-scope=public, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, release=1766032510, managed_by=tripleo_ansible, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=swift_proxy, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, version=17.1.13, com.redhat.component=openstack-swift-proxy-server-container, name=rhosp-rhel9/openstack-swift-proxy-server, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:51Z) Feb 2 08:14:35 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_proxy --conmon-pidfile /run/swift_proxy.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step4 --label container_name=swift_proxy --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_proxy.log --network host --user swift --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /srv/node:/srv/node --volume /dev:/dev --volume /var/log/containers/swift:/var/log/swift:z registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Feb 2 08:14:35 np0005604725 systemd[1]: libpod-5933867fac9df0f000d920b6298bf4fa6a9a4a26a5a1f71cb8ec7fff72510349.scope: Deactivated successfully. Feb 2 08:14:35 np0005604725 podman[114676]: 2026-02-02 08:14:35.38258407 +0000 UTC m=+0.090537655 container died 5933867fac9df0f000d920b6298bf4fa6a9a4a26a5a1f71cb8ec7fff72510349 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_wait_for_service, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-placement-api, com.redhat.component=openstack-placement-api-container, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.5, io.openshift.expose-services=, tcib_managed=true, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:34:35Z, url=https://www.redhat.com, release=1766032510, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:34:35Z, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api_wait_for_service.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, config_id=tripleo_step4, container_name=placement_wait_for_service, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, maintainer=OpenStack TripleO Team) Feb 2 08:14:35 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-5933867fac9df0f000d920b6298bf4fa6a9a4a26a5a1f71cb8ec7fff72510349-userdata-shm.mount: Deactivated successfully. Feb 2 08:14:35 np0005604725 podman[114662]: 2026-02-02 08:14:35.446398509 +0000 UTC m=+0.193577462 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=starting, org.opencontainers.image.created=2026-01-12T22:50:51Z, distribution-scope=public, name=rhosp-rhel9/openstack-swift-proxy-server, version=17.1.13, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-proxy-server-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:50:51Z, url=https://www.redhat.com, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, container_name=swift_proxy, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, vcs-type=git) Feb 2 08:14:35 np0005604725 systemd[1]: var-lib-containers-storage-overlay-3e6ba2b2b2449833493fdd17676b98aa1322e8f1f84d7c4655cbe87660b9551e-merged.mount: Deactivated successfully. Feb 2 08:14:35 np0005604725 podman[114676]: 2026-02-02 08:14:35.52047104 +0000 UTC m=+0.228424605 container cleanup 5933867fac9df0f000d920b6298bf4fa6a9a4a26a5a1f71cb8ec7fff72510349 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_wait_for_service, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, config_id=tripleo_step4, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=placement_wait_for_service, io.openshift.expose-services=, batch=17.1_20260112.1, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api_wait_for_service.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, version=17.1.13, managed_by=tripleo_ansible, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-placement-api-container, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:34:35Z, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:35Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, url=https://www.redhat.com, io.buildah.version=1.41.5) Feb 2 08:14:35 np0005604725 systemd[1]: libpod-conmon-5933867fac9df0f000d920b6298bf4fa6a9a4a26a5a1f71cb8ec7fff72510349.scope: Deactivated successfully. Feb 2 08:14:35 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name placement_wait_for_service --conmon-pidfile /run/placement_wait_for_service.pid --detach=False --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env __OS_DEBUG=true --env TRIPLEO_CONFIG_HASH=ae2de9ab0db0f109a0e66975aa28d256 --label config_id=tripleo_step4 --label container_name=placement_wait_for_service --label managed_by=tripleo_ansible --label config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api_wait_for_service.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/placement_wait_for_service.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/placement:/var/log/placement:z --volume /var/log/containers/httpd/placement:/var/log/httpd:z --volume /var/lib/kolla/config_files/placement_api_wait_for_service.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro --volume /var/lib/container-config-scripts:/container-config-scripts:z registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Feb 2 08:14:35 np0005604725 podman[114662]: 2026-02-02 08:14:35.643301141 +0000 UTC m=+0.390480074 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, com.redhat.component=openstack-swift-proxy-server-container, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.buildah.version=1.41.5, container_name=swift_proxy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, vcs-type=git, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:51Z, vendor=Red Hat, Inc., build-date=2026-01-12T22:50:51Z, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-swift-proxy-server, config_id=tripleo_step4, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server) Feb 2 08:14:35 np0005604725 podman[114662]: unhealthy Feb 2 08:14:35 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Main process exited, code=exited, status=1/FAILURE Feb 2 08:14:35 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Failed with result 'exit-code'. Feb 2 08:14:36 np0005604725 ovsdb-client[114884]: ovs|00001|reconnect|INFO|ssl:172.17.0.103:6641: connecting... Feb 2 08:14:36 np0005604725 ovsdb-client[114884]: ovs|00002|reconnect|INFO|ssl:172.17.0.103:6641: connected Feb 2 08:14:36 np0005604725 podman[114911]: 2026-02-02 08:14:36.138934536 +0000 UTC m=+0.074580819 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Feb 2 08:14:36 np0005604725 podman[114917]: 2026-02-02 08:14:36.24353609 +0000 UTC m=+0.175426047 container create de8604ab517f0c0762a1b022bbd44af4c9bc1e3b197c000a27219a409cfc5774 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_tls_proxy, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, container_name=glance_api_tls_proxy, vendor=Red Hat, Inc., architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, release=1766032510, build-date=2026-01-12T22:34:42Z, distribution-scope=public, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, batch=17.1_20260112.1, io.buildah.version=1.41.5, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api) Feb 2 08:14:36 np0005604725 podman[114917]: 2026-02-02 08:14:36.148175598 +0000 UTC m=+0.080065585 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:14:36 np0005604725 podman[114941]: 2026-02-02 08:14:36.262225921 +0000 UTC m=+0.143472692 container create ba96db47190c5561478020b41eb854563587fffd276c02942abf3c962320c72d (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_wait_for_api_service, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, container_name=nova_wait_for_api_service, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_wait_for_api_service.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, distribution-scope=public, com.redhat.component=openstack-nova-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:31:50Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, version=17.1.13, vcs-type=git, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-nova-api, io.buildah.version=1.41.5, url=https://www.redhat.com, io.openshift.expose-services=, release=1766032510, org.opencontainers.image.created=2026-01-12T23:31:50Z) Feb 2 08:14:36 np0005604725 podman[114941]: 2026-02-02 08:14:36.177937027 +0000 UTC m=+0.059184048 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:14:36 np0005604725 podman[114911]: 2026-02-02 08:14:36.318086677 +0000 UTC m=+0.253732940 container create b983c9ca35bfa545fa4da4825acb7e861d267d0716435cd78ab68c2315866e25 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy_tls_proxy, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, container_name=swift_proxy_tls_proxy, config_id=tripleo_step4, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, vendor=Red Hat, Inc., vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, build-date=2026-01-12T22:50:51Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:50:51Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server) Feb 2 08:14:36 np0005604725 systemd[1]: Started libpod-conmon-de8604ab517f0c0762a1b022bbd44af4c9bc1e3b197c000a27219a409cfc5774.scope. Feb 2 08:14:36 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:36 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/949ee643d9369d1dd0ba9f64e9e1a7452c1f45058c61066bae1219466309d53f/merged/var/log/glance supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:36 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/949ee643d9369d1dd0ba9f64e9e1a7452c1f45058c61066bae1219466309d53f/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:36 np0005604725 podman[114943]: 2026-02-02 08:14:36.363952037 +0000 UTC m=+0.231185770 container create edef445902d671f010b09a15d4a06df0413b2294b34a1617cee1bfcf9f6d1c0d (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal_tls_proxy, container_name=glance_api_internal_tls_proxy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vendor=Red Hat, Inc., url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, release=1766032510, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:34:42Z, build-date=2026-01-12T22:34:42Z, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-glance-api, architecture=x86_64, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, io.openshift.expose-services=, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:14:36 np0005604725 podman[114917]: 2026-02-02 08:14:36.372027014 +0000 UTC m=+0.303916981 container init de8604ab517f0c0762a1b022bbd44af4c9bc1e3b197c000a27219a409cfc5774 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_tls_proxy, description=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, url=https://www.redhat.com, build-date=2026-01-12T22:34:42Z, name=rhosp-rhel9/openstack-glance-api, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, container_name=glance_api_tls_proxy, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-glance-api-container, release=1766032510, managed_by=tripleo_ansible, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=) Feb 2 08:14:36 np0005604725 systemd[1]: Started libpod-conmon-ba96db47190c5561478020b41eb854563587fffd276c02942abf3c962320c72d.scope. Feb 2 08:14:36 np0005604725 podman[114917]: 2026-02-02 08:14:36.381728631 +0000 UTC m=+0.313618608 container start de8604ab517f0c0762a1b022bbd44af4c9bc1e3b197c000a27219a409cfc5774 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_tls_proxy, description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, io.buildah.version=1.41.5, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.expose-services=, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, url=https://www.redhat.com, build-date=2026-01-12T22:34:42Z, distribution-scope=public, name=rhosp-rhel9/openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, managed_by=tripleo_ansible, vendor=Red Hat, Inc., container_name=glance_api_tls_proxy, tcib_managed=true, version=17.1.13, release=1766032510, maintainer=OpenStack TripleO Team, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:14:36 np0005604725 systemd[1]: Started libpod-conmon-b983c9ca35bfa545fa4da4825acb7e861d267d0716435cd78ab68c2315866e25.scope. Feb 2 08:14:36 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:36 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:36 np0005604725 podman[114943]: 2026-02-02 08:14:36.29592941 +0000 UTC m=+0.163163153 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:14:36 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/023016620eec8603d0ceaf888c754bf4ec0c8bbbc44f8bbc8736968324c31c22/merged/container-config-scripts supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:36 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name glance_api_tls_proxy --conmon-pidfile /run/glance_api_tls_proxy.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=06def20cab1144dca51887b587adc9f4 --label config_id=tripleo_step4 --label container_name=glance_api_tls_proxy --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/glance_api_tls_proxy.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/glance:/var/log/glance:z --volume /var/log/containers/httpd/glance:/var/log/httpd:z --volume /var/lib/kolla/config_files/glance_api_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro --volume /etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:14:36 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/023016620eec8603d0ceaf888c754bf4ec0c8bbbc44f8bbc8736968324c31c22/merged/var/log/nova supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:36 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/023016620eec8603d0ceaf888c754bf4ec0c8bbbc44f8bbc8736968324c31c22/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:36 np0005604725 podman[114941]: 2026-02-02 08:14:36.410049025 +0000 UTC m=+0.291295796 container init ba96db47190c5561478020b41eb854563587fffd276c02942abf3c962320c72d (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_wait_for_api_service, container_name=nova_wait_for_api_service, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, com.redhat.component=openstack-nova-api-container, release=1766032510, build-date=2026-01-12T23:31:50Z, io.openshift.expose-services=, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, managed_by=tripleo_ansible, config_id=tripleo_step4, architecture=x86_64, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_wait_for_api_service.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, summary=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., distribution-scope=public, description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T23:31:50Z, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.13, url=https://www.redhat.com, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api) Feb 2 08:14:36 np0005604725 podman[114911]: 2026-02-02 08:14:36.417627516 +0000 UTC m=+0.353273779 container init b983c9ca35bfa545fa4da4825acb7e861d267d0716435cd78ab68c2315866e25 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy_tls_proxy, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, maintainer=OpenStack TripleO Team, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, name=rhosp-rhel9/openstack-swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, batch=17.1_20260112.1, container_name=swift_proxy_tls_proxy, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, managed_by=tripleo_ansible, build-date=2026-01-12T22:50:51Z, architecture=x86_64, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:51Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.buildah.version=1.41.5, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server) Feb 2 08:14:36 np0005604725 podman[114911]: 2026-02-02 08:14:36.429465368 +0000 UTC m=+0.365111641 container start b983c9ca35bfa545fa4da4825acb7e861d267d0716435cd78ab68c2315866e25 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy_tls_proxy, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, vcs-type=git, managed_by=tripleo_ansible, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:50:51Z, version=17.1.13, distribution-scope=public, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, tcib_managed=true, maintainer=OpenStack TripleO Team, container_name=swift_proxy_tls_proxy, release=1766032510, build-date=2026-01-12T22:50:51Z, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-swift-proxy-server, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.component=openstack-swift-proxy-server-container, batch=17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:14:36 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name swift_proxy_tls_proxy --conmon-pidfile /run/swift_proxy_tls_proxy.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2b3e11d6dd07c45ddbe26d38ce1c0c72 --label config_id=tripleo_step4 --label container_name=swift_proxy_tls_proxy --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/swift_proxy_tls_proxy.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/swift_proxy_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro --volume /etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Feb 2 08:14:36 np0005604725 podman[114941]: 2026-02-02 08:14:36.475613257 +0000 UTC m=+0.356860028 container start ba96db47190c5561478020b41eb854563587fffd276c02942abf3c962320c72d (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_wait_for_api_service, org.opencontainers.image.created=2026-01-12T23:31:50Z, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=nova_wait_for_api_service, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-nova-api-container, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, tcib_managed=true, release=1766032510, version=17.1.13, vcs-type=git, build-date=2026-01-12T23:31:50Z, distribution-scope=public, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp-rhel9/openstack-nova-api, batch=17.1_20260112.1, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_wait_for_api_service.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}) Feb 2 08:14:36 np0005604725 podman[114941]: 2026-02-02 08:14:36.476211545 +0000 UTC m=+0.357458326 container attach ba96db47190c5561478020b41eb854563587fffd276c02942abf3c962320c72d (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_wait_for_api_service, version=17.1.13, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, tcib_managed=true, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T23:31:50Z, io.openshift.expose-services=, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, managed_by=tripleo_ansible, config_id=tripleo_step4, io.buildah.version=1.41.5, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, name=rhosp-rhel9/openstack-nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.created=2026-01-12T23:31:50Z, summary=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_wait_for_api_service, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_wait_for_api_service.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:14:36 np0005604725 systemd[1]: Started libpod-conmon-edef445902d671f010b09a15d4a06df0413b2294b34a1617cee1bfcf9f6d1c0d.scope. Feb 2 08:14:36 np0005604725 systemd[1]: tmp-crun.F2vzDD.mount: Deactivated successfully. Feb 2 08:14:36 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:36 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/687ae39aab27314971f9d2461304478fc83b44873ba901af0c2d167f2a0f019d/merged/var/log/glance supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:36 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/687ae39aab27314971f9d2461304478fc83b44873ba901af0c2d167f2a0f019d/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:36 np0005604725 podman[114943]: 2026-02-02 08:14:36.531656258 +0000 UTC m=+0.398889991 container init edef445902d671f010b09a15d4a06df0413b2294b34a1617cee1bfcf9f6d1c0d (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal_tls_proxy, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:34:42Z, release=1766032510, summary=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, com.redhat.component=openstack-glance-api-container, vendor=Red Hat, Inc., vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, version=17.1.13, name=rhosp-rhel9/openstack-glance-api, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, url=https://www.redhat.com, io.buildah.version=1.41.5, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, architecture=x86_64, container_name=glance_api_internal_tls_proxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:34:42Z, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:14:36 np0005604725 podman[114943]: 2026-02-02 08:14:36.55690688 +0000 UTC m=+0.424140613 container start edef445902d671f010b09a15d4a06df0413b2294b34a1617cee1bfcf9f6d1c0d (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal_tls_proxy, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, com.redhat.component=openstack-glance-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, name=rhosp-rhel9/openstack-glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, container_name=glance_api_internal_tls_proxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:34:42Z, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.buildah.version=1.41.5, release=1766032510, config_id=tripleo_step4, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 glance-api, build-date=2026-01-12T22:34:42Z) Feb 2 08:14:36 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name glance_api_internal_tls_proxy --conmon-pidfile /run/glance_api_internal_tls_proxy.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=84c08a8ebc73eda47bfbdbf4963c031d --label config_id=tripleo_step4 --label container_name=glance_api_internal_tls_proxy --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/glance_api_internal_tls_proxy.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/glance:/var/log/glance:z --volume /var/log/containers/httpd/glance:/var/log/httpd:z --volume /var/lib/kolla/config_files/glance_api_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro --volume /etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Feb 2 08:14:36 np0005604725 systemd[1]: libpod-ba96db47190c5561478020b41eb854563587fffd276c02942abf3c962320c72d.scope: Deactivated successfully. Feb 2 08:14:36 np0005604725 podman[114941]: 2026-02-02 08:14:36.732330997 +0000 UTC m=+0.613577788 container died ba96db47190c5561478020b41eb854563587fffd276c02942abf3c962320c72d (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_wait_for_api_service, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vcs-type=git, io.buildah.version=1.41.5, container_name=nova_wait_for_api_service, vendor=Red Hat, Inc., tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-nova-api, io.openshift.expose-services=, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_wait_for_api_service.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-nova-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 nova-api, release=1766032510, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T23:31:50Z, batch=17.1_20260112.1, architecture=x86_64) Feb 2 08:14:36 np0005604725 podman[115136]: 2026-02-02 08:14:36.776287659 +0000 UTC m=+0.086955537 container cleanup ba96db47190c5561478020b41eb854563587fffd276c02942abf3c962320c72d (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_wait_for_api_service, name=rhosp-rhel9/openstack-nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, release=1766032510, config_id=tripleo_step4, tcib_managed=true, org.opencontainers.image.created=2026-01-12T23:31:50Z, summary=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, com.redhat.component=openstack-nova-api-container, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, container_name=nova_wait_for_api_service, managed_by=tripleo_ansible, url=https://www.redhat.com, vendor=Red Hat, Inc., io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_wait_for_api_service.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']}, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:14:36 np0005604725 systemd[1]: libpod-conmon-ba96db47190c5561478020b41eb854563587fffd276c02942abf3c962320c72d.scope: Deactivated successfully. Feb 2 08:14:36 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name nova_wait_for_api_service --conmon-pidfile /run/nova_wait_for_api_service.pid --detach=False --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env __OS_DEBUG=true --env TRIPLEO_CONFIG_HASH=0f33bf354435ad6e844c942ca95c792b --label config_id=tripleo_step4 --label container_name=nova_wait_for_api_service --label managed_by=tripleo_ansible --label config_data={'detach': False, 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', '__OS_DEBUG': 'true', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'start_order': 3, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_wait_for_api_service.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/var/lib/container-config-scripts:/container-config-scripts:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/nova_wait_for_api_service.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/nova:/var/log/nova:z --volume /var/log/containers/httpd/nova-api:/var/log/httpd:z --volume /var/lib/kolla/config_files/nova_wait_for_api_service.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro --volume /var/lib/container-config-scripts:/container-config-scripts:z registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:14:37 np0005604725 podman[114219]: 2026-02-02 08:14:37.077433065 +0000 UTC m=+2.952552312 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-nova-api, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-api-container, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, distribution-scope=public, config_id=tripleo_step4, io.openshift.expose-services=, batch=17.1_20260112.1, tcib_managed=true, container_name=nova_metadata, vcs-type=git, release=1766032510, summary=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.5, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T23:31:50Z, build-date=2026-01-12T23:31:50Z, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, description=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible) Feb 2 08:14:37 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:14:37 np0005604725 podman[115229]: 2026-02-02 08:14:37.195126039 +0000 UTC m=+0.085841493 container create 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=nova_api_cron, version=17.1.13, org.opencontainers.image.created=2026-01-12T23:31:50Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, managed_by=tripleo_ansible, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, architecture=x86_64, com.redhat.component=openstack-nova-api-container, io.openshift.expose-services=, release=1766032510, summary=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, tcib_managed=true) Feb 2 08:14:37 np0005604725 systemd[1]: Started libpod-conmon-19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.scope. Feb 2 08:14:37 np0005604725 podman[115229]: 2026-02-02 08:14:37.147951238 +0000 UTC m=+0.038666722 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:14:37 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:14:37 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6dd006660d3bb21edb6b8a3c2682049d0f1b33271d9801718fa841fc070616f9/merged/var/log/httpd supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:37 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6dd006660d3bb21edb6b8a3c2682049d0f1b33271d9801718fa841fc070616f9/merged/var/log/nova supports timestamps until 2038 (0x7fffffff) Feb 2 08:14:37 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:14:37 np0005604725 podman[115229]: 2026-02-02 08:14:37.297523176 +0000 UTC m=+0.188238690 container init 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=nova_api_cron, vendor=Red Hat, Inc., distribution-scope=public, config_id=tripleo_step4, architecture=x86_64, org.opencontainers.image.created=2026-01-12T23:31:50Z, summary=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, build-date=2026-01-12T23:31:50Z, name=rhosp-rhel9/openstack-nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, url=https://www.redhat.com, com.redhat.component=openstack-nova-api-container, io.openshift.expose-services=, version=17.1.13, tcib_managed=true, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, release=1766032510) Feb 2 08:14:37 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:14:37 np0005604725 podman[115229]: 2026-02-02 08:14:37.336120934 +0000 UTC m=+0.226836398 container start 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, distribution-scope=public, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, com.redhat.component=openstack-nova-api-container, config_id=tripleo_step4, container_name=nova_api_cron, org.opencontainers.image.created=2026-01-12T23:31:50Z, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, name=rhosp-rhel9/openstack-nova-api, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, build-date=2026-01-12T23:31:50Z, vendor=Red Hat, Inc., vcs-type=git, batch=17.1_20260112.1, io.openshift.expose-services=, url=https://www.redhat.com) Feb 2 08:14:37 np0005604725 python3[110147]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name nova_api_cron --conmon-pidfile /run/nova_api_cron.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=0f33bf354435ad6e844c942ca95c792b --healthcheck-command /usr/share/openstack-tripleo-common/healthcheck/cron nova --label config_id=tripleo_step4 --label container_name=nova_api_cron --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/nova_api_cron.log --network host --privileged=False --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/log/containers/nova:/var/log/nova:z --volume /var/log/containers/httpd/nova-api:/var/log/httpd:z --volume /var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Feb 2 08:14:37 np0005604725 podman[115258]: 2026-02-02 08:14:37.422711568 +0000 UTC m=+0.083259023 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=starting, managed_by=tripleo_ansible, container_name=nova_api_cron, description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, name=rhosp-rhel9/openstack-nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, release=1766032510, batch=17.1_20260112.1, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, build-date=2026-01-12T23:31:50Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, tcib_managed=true, io.openshift.expose-services=, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-api-container) Feb 2 08:14:37 np0005604725 systemd[1]: var-lib-containers-storage-overlay-023016620eec8603d0ceaf888c754bf4ec0c8bbbc44f8bbc8736968324c31c22-merged.mount: Deactivated successfully. Feb 2 08:14:37 np0005604725 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-ba96db47190c5561478020b41eb854563587fffd276c02942abf3c962320c72d-userdata-shm.mount: Deactivated successfully. Feb 2 08:14:37 np0005604725 podman[115258]: 2026-02-02 08:14:37.451333932 +0000 UTC m=+0.111881397 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, name=rhosp-rhel9/openstack-nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, build-date=2026-01-12T23:31:50Z, release=1766032510, container_name=nova_api_cron, version=17.1.13, com.redhat.component=openstack-nova-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, batch=17.1_20260112.1, tcib_managed=true, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T23:31:50Z, vcs-type=git, config_id=tripleo_step4) Feb 2 08:14:37 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:14:37 np0005604725 podman[114334]: 2026-02-02 08:14:37.686984249 +0000 UTC m=+3.320301212 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, config_id=tripleo_step4, tcib_managed=true, distribution-scope=public, io.buildah.version=1.41.5, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., architecture=x86_64, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, version=17.1.13, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.created=2026-01-12T23:31:50Z, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, build-date=2026-01-12T23:31:50Z, container_name=nova_api) Feb 2 08:14:37 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:14:37 np0005604725 python3[115326]: ansible-file Invoked with path=/etc/systemd/system/tripleo_ceilometer_agent_central.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:38 np0005604725 python3[115350]: ansible-file Invoked with path=/etc/systemd/system/tripleo_ceilometer_agent_notification.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:38 np0005604725 python3[115374]: ansible-file Invoked with path=/etc/systemd/system/tripleo_cinder_api.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:38 np0005604725 python3[115390]: ansible-file Invoked with path=/etc/systemd/system/tripleo_cinder_api_cron.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:39 np0005604725 python3[115414]: ansible-file Invoked with path=/etc/systemd/system/tripleo_cinder_scheduler.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:39 np0005604725 python3[115438]: ansible-file Invoked with path=/etc/systemd/system/tripleo_glance_api.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:39 np0005604725 python3[115464]: ansible-file Invoked with path=/etc/systemd/system/tripleo_glance_api_cron.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:39 np0005604725 python3[115480]: ansible-file Invoked with path=/etc/systemd/system/tripleo_glance_api_internal.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:40 np0005604725 python3[115504]: ansible-file Invoked with path=/etc/systemd/system/tripleo_glance_api_internal_tls_proxy.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:40 np0005604725 python3[115564]: ansible-file Invoked with path=/etc/systemd/system/tripleo_glance_api_tls_proxy.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:40 np0005604725 python3[115588]: ansible-file Invoked with path=/etc/systemd/system/tripleo_heat_api.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:40 np0005604725 python3[115657]: ansible-file Invoked with path=/etc/systemd/system/tripleo_heat_api_cfn.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:41 np0005604725 python3[115681]: ansible-file Invoked with path=/etc/systemd/system/tripleo_heat_api_cron.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:41 np0005604725 python3[115705]: ansible-file Invoked with path=/etc/systemd/system/tripleo_heat_engine.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:41 np0005604725 python3[115729]: ansible-file Invoked with path=/etc/systemd/system/tripleo_logrotate_crond.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:41 np0005604725 python3[115745]: ansible-file Invoked with path=/etc/systemd/system/tripleo_manila_api.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:42 np0005604725 python3[115769]: ansible-file Invoked with path=/etc/systemd/system/tripleo_manila_api_cron.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:42 np0005604725 python3[115801]: ansible-file Invoked with path=/etc/systemd/system/tripleo_manila_scheduler.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:42 np0005604725 python3[115817]: ansible-file Invoked with path=/etc/systemd/system/tripleo_neutron_api.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:43 np0005604725 python3[115890]: ansible-file Invoked with path=/etc/systemd/system/tripleo_neutron_server_tls_proxy.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:43 np0005604725 python3[115914]: ansible-file Invoked with path=/etc/systemd/system/tripleo_nova_api.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:43 np0005604725 python3[115945]: ansible-file Invoked with path=/etc/systemd/system/tripleo_nova_api_cron.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:43 np0005604725 systemd[1]: Stopping User Manager for UID 0... Feb 2 08:14:43 np0005604725 systemd[113868]: Activating special unit Exit the Session... Feb 2 08:14:43 np0005604725 systemd[113868]: Stopped target Main User Target. Feb 2 08:14:43 np0005604725 systemd[113868]: Stopped target Basic System. Feb 2 08:14:43 np0005604725 systemd[113868]: Stopped target Paths. Feb 2 08:14:43 np0005604725 systemd[113868]: Stopped target Sockets. Feb 2 08:14:43 np0005604725 systemd[113868]: Stopped target Timers. Feb 2 08:14:43 np0005604725 systemd[113868]: Stopped Daily Cleanup of User's Temporary Directories. Feb 2 08:14:43 np0005604725 systemd[113868]: Closed D-Bus User Message Bus Socket. Feb 2 08:14:43 np0005604725 systemd[113868]: Stopped Create User's Volatile Files and Directories. Feb 2 08:14:43 np0005604725 systemd[113868]: Removed slice User Application Slice. Feb 2 08:14:43 np0005604725 systemd[113868]: Reached target Shutdown. Feb 2 08:14:43 np0005604725 systemd[113868]: Finished Exit the Session. Feb 2 08:14:43 np0005604725 systemd[113868]: Reached target Exit the Session. Feb 2 08:14:43 np0005604725 systemd[1]: user@0.service: Deactivated successfully. Feb 2 08:14:43 np0005604725 systemd[1]: Stopped User Manager for UID 0. Feb 2 08:14:43 np0005604725 systemd[1]: Stopping User Runtime Directory /run/user/0... Feb 2 08:14:43 np0005604725 systemd[1]: run-user-0.mount: Deactivated successfully. Feb 2 08:14:43 np0005604725 systemd[1]: user-runtime-dir@0.service: Deactivated successfully. Feb 2 08:14:43 np0005604725 systemd[1]: Stopped User Runtime Directory /run/user/0. Feb 2 08:14:43 np0005604725 systemd[1]: Removed slice User Slice of UID 0. Feb 2 08:14:44 np0005604725 python3[115962]: ansible-file Invoked with path=/etc/systemd/system/tripleo_nova_conductor.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:44 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:14:44 np0005604725 podman[116041]: 2026-02-02 08:14:44.188523892 +0000 UTC m=+0.058999072 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, vendor=Red Hat, Inc., release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-collectd-container, container_name=collectd, name=rhosp-rhel9/openstack-collectd, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, url=https://www.redhat.com, build-date=2026-01-12T22:10:15Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, vcs-type=git, description=Red Hat OpenStack Platform 17.1 collectd, summary=Red Hat OpenStack Platform 17.1 collectd, managed_by=tripleo_ansible, batch=17.1_20260112.1, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step3, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:15Z, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, version=17.1.13) Feb 2 08:14:44 np0005604725 podman[116041]: 2026-02-02 08:14:44.201827119 +0000 UTC m=+0.072302299 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, maintainer=OpenStack TripleO Team, config_id=tripleo_step3, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-collectd, build-date=2026-01-12T22:10:15Z, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 collectd, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.openshift.expose-services=, io.buildah.version=1.41.5, container_name=collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:15Z, url=https://www.redhat.com, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, architecture=x86_64, release=1766032510, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-collectd-container, version=17.1.13, vcs-type=git) Feb 2 08:14:44 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:14:44 np0005604725 python3[116040]: ansible-file Invoked with path=/etc/systemd/system/tripleo_nova_metadata.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:44 np0005604725 python3[116084]: ansible-file Invoked with path=/etc/systemd/system/tripleo_nova_scheduler.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:44 np0005604725 python3[116133]: ansible-file Invoked with path=/etc/systemd/system/tripleo_nova_vnc_proxy.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:44 np0005604725 python3[116173]: ansible-file Invoked with path=/etc/systemd/system/tripleo_ovn_controller.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:45 np0005604725 python3[116197]: ansible-file Invoked with path=/etc/systemd/system/tripleo_placement_api.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:45 np0005604725 python3[116270]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_account_auditor.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:45 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:14:45 np0005604725 systemd[1]: tmp-crun.1enxvU.mount: Deactivated successfully. Feb 2 08:14:45 np0005604725 podman[116295]: 2026-02-02 08:14:45.769541701 +0000 UTC m=+0.081172939 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-horizon-container, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:34:41Z, vcs-type=git, maintainer=OpenStack TripleO Team, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-horizon, container_name=horizon, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., version=17.1.13, managed_by=tripleo_ansible, tcib_managed=true, architecture=x86_64, build-date=2026-01-12T22:34:41Z, release=1766032510, description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 horizon, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:14:45 np0005604725 podman[116295]: 2026-02-02 08:14:45.800163186 +0000 UTC m=+0.111794504 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, architecture=x86_64, config_id=tripleo_step3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:34:41Z, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 horizon, build-date=2026-01-12T22:34:41Z, vendor=Red Hat, Inc., batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, release=1766032510, vcs-type=git, name=rhosp-rhel9/openstack-horizon, tcib_managed=true, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, summary=Red Hat OpenStack Platform 17.1 horizon, com.redhat.component=openstack-horizon-container, container_name=horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, managed_by=tripleo_ansible, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon) Feb 2 08:14:45 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:14:45 np0005604725 python3[116294]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_account_reaper.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:46 np0005604725 python3[116345]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_account_replicator.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:46 np0005604725 python3[116372]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_account_server.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:46 np0005604725 python3[116418]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_container_auditor.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:47 np0005604725 python3[116464]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_container_replicator.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:47 np0005604725 python3[116488]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_container_server.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:47 np0005604725 python3[116512]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_container_updater.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:47 np0005604725 python3[116536]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_object_auditor.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:48 np0005604725 python3[116552]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_object_expirer.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:48 np0005604725 python3[116576]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_object_replicator.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:48 np0005604725 python3[116600]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_object_server.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:48 np0005604725 python3[116624]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_object_updater.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:48 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:14:48 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:14:48 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:14:49 np0005604725 podman[116641]: 2026-02-02 08:14:49.047740326 +0000 UTC m=+0.074142245 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, container_name=keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:33:53Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-type=git, io.buildah.version=1.41.5, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, name=rhosp-rhel9/openstack-keystone, distribution-scope=public, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step3, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, com.redhat.component=openstack-keystone-container, org.opencontainers.image.created=2026-01-12T22:33:53Z, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:14:49 np0005604725 systemd[1]: tmp-crun.mIGphh.mount: Deactivated successfully. Feb 2 08:14:49 np0005604725 python3[116640]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_proxy.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:49 np0005604725 podman[116641]: 2026-02-02 08:14:49.135285359 +0000 UTC m=+0.161687268 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-keystone, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:33:53Z, com.redhat.component=openstack-keystone-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.5, url=https://www.redhat.com, container_name=keystone, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, release=1766032510, config_id=tripleo_step3, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:14:49 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:14:49 np0005604725 podman[116642]: 2026-02-02 08:14:49.104098657 +0000 UTC m=+0.122096449 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, vendor=Red Hat, Inc., vcs-type=git, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:33:53Z, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=keystone_cron, vcs-ref=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, name=rhosp-rhel9/openstack-keystone, build-date=2026-01-12T22:33:53Z, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, architecture=x86_64, config_id=tripleo_step3, com.redhat.component=openstack-keystone-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true) Feb 2 08:14:49 np0005604725 podman[116642]: 2026-02-02 08:14:49.183086578 +0000 UTC m=+0.201084400 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-keystone, distribution-scope=public, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, architecture=x86_64, batch=17.1_20260112.1, url=https://www.redhat.com, config_id=tripleo_step3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-keystone-container, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:33:53Z, maintainer=OpenStack TripleO Team, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.buildah.version=1.41.5, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, release=1766032510, build-date=2026-01-12T22:33:53Z, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., tcib_managed=true, container_name=keystone_cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vcs-type=git) Feb 2 08:14:49 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:14:49 np0005604725 podman[116643]: 2026-02-02 08:14:49.105282863 +0000 UTC m=+0.125427871 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:34:43Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.13, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:43Z, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.component=openstack-iscsid-container, vendor=Red Hat, Inc., architecture=x86_64, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, vcs-type=git, name=rhosp-rhel9/openstack-iscsid, container_name=iscsid, tcib_managed=true, io.openshift.expose-services=, batch=17.1_20260112.1, url=https://www.redhat.com, distribution-scope=public, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}) Feb 2 08:14:49 np0005604725 podman[116643]: 2026-02-02 08:14:49.242778612 +0000 UTC m=+0.262923640 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, build-date=2026-01-12T22:34:43Z, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:34:43Z, container_name=iscsid, release=1766032510, description=Red Hat OpenStack Platform 17.1 iscsid, name=rhosp-rhel9/openstack-iscsid, batch=17.1_20260112.1, vendor=Red Hat, Inc., com.redhat.component=openstack-iscsid-container, managed_by=tripleo_ansible, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.13) Feb 2 08:14:49 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:14:49 np0005604725 python3[116724]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_proxy_tls_proxy.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:49 np0005604725 python3[116750]: ansible-file Invoked with path=/etc/systemd/system/tripleo_swift_rsync.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:14:50 np0005604725 python3[116774]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_ceilometer_agent_central_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:50 np0005604725 systemd[1]: tmp-crun.KywBPV.mount: Deactivated successfully. Feb 2 08:14:50 np0005604725 python3[116798]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_ceilometer_agent_notification_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:50 np0005604725 python3[116822]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_cinder_api_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:50 np0005604725 python3[116878]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_cinder_api_cron_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:51 np0005604725 python3[116915]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_cinder_scheduler_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:51 np0005604725 python3[116939]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_glance_api_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:51 np0005604725 python3[116963]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_glance_api_cron_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:51 np0005604725 python3[116988]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_glance_api_internal_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:52 np0005604725 python3[117004]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_glance_api_internal_tls_proxy_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:52 np0005604725 python3[117028]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_glance_api_tls_proxy_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:52 np0005604725 python3[117052]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_heat_api_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:53 np0005604725 python3[117076]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_heat_api_cfn_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:53 np0005604725 python3[117092]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_heat_api_cron_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:53 np0005604725 python3[117116]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_heat_engine_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:53 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:14:53 np0005604725 podman[117141]: 2026-02-02 08:14:53.716661318 +0000 UTC m=+0.088304978 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-mariadb-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, name=rhosp-rhel9/openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, managed_by=tripleo_ansible, tcib_managed=true, config_id=tripleo_step2, container_name=clustercheck, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, build-date=2026-01-12T22:10:18Z, vcs-type=git, version=17.1.13) Feb 2 08:14:53 np0005604725 python3[117140]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_logrotate_crond_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:53 np0005604725 podman[117141]: 2026-02-02 08:14:53.783146168 +0000 UTC m=+0.154789898 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-mariadb-container, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, managed_by=tripleo_ansible, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step2, vendor=Red Hat, Inc., batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.openshift.expose-services=, container_name=clustercheck, build-date=2026-01-12T22:10:18Z) Feb 2 08:14:53 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:14:54 np0005604725 python3[117204]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_manila_api_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:54 np0005604725 python3[117220]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_manila_api_cron_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:54 np0005604725 python3[117244]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_manila_scheduler_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:54 np0005604725 python3[117309]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_neutron_api_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:54 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:14:54 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:14:55 np0005604725 systemd[1]: tmp-crun.ahqQBI.mount: Deactivated successfully. Feb 2 08:14:55 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:14:55 np0005604725 podman[117334]: 2026-02-02 08:14:55.092995926 +0000 UTC m=+0.100447058 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=starting, architecture=x86_64, name=rhosp-rhel9/openstack-cinder-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, build-date=2026-01-12T22:58:47Z, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.buildah.version=1.41.5, distribution-scope=public, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:58:47Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, version=17.1.13, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, config_id=tripleo_step4, container_name=cinder_scheduler, url=https://www.redhat.com, vcs-type=git, io.openshift.expose-services=, com.redhat.component=openstack-cinder-scheduler-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, vendor=Red Hat, Inc.) Feb 2 08:14:55 np0005604725 podman[117334]: 2026-02-02 08:14:55.135932457 +0000 UTC m=+0.143383599 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, name=rhosp-rhel9/openstack-cinder-scheduler, org.opencontainers.image.created=2026-01-12T22:58:47Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.component=openstack-cinder-scheduler-container, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, release=1766032510, vendor=Red Hat, Inc., tcib_managed=true, batch=17.1_20260112.1, vcs-type=git, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, build-date=2026-01-12T22:58:47Z, version=17.1.13, distribution-scope=public, io.buildah.version=1.41.5, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, managed_by=tripleo_ansible, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=cinder_scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler) Feb 2 08:14:55 np0005604725 python3[117333]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_neutron_server_tls_proxy_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:55 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:14:55 np0005604725 podman[117335]: 2026-02-02 08:14:55.176462305 +0000 UTC m=+0.186474796 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, config_id=tripleo_step4, build-date=2026-01-12T22:58:44Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, batch=17.1_20260112.1, version=17.1.13, vcs-type=git, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, container_name=cinder_api_cron, description=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:58:44Z, io.buildah.version=1.41.5, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-cinder-api-container, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, url=https://www.redhat.com, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, name=rhosp-rhel9/openstack-cinder-api, release=1766032510) Feb 2 08:14:55 np0005604725 podman[117335]: 2026-02-02 08:14:55.213578058 +0000 UTC m=+0.223590469 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, container_name=cinder_api_cron, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, org.opencontainers.image.created=2026-01-12T22:58:44Z, maintainer=OpenStack TripleO Team, tcib_managed=true, version=17.1.13, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, name=rhosp-rhel9/openstack-cinder-api, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, release=1766032510, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, distribution-scope=public, vendor=Red Hat, Inc., architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-cinder-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:58:44Z, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.buildah.version=1.41.5) Feb 2 08:14:55 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:14:55 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:14:55 np0005604725 podman[117366]: 2026-02-02 08:14:55.218995644 +0000 UTC m=+0.118765657 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=starting, name=rhosp-rhel9/openstack-ceilometer-central, io.buildah.version=1.41.5, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:07:24Z, url=https://www.redhat.com, container_name=ceilometer_agent_central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, build-date=2026-01-12T23:07:24Z, managed_by=tripleo_ansible, io.openshift.expose-services=, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, distribution-scope=public, maintainer=OpenStack TripleO Team, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, tcib_managed=true, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, vendor=Red Hat, Inc., com.redhat.component=openstack-ceilometer-central-container, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06) Feb 2 08:14:55 np0005604725 podman[117419]: 2026-02-02 08:14:55.332927373 +0000 UTC m=+0.094768685 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=starting, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, build-date=2026-01-12T23:07:25Z, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, release=1766032510, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, config_id=tripleo_step4, vcs-type=git, container_name=ceilometer_agent_notification, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-ceilometer-notification-container, name=rhosp-rhel9/openstack-ceilometer-notification, architecture=x86_64, maintainer=OpenStack TripleO Team, tcib_managed=true, vendor=Red Hat, Inc., distribution-scope=public, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T23:07:25Z) Feb 2 08:14:55 np0005604725 podman[117366]: 2026-02-02 08:14:55.350445248 +0000 UTC m=+0.250215271 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, release=1766032510, container_name=ceilometer_agent_central, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, version=17.1.13, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.buildah.version=1.41.5, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-type=git, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, org.opencontainers.image.created=2026-01-12T23:07:24Z, vendor=Red Hat, Inc., com.redhat.component=openstack-ceilometer-central-container, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-ceilometer-central, build-date=2026-01-12T23:07:24Z, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 ceilometer-central, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, architecture=x86_64) Feb 2 08:14:55 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:14:55 np0005604725 python3[117434]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_nova_api_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:55 np0005604725 podman[117419]: 2026-02-02 08:14:55.406987114 +0000 UTC m=+0.168828426 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, build-date=2026-01-12T23:07:25Z, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-ceilometer-notification-container, container_name=ceilometer_agent_notification, managed_by=tripleo_ansible, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, org.opencontainers.image.created=2026-01-12T23:07:25Z, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, release=1766032510, io.openshift.expose-services=, distribution-scope=public, version=17.1.13, url=https://www.redhat.com, name=rhosp-rhel9/openstack-ceilometer-notification, tcib_managed=true, vcs-type=git, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, maintainer=OpenStack TripleO Team) Feb 2 08:14:55 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:14:55 np0005604725 python3[117475]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_nova_api_cron_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:55 np0005604725 python3[117503]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_nova_conductor_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:56 np0005604725 systemd[1]: tmp-crun.widFwO.mount: Deactivated successfully. Feb 2 08:14:56 np0005604725 python3[117519]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_nova_metadata_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:56 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:14:56 np0005604725 podman[117529]: 2026-02-02 08:14:56.318977814 +0000 UTC m=+0.068034589 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, release=1766032510, org.opencontainers.image.created=2026-01-12T22:53:19Z, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, version=17.1.13, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, build-date=2026-01-12T22:53:19Z, url=https://www.redhat.com, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-heat-api, com.redhat.component=openstack-heat-api-container, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 heat-api, container_name=heat_api_cron, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, io.buildah.version=1.41.5, distribution-scope=public, config_id=tripleo_step4, vcs-ref=755001522886c265e88561b4997cab642504a845) Feb 2 08:14:56 np0005604725 podman[117529]: 2026-02-02 08:14:56.35786219 +0000 UTC m=+0.106918965 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, container_name=heat_api_cron, description=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, summary=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.created=2026-01-12T22:53:19Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, version=17.1.13, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-heat-api-container, vcs-ref=755001522886c265e88561b4997cab642504a845, release=1766032510, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, name=rhosp-rhel9/openstack-heat-api, tcib_managed=true, managed_by=tripleo_ansible, distribution-scope=public, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vendor=Red Hat, Inc.) Feb 2 08:14:56 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:14:56 np0005604725 python3[117556]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_nova_scheduler_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:56 np0005604725 python3[117586]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_nova_vnc_proxy_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:56 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:14:56 np0005604725 systemd[1]: tmp-crun.o6n6mL.mount: Deactivated successfully. Feb 2 08:14:56 np0005604725 podman[117651]: 2026-02-02 08:14:56.871563248 +0000 UTC m=+0.079262892 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=starting, vcs-ref=755001522886c265e88561b4997cab642504a845, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, url=https://www.redhat.com, vcs-type=git, managed_by=tripleo_ansible, build-date=2026-01-12T22:53:38Z, vendor=Red Hat, Inc., tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 heat-engine, description=Red Hat OpenStack Platform 17.1 heat-engine, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-heat-engine, version=17.1.13, container_name=heat_engine, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, config_id=tripleo_step4, architecture=x86_64, io.buildah.version=1.41.5, com.redhat.component=openstack-heat-engine-container, org.opencontainers.image.created=2026-01-12T22:53:38Z) Feb 2 08:14:56 np0005604725 podman[117651]: 2026-02-02 08:14:56.896981694 +0000 UTC m=+0.104681398 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, vcs-type=git, vcs-ref=755001522886c265e88561b4997cab642504a845, container_name=heat_engine, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-heat-engine, org.opencontainers.image.created=2026-01-12T22:53:38Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, distribution-scope=public, release=1766032510, description=Red Hat OpenStack Platform 17.1 heat-engine, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, com.redhat.component=openstack-heat-engine-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:53:38Z, summary=Red Hat OpenStack Platform 17.1 heat-engine, url=https://www.redhat.com, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.buildah.version=1.41.5) Feb 2 08:14:56 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:14:56 np0005604725 python3[117650]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_ovn_controller_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:57 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:14:57 np0005604725 podman[117741]: 2026-02-02 08:14:57.129258827 +0000 UTC m=+0.068696890 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, container_name=logrotate_crond, version=17.1.13, architecture=x86_64, vcs-type=git, release=1766032510, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:15Z, com.redhat.component=openstack-cron-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, managed_by=tripleo_ansible, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 cron, build-date=2026-01-12T22:10:15Z, batch=17.1_20260112.1, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-cron, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 cron) Feb 2 08:14:57 np0005604725 podman[117741]: 2026-02-02 08:14:57.137457727 +0000 UTC m=+0.076895850 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:15Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, com.redhat.component=openstack-cron-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-cron, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, vendor=Red Hat, Inc., container_name=logrotate_crond, managed_by=tripleo_ansible, release=1766032510, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 cron, io.openshift.expose-services=, vcs-type=git, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 cron, config_id=tripleo_step4, architecture=x86_64, batch=17.1_20260112.1, build-date=2026-01-12T22:10:15Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron) Feb 2 08:14:57 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:14:57 np0005604725 python3[117740]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_placement_api_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:57 np0005604725 python3[117783]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_account_auditor_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:57 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:14:57 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:14:57 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:14:57 np0005604725 podman[117815]: 2026-02-02 08:14:57.674426134 +0000 UTC m=+0.060205999 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=starting, build-date=2026-01-12T22:52:22Z, tcib_managed=true, com.redhat.component=openstack-manila-api-container, vendor=Red Hat, Inc., container_name=manila_api_cron, version=17.1.13, name=rhosp-rhel9/openstack-manila-api, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, io.openshift.expose-services=, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, org.opencontainers.image.created=2026-01-12T22:52:22Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, release=1766032510, batch=17.1_20260112.1, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.41.5, vcs-type=git) Feb 2 08:14:57 np0005604725 podman[117815]: 2026-02-02 08:14:57.680386386 +0000 UTC m=+0.066166261 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, distribution-scope=public, release=1766032510, description=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.41.5, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, name=rhosp-rhel9/openstack-manila-api, io.openshift.expose-services=, container_name=manila_api_cron, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:52:22Z, build-date=2026-01-12T22:52:22Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-manila-api-container, summary=Red Hat OpenStack Platform 17.1 manila-api, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, managed_by=tripleo_ansible, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, config_id=tripleo_step4, version=17.1.13) Feb 2 08:14:57 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:14:57 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:14:57 np0005604725 podman[117817]: 2026-02-02 08:14:57.745781123 +0000 UTC m=+0.125065190 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-ref=755001522886c265e88561b4997cab642504a845, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 heat-api, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, io.buildah.version=1.41.5, com.redhat.component=openstack-heat-api-container, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:53:19Z, config_id=tripleo_step4, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, name=rhosp-rhel9/openstack-heat-api, architecture=x86_64, io.openshift.expose-services=, build-date=2026-01-12T22:53:19Z, description=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=heat_api) Feb 2 08:14:57 np0005604725 python3[117814]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_account_reaper_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:57 np0005604725 podman[117851]: 2026-02-02 08:14:57.798791672 +0000 UTC m=+0.079114827 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=cinder_api, batch=17.1_20260112.1, io.buildah.version=1.41.5, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, com.redhat.component=openstack-cinder-api-container, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, release=1766032510, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, name=rhosp-rhel9/openstack-cinder-api, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, tcib_managed=true, build-date=2026-01-12T22:58:44Z) Feb 2 08:14:57 np0005604725 podman[117817]: 2026-02-02 08:14:57.834923355 +0000 UTC m=+0.214207382 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, description=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, config_id=tripleo_step4, container_name=heat_api, tcib_managed=true, vcs-ref=755001522886c265e88561b4997cab642504a845, release=1766032510, vendor=Red Hat, Inc., vcs-type=git, url=https://www.redhat.com, distribution-scope=public, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-heat-api-container, build-date=2026-01-12T22:53:19Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp-rhel9/openstack-heat-api, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:53:19Z, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845) Feb 2 08:14:57 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:14:57 np0005604725 podman[117816]: 2026-02-02 08:14:57.848700036 +0000 UTC m=+0.222502096 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=starting, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, container_name=manila_scheduler, vendor=Red Hat, Inc., vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 manila-scheduler, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, release=1766032510, config_id=tripleo_step4, managed_by=tripleo_ansible, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:52:54Z, url=https://www.redhat.com, io.openshift.expose-services=, name=rhosp-rhel9/openstack-manila-scheduler, com.redhat.component=openstack-manila-scheduler-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, org.opencontainers.image.created=2026-01-12T22:52:54Z, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, version=17.1.13, tcib_managed=true) Feb 2 08:14:57 np0005604725 podman[117851]: 2026-02-02 08:14:57.889598324 +0000 UTC m=+0.169921499 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, summary=Red Hat OpenStack Platform 17.1 cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.openshift.expose-services=, version=17.1.13, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vendor=Red Hat, Inc., config_id=tripleo_step4, io.buildah.version=1.41.5, distribution-scope=public, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, build-date=2026-01-12T22:58:44Z, managed_by=tripleo_ansible, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, container_name=cinder_api, com.redhat.component=openstack-cinder-api-container, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, url=https://www.redhat.com) Feb 2 08:14:57 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:14:57 np0005604725 podman[117816]: 2026-02-02 08:14:57.940643253 +0000 UTC m=+0.314445313 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, name=rhosp-rhel9/openstack-manila-scheduler, com.redhat.component=openstack-manila-scheduler-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, distribution-scope=public, io.openshift.expose-services=, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, org.opencontainers.image.created=2026-01-12T22:52:54Z, version=17.1.13, container_name=manila_scheduler, description=Red Hat OpenStack Platform 17.1 manila-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, release=1766032510, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:52:54Z, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, tcib_managed=true, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, batch=17.1_20260112.1, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, managed_by=tripleo_ansible) Feb 2 08:14:57 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:14:57 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:14:58 np0005604725 python3[117929]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_account_replicator_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:58 np0005604725 podman[117931]: 2026-02-02 08:14:58.056665536 +0000 UTC m=+0.083499971 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, vcs-type=git, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, config_id=tripleo_step4, build-date=2026-01-12T22:54:02Z, name=rhosp-rhel9/openstack-heat-api-cfn, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, version=17.1.13, container_name=heat_api_cfn, url=https://www.redhat.com, batch=17.1_20260112.1, architecture=x86_64, com.redhat.component=openstack-heat-api-cfn-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, distribution-scope=public, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.created=2026-01-12T22:54:02Z, release=1766032510) Feb 2 08:14:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:14:58 np0005604725 podman[117931]: 2026-02-02 08:14:58.123799816 +0000 UTC m=+0.150634271 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, org.opencontainers.image.created=2026-01-12T22:54:02Z, tcib_managed=true, config_id=tripleo_step4, version=17.1.13, batch=17.1_20260112.1, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, build-date=2026-01-12T22:54:02Z, maintainer=OpenStack TripleO Team, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, container_name=heat_api_cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, release=1766032510, io.buildah.version=1.41.5, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=, com.redhat.component=openstack-heat-api-cfn-container, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-heat-api-cfn) Feb 2 08:14:58 np0005604725 systemd[1]: tmp-crun.czEheo.mount: Deactivated successfully. Feb 2 08:14:58 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:14:58 np0005604725 podman[117983]: 2026-02-02 08:14:58.20218175 +0000 UTC m=+0.077260201 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=starting, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, description=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:57:35Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, io.buildah.version=1.41.5, batch=17.1_20260112.1, tcib_managed=true, container_name=neutron_api, summary=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, com.redhat.component=openstack-neutron-server-container, url=https://www.redhat.com, distribution-scope=public, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:57:35Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, version=17.1.13, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-neutron-server, config_id=tripleo_step4, release=1766032510) Feb 2 08:14:58 np0005604725 python3[117984]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_account_server_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:58 np0005604725 podman[117983]: 2026-02-02 08:14:58.38786031 +0000 UTC m=+0.262938691 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, batch=17.1_20260112.1, com.redhat.component=openstack-neutron-server-container, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, name=rhosp-rhel9/openstack-neutron-server, summary=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_step4, release=1766032510, tcib_managed=true, version=17.1.13, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, io.openshift.expose-services=, architecture=x86_64, build-date=2026-01-12T22:57:35Z, org.opencontainers.image.created=2026-01-12T22:57:35Z, description=Red Hat OpenStack Platform 17.1 neutron-server, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=neutron_api, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server) Feb 2 08:14:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:14:58 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:14:58 np0005604725 python3[118075]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_container_auditor_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:58 np0005604725 podman[118078]: 2026-02-02 08:14:58.479400185 +0000 UTC m=+0.067745779 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=starting, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, com.redhat.component=openstack-nova-conductor-container, container_name=nova_conductor, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 nova-conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, name=rhosp-rhel9/openstack-nova-conductor, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, build-date=2026-01-12T23:32:18Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T23:32:18Z, batch=17.1_20260112.1, vcs-type=git, distribution-scope=public, release=1766032510, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor) Feb 2 08:14:58 np0005604725 podman[118078]: 2026-02-02 08:14:58.500000514 +0000 UTC m=+0.088346148 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, distribution-scope=public, release=1766032510, com.redhat.component=openstack-nova-conductor-container, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-nova-conductor, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, summary=Red Hat OpenStack Platform 17.1 nova-conductor, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., config_id=tripleo_step4, io.buildah.version=1.41.5, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 nova-conductor, maintainer=OpenStack TripleO Team, version=17.1.13, container_name=nova_conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, build-date=2026-01-12T23:32:18Z, org.opencontainers.image.created=2026-01-12T23:32:18Z, vcs-type=git, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor) Feb 2 08:14:58 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:14:58 np0005604725 python3[118117]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_container_replicator_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:14:58 np0005604725 podman[118142]: 2026-02-02 08:14:58.910977104 +0000 UTC m=+0.076431015 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=starting, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, vcs-type=git, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T23:32:05Z, com.redhat.component=openstack-nova-scheduler-container, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, name=rhosp-rhel9/openstack-nova-scheduler, url=https://www.redhat.com, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, batch=17.1_20260112.1, build-date=2026-01-12T23:32:05Z, version=17.1.13, managed_by=tripleo_ansible, distribution-scope=public, architecture=x86_64, release=1766032510, description=Red Hat OpenStack Platform 17.1 nova-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, container_name=nova_scheduler, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler) Feb 2 08:14:58 np0005604725 podman[118142]: 2026-02-02 08:14:58.932291444 +0000 UTC m=+0.097745375 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, org.opencontainers.image.created=2026-01-12T23:32:05Z, io.openshift.expose-services=, io.buildah.version=1.41.5, config_id=tripleo_step4, architecture=x86_64, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, version=17.1.13, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 nova-scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, com.redhat.component=openstack-nova-scheduler-container, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, build-date=2026-01-12T23:32:05Z, managed_by=tripleo_ansible, vcs-type=git, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, name=rhosp-rhel9/openstack-nova-scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, batch=17.1_20260112.1, container_name=nova_scheduler, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler) Feb 2 08:14:58 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:14:58 np0005604725 python3[118141]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_container_server_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:59 np0005604725 python3[118196]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_container_updater_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:59 np0005604725 python3[118214]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_object_auditor_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:59 np0005604725 snmpd[107533]: empty variable list in _query Feb 2 08:14:59 np0005604725 snmpd[107533]: empty variable list in _query Feb 2 08:14:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:14:59 np0005604725 podman[118292]: 2026-02-02 08:14:59.729466568 +0000 UTC m=+0.081200701 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=starting, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, io.openshift.expose-services=, tcib_managed=true, version=17.1.13, vcs-type=git, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, org.opencontainers.image.created=2026-01-12T23:32:22Z, url=https://www.redhat.com, release=1766032510, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, container_name=nova_vnc_proxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, com.redhat.component=openstack-nova-novncproxy-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-nova-novncproxy, build-date=2026-01-12T23:32:22Z, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy) Feb 2 08:14:59 np0005604725 python3[118291]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_object_expirer_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:14:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:15:00 np0005604725 podman[118345]: 2026-02-02 08:15:00.016167772 +0000 UTC m=+0.072705751 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=healthy, config_id=tripleo_step4, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_account_replicator, name=rhosp-rhel9/openstack-swift-account, release=1766032510, build-date=2026-01-12T22:50:44Z, tcib_managed=true, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, batch=17.1_20260112.1, com.redhat.component=openstack-swift-account-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-account, io.buildah.version=1.41.5, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:50:44Z, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, io.openshift.expose-services=, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, vcs-type=git, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account) Feb 2 08:15:00 np0005604725 python3[118344]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_object_replicator_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:15:00 np0005604725 podman[118292]: 2026-02-02 08:15:00.114806525 +0000 UTC m=+0.466540648 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T23:32:22Z, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, tcib_managed=true, url=https://www.redhat.com, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, name=rhosp-rhel9/openstack-nova-novncproxy, container_name=nova_vnc_proxy, com.redhat.component=openstack-nova-novncproxy-container, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, batch=17.1_20260112.1, vendor=Red Hat, Inc., vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, managed_by=tripleo_ansible, build-date=2026-01-12T23:32:22Z, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:15:00 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Deactivated successfully. Feb 2 08:15:00 np0005604725 podman[118345]: 2026-02-02 08:15:00.168267467 +0000 UTC m=+0.224805446 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, io.buildah.version=1.41.5, io.openshift.expose-services=, version=17.1.13, build-date=2026-01-12T22:50:44Z, com.redhat.component=openstack-swift-account-container, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:50:44Z, managed_by=tripleo_ansible, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, name=rhosp-rhel9/openstack-swift-account, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, config_id=tripleo_step4, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_account_replicator, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 swift-account, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account) Feb 2 08:15:00 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:15:00 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:15:00 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:15:00 np0005604725 systemd[1]: tmp-crun.F9elqf.mount: Deactivated successfully. Feb 2 08:15:00 np0005604725 python3[118397]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_object_server_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:15:00 np0005604725 systemd[1]: tmp-crun.uwra7y.mount: Deactivated successfully. Feb 2 08:15:00 np0005604725 podman[118469]: 2026-02-02 08:15:00.968684149 +0000 UTC m=+0.107059470 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=starting, build-date=2026-01-12T22:50:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_account_server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, name=rhosp-rhel9/openstack-swift-account, io.buildah.version=1.41.5, version=17.1.13, tcib_managed=true, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-account-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, url=https://www.redhat.com, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 swift-account, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, config_id=tripleo_step4, release=1766032510, description=Red Hat OpenStack Platform 17.1 swift-account, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account) Feb 2 08:15:00 np0005604725 podman[118468]: 2026-02-02 08:15:00.935605029 +0000 UTC m=+0.085643476 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=starting, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:50:57Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, release=1766032510, com.redhat.component=openstack-swift-container-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., batch=17.1_20260112.1, distribution-scope=public, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 swift-container, container_name=swift_container_replicator, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, build-date=2026-01-12T22:50:57Z, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, io.buildah.version=1.41.5, managed_by=tripleo_ansible) Feb 2 08:15:01 np0005604725 podman[118468]: 2026-02-02 08:15:01.012779835 +0000 UTC m=+0.162818222 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, container_name=swift_container_replicator, distribution-scope=public, vcs-type=git, description=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-swift-container-container, build-date=2026-01-12T22:50:57Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, name=rhosp-rhel9/openstack-swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, tcib_managed=true, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.openshift.expose-services=, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container) Feb 2 08:15:01 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Deactivated successfully. Feb 2 08:15:01 np0005604725 python3[118547]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_object_updater_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:15:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:15:01 np0005604725 podman[118469]: 2026-02-02 08:15:01.197018521 +0000 UTC m=+0.335393832 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-swift-account-container, org.opencontainers.image.created=2026-01-12T22:50:44Z, release=1766032510, summary=Red Hat OpenStack Platform 17.1 swift-account, io.buildah.version=1.41.5, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.expose-services=, name=rhosp-rhel9/openstack-swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, build-date=2026-01-12T22:50:44Z, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, container_name=swift_account_server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, batch=17.1_20260112.1, version=17.1.13, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-account, config_id=tripleo_step4, managed_by=tripleo_ansible) Feb 2 08:15:01 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Deactivated successfully. Feb 2 08:15:01 np0005604725 podman[118551]: 2026-02-02 08:15:01.283581095 +0000 UTC m=+0.086312127 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=starting, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, vcs-type=git, batch=17.1_20260112.1, build-date=2026-01-12T22:50:57Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, release=1766032510, url=https://www.redhat.com, managed_by=tripleo_ansible, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, distribution-scope=public, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-swift-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, container_name=swift_container_server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-container-container, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:15:01 np0005604725 python3[118591]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_proxy_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:15:01 np0005604725 podman[118551]: 2026-02-02 08:15:01.488787701 +0000 UTC m=+0.291518743 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, vendor=Red Hat, Inc., config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, io.buildah.version=1.41.5, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, summary=Red Hat OpenStack Platform 17.1 swift-container, url=https://www.redhat.com, managed_by=tripleo_ansible, container_name=swift_container_server, version=17.1.13, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-swift-container, build-date=2026-01-12T22:50:57Z, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-container-container, description=Red Hat OpenStack Platform 17.1 swift-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.created=2026-01-12T22:50:57Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, distribution-scope=public) Feb 2 08:15:01 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Deactivated successfully. Feb 2 08:15:01 np0005604725 python3[118623]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_proxy_tls_proxy_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:15:02 np0005604725 python3[118647]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_swift_rsync_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:15:02 np0005604725 podman[118651]: 2026-02-02 08:15:02.115419367 +0000 UTC m=+0.107640143 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:18Z, version=17.1.13, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-mariadb, release=1766032510, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, url=https://www.redhat.com, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.component=openstack-mariadb-container, tcib_managed=true, vcs-type=git, distribution-scope=public, build-date=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:15:02 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:15:02 np0005604725 podman[118651]: 2026-02-02 08:15:02.150168276 +0000 UTC m=+0.142389052 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:18Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, vcs-type=git, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-mariadb, release=1766032510, distribution-scope=public, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.openshift.expose-services=, build-date=2026-01-12T22:10:18Z, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, com.redhat.component=openstack-mariadb-container, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:15:02 np0005604725 podman[118690]: 2026-02-02 08:15:02.205689554 +0000 UTC m=+0.070559671 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=starting, release=1766032510, vendor=Red Hat, Inc., io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-swift-object-container, name=rhosp-rhel9/openstack-swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, managed_by=tripleo_ansible, container_name=swift_object_replicator, batch=17.1_20260112.1, tcib_managed=true, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:56Z, url=https://www.redhat.com, version=17.1.13, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:56Z, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:15:02 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:15:02 np0005604725 podman[118737]: 2026-02-02 08:15:02.291735152 +0000 UTC m=+0.067009503 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=starting, description=Red Hat OpenStack Platform 17.1 swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:56Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, batch=17.1_20260112.1, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-swift-object-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, container_name=swift_object_server, org.opencontainers.image.created=2026-01-12T22:50:56Z, architecture=x86_64, name=rhosp-rhel9/openstack-swift-object, tcib_managed=true, io.buildah.version=1.41.5, config_id=tripleo_step4, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-type=git, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, maintainer=OpenStack TripleO Team, release=1766032510, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:15:02 np0005604725 podman[118690]: 2026-02-02 08:15:02.315589995 +0000 UTC m=+0.180460102 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:56Z, build-date=2026-01-12T22:50:56Z, container_name=swift_object_replicator, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-swift-object, vcs-type=git, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, io.buildah.version=1.41.5, distribution-scope=public, release=1766032510, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, summary=Red Hat OpenStack Platform 17.1 swift-object, version=17.1.13, description=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64) Feb 2 08:15:02 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Deactivated successfully. Feb 2 08:15:02 np0005604725 podman[118737]: 2026-02-02 08:15:02.468489089 +0000 UTC m=+0.243763430 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, container_name=swift_object_server, name=rhosp-rhel9/openstack-swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, version=17.1.13, com.redhat.component=openstack-swift-object-container, config_id=tripleo_step4, architecture=x86_64, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:56Z, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-object, batch=17.1_20260112.1) Feb 2 08:15:02 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Deactivated successfully. Feb 2 08:15:02 np0005604725 podman[118794]: 2026-02-02 08:15:02.573946683 +0000 UTC m=+0.125754500 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:16Z, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, distribution-scope=public, architecture=x86_64, io.buildah.version=1.41.5, com.redhat.component=openstack-redis-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, name=rhosp-rhel9/openstack-redis, build-date=2026-01-12T22:10:16Z, release=1766032510, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 redis, description=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:15:02 np0005604725 podman[118794]: 2026-02-02 08:15:02.604986098 +0000 UTC m=+0.156793915 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, name=rhosp-rhel9/openstack-redis, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, build-date=2026-01-12T22:10:16Z, io.openshift.expose-services=, distribution-scope=public, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, org.opencontainers.image.created=2026-01-12T22:10:16Z, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 redis, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 redis) Feb 2 08:15:02 np0005604725 python3[118824]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_ceilometer_agent_central.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:02 np0005604725 podman[118839]: 2026-02-02 08:15:02.660151635 +0000 UTC m=+0.077674941 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, batch=17.1_20260112.1, distribution-scope=public, io.openshift.expose-services=, version=17.1.13, com.redhat.component=openstack-haproxy-container, release=1766032510, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:12Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.created=2026-01-12T22:10:12Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, name=rhosp-rhel9/openstack-haproxy, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy) Feb 2 08:15:02 np0005604725 podman[118839]: 2026-02-02 08:15:02.694922566 +0000 UTC m=+0.112445852 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, version=17.1.13, build-date=2026-01-12T22:10:12Z, vcs-type=git, batch=17.1_20260112.1, url=https://www.redhat.com, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:12Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-haproxy-container, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 haproxy, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 haproxy, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, io.openshift.expose-services=) Feb 2 08:15:02 np0005604725 podman[118866]: 2026-02-02 08:15:02.702403835 +0000 UTC m=+0.069667434 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-rabbitmq, tcib_managed=true, batch=17.1_20260112.1, io.buildah.version=1.41.5, build-date=2026-01-12T22:10:14Z, com.redhat.component=openstack-rabbitmq-container, description=Red Hat OpenStack Platform 17.1 rabbitmq, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, distribution-scope=public, release=1766032510, vendor=Red Hat, Inc., version=17.1.13, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq) Feb 2 08:15:02 np0005604725 podman[118898]: 2026-02-02 08:15:02.837665438 +0000 UTC m=+0.126725721 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.41.5, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-rabbitmq, io.openshift.expose-services=, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2026-01-12T22:10:14Z, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-rabbitmq-container, summary=Red Hat OpenStack Platform 17.1 rabbitmq, version=17.1.13, url=https://www.redhat.com) Feb 2 08:15:02 np0005604725 podman[118866]: 2026-02-02 08:15:02.840813574 +0000 UTC m=+0.208077163 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20260112.1, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, release=1766032510, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-rabbitmq-container, vcs-type=git, name=rhosp-rhel9/openstack-rabbitmq, build-date=2026-01-12T22:10:14Z, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, version=17.1.13) Feb 2 08:15:02 np0005604725 systemd[1]: tmp-crun.56C4JZ.mount: Deactivated successfully. Feb 2 08:15:02 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:15:03 np0005604725 podman[118948]: 2026-02-02 08:15:03.088676359 +0000 UTC m=+0.095133388 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=healthy, release=1766032510, io.openshift.expose-services=, managed_by=tripleo_ansible, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:50:56Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:50:56Z, architecture=x86_64, tcib_managed=true, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 swift-object, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-object-container, maintainer=OpenStack TripleO Team, container_name=swift_rsync, distribution-scope=public, io.buildah.version=1.41.5) Feb 2 08:15:03 np0005604725 systemd[1]: tmp-crun.l0TRC8.mount: Deactivated successfully. Feb 2 08:15:03 np0005604725 python3[118949]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_ceilometer_agent_notification.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:15:03 np0005604725 podman[118948]: 2026-02-02 08:15:03.556300136 +0000 UTC m=+0.562757215 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., tcib_managed=true, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, managed_by=tripleo_ansible, container_name=swift_rsync, build-date=2026-01-12T22:50:56Z, org.opencontainers.image.created=2026-01-12T22:50:56Z, config_id=tripleo_step4, distribution-scope=public, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-object, version=17.1.13, description=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object) Feb 2 08:15:03 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:15:03 np0005604725 systemd[1]: tmp-crun.uw1T1E.mount: Deactivated successfully. Feb 2 08:15:03 np0005604725 podman[119013]: 2026-02-02 08:15:03.625435253 +0000 UTC m=+0.117295810 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=starting, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_id=tripleo_step4, vendor=Red Hat, Inc., vcs-type=git, description=Red Hat OpenStack Platform 17.1 ovn-controller, name=rhosp-rhel9/openstack-ovn-controller, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.openshift.expose-services=, release=1766032510, distribution-scope=public, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:36:40Z, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, com.redhat.component=openstack-ovn-controller-container, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=ovn_controller, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:36:40Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, tcib_managed=true) Feb 2 08:15:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:15:03 np0005604725 podman[119013]: 2026-02-02 08:15:03.654096885 +0000 UTC m=+0.145957372 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, com.redhat.component=openstack-ovn-controller-container, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, architecture=x86_64, name=rhosp-rhel9/openstack-ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, build-date=2026-01-12T22:36:40Z, container_name=ovn_controller, version=17.1.13, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, vendor=Red Hat, Inc., url=https://www.redhat.com, io.openshift.expose-services=, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, managed_by=tripleo_ansible, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:36:40Z, release=1766032510, distribution-scope=public, vcs-type=git) Feb 2 08:15:03 np0005604725 python3[119012]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_cinder_api.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:03 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Deactivated successfully. Feb 2 08:15:03 np0005604725 podman[119040]: 2026-02-02 08:15:03.713689798 +0000 UTC m=+0.068486748 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, container_name=ovn_cluster_northd, com.redhat.component=openstack-ovn-northd-container, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, description=Red Hat OpenStack Platform 17.1 ovn-northd, summary=Red Hat OpenStack Platform 17.1 ovn-northd, vendor=Red Hat, Inc., io.openshift.expose-services=, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, batch=17.1_20260112.1, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, build-date=2026-01-12T22:34:06Z, org.opencontainers.image.created=2026-01-12T22:34:06Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, url=https://www.redhat.com, name=rhosp-rhel9/openstack-ovn-northd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, distribution-scope=public, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, release=1766032510, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, vcs-type=git, config_id=ovn_cluster_northd, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible) Feb 2 08:15:03 np0005604725 podman[119040]: 2026-02-02 08:15:03.75243396 +0000 UTC m=+0.107230920 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, name=rhosp-rhel9/openstack-ovn-northd, batch=17.1_20260112.1, tcib_managed=true, container_name=ovn_cluster_northd, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, maintainer=OpenStack TripleO Team, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, release=1766032510, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 ovn-northd, version=17.1.13, build-date=2026-01-12T22:34:06Z, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:34:06Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, com.redhat.component=openstack-ovn-northd-container, architecture=x86_64, url=https://www.redhat.com, io.buildah.version=1.41.5, config_id=ovn_cluster_northd, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 ovn-northd, vendor=Red Hat, Inc.) Feb 2 08:15:03 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:15:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:15:04 np0005604725 podman[119077]: 2026-02-02 08:15:04.003717711 +0000 UTC m=+0.063731332 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, release=1766032510, version=17.1.13, vendor=Red Hat, Inc., config_id=tripleo_step1, summary=Red Hat OpenStack Platform 17.1 memcached, name=rhosp-rhel9/openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:12:26Z, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, tcib_managed=true, vcs-type=git, io.openshift.expose-services=, build-date=2026-01-12T22:12:26Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-memcached-container, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:15:04 np0005604725 podman[119077]: 2026-02-02 08:15:04.039032097 +0000 UTC m=+0.099045738 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, container_name=memcached, url=https://www.redhat.com, version=17.1.13, io.openshift.expose-services=, release=1766032510, description=Red Hat OpenStack Platform 17.1 memcached, build-date=2026-01-12T22:12:26Z, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.buildah.version=1.41.5, tcib_managed=true, com.redhat.component=openstack-memcached-container, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-memcached, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, architecture=x86_64, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step1, vcs-type=git) Feb 2 08:15:04 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:15:04 np0005604725 python3[119131]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_cinder_api_cron.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:15:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:15:04 np0005604725 systemd[1]: tmp-crun.2jDw4k.mount: Deactivated successfully. Feb 2 08:15:04 np0005604725 podman[119133]: 2026-02-02 08:15:04.354577705 +0000 UTC m=+0.096179509 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:34:35Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:34:35Z, managed_by=tripleo_ansible, vcs-type=git, distribution-scope=public, io.buildah.version=1.41.5, url=https://www.redhat.com, batch=17.1_20260112.1, tcib_managed=true, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, name=rhosp-rhel9/openstack-placement-api, vendor=Red Hat, Inc., vcs-ref=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, container_name=placement_api, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, com.redhat.component=openstack-placement-api-container, summary=Red Hat OpenStack Platform 17.1 placement-api, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api) Feb 2 08:15:04 np0005604725 podman[119132]: 2026-02-02 08:15:04.397121734 +0000 UTC m=+0.142274639 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, url=https://www.redhat.com, io.openshift.expose-services=, tcib_managed=true, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, build-date=2026-01-12T22:10:14Z, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, com.redhat.component=openstack-qdrouterd-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step1, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, container_name=metrics_qdr, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc.) Feb 2 08:15:04 np0005604725 podman[119133]: 2026-02-02 08:15:04.430043427 +0000 UTC m=+0.171645231 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 placement-api, tcib_managed=true, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-placement-api-container, distribution-scope=public, config_id=tripleo_step4, container_name=placement_api, org.opencontainers.image.created=2026-01-12T22:34:35Z, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, build-date=2026-01-12T22:34:35Z, url=https://www.redhat.com, version=17.1.13, name=rhosp-rhel9/openstack-placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vendor=Red Hat, Inc., org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, description=Red Hat OpenStack Platform 17.1 placement-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, architecture=x86_64, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api) Feb 2 08:15:04 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:15:04 np0005604725 podman[119132]: 2026-02-02 08:15:04.630914877 +0000 UTC m=+0.376067752 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-qdrouterd, com.redhat.component=openstack-qdrouterd-container, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:14Z, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:14Z, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, container_name=metrics_qdr, distribution-scope=public, maintainer=OpenStack TripleO Team, version=17.1.13, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5, io.openshift.expose-services=, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:15:04 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:15:04 np0005604725 python3[119223]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_cinder_scheduler.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:15:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:15:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:15:05 np0005604725 podman[119280]: 2026-02-02 08:15:05.010503815 +0000 UTC m=+0.061974238 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=starting, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp-rhel9/openstack-glance-api, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, maintainer=OpenStack TripleO Team, container_name=glance_api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-glance-api-container, release=1766032510, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:42Z, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:34:42Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=) Feb 2 08:15:05 np0005604725 podman[119273]: 2026-02-02 08:15:05.065405394 +0000 UTC m=+0.123612843 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=healthy, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, build-date=2026-01-12T22:34:42Z, config_id=tripleo_step4, io.buildah.version=1.41.5, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, maintainer=OpenStack TripleO Team, distribution-scope=public, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, name=rhosp-rhel9/openstack-glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, com.redhat.component=openstack-glance-api-container, version=17.1.13, container_name=glance_api_cron, summary=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:34:42Z, managed_by=tripleo_ansible, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:15:05 np0005604725 podman[119277]: 2026-02-02 08:15:05.119054375 +0000 UTC m=+0.173988404 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=starting, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, version=17.1.13, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:42Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-glance-api, build-date=2026-01-12T22:34:42Z, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_step4, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, distribution-scope=public, architecture=x86_64, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, release=1766032510, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 glance-api, container_name=glance_api_internal, managed_by=tripleo_ansible, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:15:05 np0005604725 podman[119273]: 2026-02-02 08:15:05.149418979 +0000 UTC m=+0.207626508 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, build-date=2026-01-12T22:34:42Z, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp-rhel9/openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:42Z, tcib_managed=true, io.buildah.version=1.41.5, url=https://www.redhat.com, vcs-type=git, version=17.1.13, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_step4, io.openshift.expose-services=, managed_by=tripleo_ansible, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, container_name=glance_api_cron, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc.) Feb 2 08:15:05 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:15:05 np0005604725 python3[119343]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_glance_api.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:05 np0005604725 podman[119280]: 2026-02-02 08:15:05.216833573 +0000 UTC m=+0.268303996 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, managed_by=tripleo_ansible, vcs-type=git, build-date=2026-01-12T22:34:42Z, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:34:42Z, url=https://www.redhat.com, vendor=Red Hat, Inc., config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-glance-api-container, name=rhosp-rhel9/openstack-glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=glance_api, architecture=x86_64, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, version=17.1.13) Feb 2 08:15:05 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Deactivated successfully. Feb 2 08:15:05 np0005604725 podman[119277]: 2026-02-02 08:15:05.310767043 +0000 UTC m=+0.365701152 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, vcs-ref=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, batch=17.1_20260112.1, distribution-scope=public, release=1766032510, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_step4, version=17.1.13, architecture=x86_64, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:34:42Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-glance-api, container_name=glance_api_internal, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:42Z, summary=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true) Feb 2 08:15:05 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Deactivated successfully. Feb 2 08:15:05 np0005604725 python3[119406]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_glance_api_cron.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:06 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:15:06 np0005604725 systemd[1]: tmp-crun.oBEE4u.mount: Deactivated successfully. Feb 2 08:15:06 np0005604725 podman[119451]: 2026-02-02 08:15:06.21656202 +0000 UTC m=+0.120316612 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=starting, container_name=swift_proxy, vcs-type=git, release=1766032510, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, vendor=Red Hat, Inc., url=https://www.redhat.com, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, name=rhosp-rhel9/openstack-swift-proxy-server, config_id=tripleo_step4, architecture=x86_64, tcib_managed=true, managed_by=tripleo_ansible, build-date=2026-01-12T22:50:51Z, org.opencontainers.image.created=2026-01-12T22:50:51Z, io.openshift.expose-services=) Feb 2 08:15:06 np0005604725 python3[119452]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_glance_api_internal.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:06 np0005604725 podman[119451]: 2026-02-02 08:15:06.468456 +0000 UTC m=+0.372210622 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, build-date=2026-01-12T22:50:51Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, io.buildah.version=1.41.5, managed_by=tripleo_ansible, distribution-scope=public, name=rhosp-rhel9/openstack-swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:50:51Z, io.openshift.expose-services=, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.13, maintainer=OpenStack TripleO Team, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_proxy, tcib_managed=true, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, release=1766032510, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server) Feb 2 08:15:06 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Deactivated successfully. Feb 2 08:15:06 np0005604725 python3[119526]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_glance_api_internal_tls_proxy.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:15:07 np0005604725 podman[119610]: 2026-02-02 08:15:07.245155625 +0000 UTC m=+0.097888512 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=healthy, architecture=x86_64, name=rhosp-rhel9/openstack-nova-api, version=17.1.13, container_name=nova_metadata, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, vendor=Red Hat, Inc., io.openshift.expose-services=, release=1766032510, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, com.redhat.component=openstack-nova-api-container, vcs-type=git, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_step4, distribution-scope=public, managed_by=tripleo_ansible, url=https://www.redhat.com) Feb 2 08:15:07 np0005604725 python3[119609]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_glance_api_tls_proxy.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:07 np0005604725 podman[119610]: 2026-02-02 08:15:07.32882656 +0000 UTC m=+0.181559427 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, distribution-scope=public, name=rhosp-rhel9/openstack-nova-api, container_name=nova_metadata, summary=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, build-date=2026-01-12T23:31:50Z, vcs-type=git, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-api-container, managed_by=tripleo_ansible, version=17.1.13, description=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T23:31:50Z, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, url=https://www.redhat.com, release=1766032510, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:15:07 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:15:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:15:07 np0005604725 podman[119674]: 2026-02-02 08:15:07.71663831 +0000 UTC m=+0.076470403 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=healthy, com.redhat.component=openstack-nova-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=nova_api_cron, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, release=1766032510, io.openshift.expose-services=, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, vcs-type=git, architecture=x86_64, build-date=2026-01-12T23:31:50Z, name=rhosp-rhel9/openstack-nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}) Feb 2 08:15:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:15:07 np0005604725 podman[119674]: 2026-02-02 08:15:07.761908633 +0000 UTC m=+0.121740656 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, release=1766032510, summary=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, url=https://www.redhat.com, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T23:31:50Z, name=rhosp-rhel9/openstack-nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, tcib_managed=true, vendor=Red Hat, Inc., architecture=x86_64, container_name=nova_api_cron, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, version=17.1.13, distribution-scope=public, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-api-container) Feb 2 08:15:07 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:15:07 np0005604725 podman[119695]: 2026-02-02 08:15:07.818352219 +0000 UTC m=+0.075916436 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T23:31:50Z, architecture=x86_64, name=rhosp-rhel9/openstack-nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=nova_api, summary=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-nova-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., batch=17.1_20260112.1, release=1766032510, url=https://www.redhat.com, io.openshift.expose-services=, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, vcs-type=git, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, managed_by=tripleo_ansible, io.buildah.version=1.41.5) Feb 2 08:15:07 np0005604725 python3[119675]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_heat_api.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:07 np0005604725 podman[119695]: 2026-02-02 08:15:07.933028277 +0000 UTC m=+0.190592524 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, vendor=Red Hat, Inc., version=17.1.13, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step4, container_name=nova_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, build-date=2026-01-12T23:31:50Z, release=1766032510, vcs-type=git, description=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:15:07 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:15:08 np0005604725 python3[119794]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_heat_api_cfn.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:08 np0005604725 python3[119865]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_heat_api_cron.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:09 np0005604725 python3[119910]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_heat_engine.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:09 np0005604725 python3[119949]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_logrotate_crond.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:10 np0005604725 python3[119996]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_manila_api.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:10 np0005604725 python3[120034]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_manila_api_cron.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:11 np0005604725 python3[120132]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_manila_scheduler.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:11 np0005604725 python3[120218]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_neutron_api.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:12 np0005604725 python3[120262]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_neutron_server_tls_proxy.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:12 np0005604725 python3[120316]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_nova_api.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:13 np0005604725 python3[120406]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_nova_api_cron.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:14 np0005604725 python3[120450]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_nova_conductor.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:14 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:15:14 np0005604725 podman[120512]: 2026-02-02 08:15:14.320770949 +0000 UTC m=+0.066870329 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, version=17.1.13, io.buildah.version=1.41.5, managed_by=tripleo_ansible, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, summary=Red Hat OpenStack Platform 17.1 collectd, config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:10:15Z, url=https://www.redhat.com, vcs-type=git, tcib_managed=true, name=rhosp-rhel9/openstack-collectd, description=Red Hat OpenStack Platform 17.1 collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:15Z, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-collectd-container, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, distribution-scope=public, batch=17.1_20260112.1) Feb 2 08:15:14 np0005604725 podman[120512]: 2026-02-02 08:15:14.354425934 +0000 UTC m=+0.100525324 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, com.redhat.component=openstack-collectd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, managed_by=tripleo_ansible, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, summary=Red Hat OpenStack Platform 17.1 collectd, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=collectd, name=rhosp-rhel9/openstack-collectd, distribution-scope=public, build-date=2026-01-12T22:10:15Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, architecture=x86_64, config_id=tripleo_step3, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:15Z, release=1766032510, vcs-type=git, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 collectd) Feb 2 08:15:14 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:15:14 np0005604725 python3[120563]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_nova_metadata.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:14 np0005604725 python3[120649]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_nova_scheduler.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:15 np0005604725 python3[120697]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_nova_vnc_proxy.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:15 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:15:16 np0005604725 podman[120736]: 2026-02-02 08:15:16.074456541 +0000 UTC m=+0.092343942 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-horizon, summary=Red Hat OpenStack Platform 17.1 horizon, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, config_id=tripleo_step3, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, build-date=2026-01-12T22:34:41Z, vendor=Red Hat, Inc., architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:34:41Z, io.buildah.version=1.41.5, release=1766032510, version=17.1.13, container_name=horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 horizon, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, tcib_managed=true, com.redhat.component=openstack-horizon-container) Feb 2 08:15:16 np0005604725 podman[120736]: 2026-02-02 08:15:16.138017256 +0000 UTC m=+0.155904627 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, version=17.1.13, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, com.redhat.component=openstack-horizon-container, container_name=horizon, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, name=rhosp-rhel9/openstack-horizon, tcib_managed=true, io.buildah.version=1.41.5, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:41Z, description=Red Hat OpenStack Platform 17.1 horizon, summary=Red Hat OpenStack Platform 17.1 horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, build-date=2026-01-12T22:34:41Z, distribution-scope=public, architecture=x86_64, vcs-type=git, batch=17.1_20260112.1, vendor=Red Hat, Inc., config_id=tripleo_step3) Feb 2 08:15:16 np0005604725 python3[120735]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_ovn_controller.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:16 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:15:16 np0005604725 python3[120807]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_placement_api.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:17 np0005604725 python3[120893]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_account_auditor.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:17 np0005604725 python3[120930]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_account_reaper.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:18 np0005604725 python3[120975]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_account_replicator.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:18 np0005604725 python3[121012]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_account_server.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:19 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:15:19 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:15:19 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:15:19 np0005604725 podman[121059]: 2026-02-02 08:15:19.368167092 +0000 UTC m=+0.091331500 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:34:43Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, vcs-type=git, com.redhat.component=openstack-iscsid-container, vendor=Red Hat, Inc., org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, managed_by=tripleo_ansible, config_id=tripleo_step3, description=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, name=rhosp-rhel9/openstack-iscsid, url=https://www.redhat.com, build-date=2026-01-12T22:34:43Z, summary=Red Hat OpenStack Platform 17.1 iscsid, distribution-scope=public, release=1766032510, batch=17.1_20260112.1, container_name=iscsid, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13) Feb 2 08:15:19 np0005604725 podman[121059]: 2026-02-02 08:15:19.375766937 +0000 UTC m=+0.098931335 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, com.redhat.component=openstack-iscsid-container, io.buildah.version=1.41.5, url=https://www.redhat.com, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, io.openshift.expose-services=, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, description=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, name=rhosp-rhel9/openstack-iscsid, release=1766032510, build-date=2026-01-12T22:34:43Z, container_name=iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, architecture=x86_64, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:15:19 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:15:19 np0005604725 podman[121058]: 2026-02-02 08:15:19.35052024 +0000 UTC m=+0.084654245 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:33:53Z, maintainer=OpenStack TripleO Team, architecture=x86_64, container_name=keystone_cron, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, url=https://www.redhat.com, io.buildah.version=1.41.5, com.redhat.component=openstack-keystone-container, release=1766032510, config_id=tripleo_step3, description=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, tcib_managed=true, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, name=rhosp-rhel9/openstack-keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:15:19 np0005604725 podman[121057]: 2026-02-02 08:15:19.462071362 +0000 UTC m=+0.194925348 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, version=17.1.13, name=rhosp-rhel9/openstack-keystone, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=keystone, com.redhat.component=openstack-keystone-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, release=1766032510, managed_by=tripleo_ansible, batch=17.1_20260112.1, io.openshift.expose-services=, vcs-type=git, build-date=2026-01-12T22:33:53Z, org.opencontainers.image.created=2026-01-12T22:33:53Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64) Feb 2 08:15:19 np0005604725 python3[121061]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_container_auditor.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:19 np0005604725 podman[121058]: 2026-02-02 08:15:19.483329605 +0000 UTC m=+0.217463620 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, version=17.1.13, com.redhat.component=openstack-keystone-container, url=https://www.redhat.com, name=rhosp-rhel9/openstack-keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 keystone, summary=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.openshift.expose-services=, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone_cron, org.opencontainers.image.created=2026-01-12T22:33:53Z, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, batch=17.1_20260112.1, io.buildah.version=1.41.5, release=1766032510, managed_by=tripleo_ansible, vendor=Red Hat, Inc., build-date=2026-01-12T22:33:53Z) Feb 2 08:15:19 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:15:19 np0005604725 podman[121057]: 2026-02-02 08:15:19.528838376 +0000 UTC m=+0.261692352 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:33:53Z, name=rhosp-rhel9/openstack-keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, url=https://www.redhat.com, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, architecture=x86_64, com.redhat.component=openstack-keystone-container, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.buildah.version=1.41.5, container_name=keystone, vcs-type=git, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:33:53Z, managed_by=tripleo_ansible) Feb 2 08:15:19 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:15:20 np0005604725 python3[121159]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_container_replicator.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:20 np0005604725 python3[121204]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_container_server.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:20 np0005604725 python3[121241]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_container_updater.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:21 np0005604725 python3[121339]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_object_auditor.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:21 np0005604725 python3[121376]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_object_expirer.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:22 np0005604725 python3[121481]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_object_replicator.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:23 np0005604725 python3[121519]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_object_server.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:23 np0005604725 python3[121564]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_object_updater.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:23 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:15:24 np0005604725 podman[121601]: 2026-02-02 08:15:24.073215265 +0000 UTC m=+0.123755978 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, release=1766032510, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, version=17.1.13, architecture=x86_64, tcib_managed=true, com.redhat.component=openstack-mariadb-container, url=https://www.redhat.com, build-date=2026-01-12T22:10:18Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, batch=17.1_20260112.1, config_id=tripleo_step2, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=clustercheck, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb) Feb 2 08:15:24 np0005604725 systemd[1]: tmp-crun.5NvB3M.mount: Deactivated successfully. Feb 2 08:15:24 np0005604725 python3[121602]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_proxy.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:24 np0005604725 podman[121601]: 2026-02-02 08:15:24.16796388 +0000 UTC m=+0.218504583 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step2, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:18Z, url=https://www.redhat.com, vcs-type=git, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, tcib_managed=true, com.redhat.component=openstack-mariadb-container, summary=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, name=rhosp-rhel9/openstack-mariadb, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, container_name=clustercheck, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:15:24 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:15:24 np0005604725 python3[121685]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_proxy_tls_proxy.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:15:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:15:25 np0005604725 python3[121763]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020102.1072547-142586-32504709434450/source dest=/etc/systemd/system/tripleo_swift_rsync.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:15:25 np0005604725 podman[121780]: 2026-02-02 08:15:25.3189358 +0000 UTC m=+0.068974263 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, batch=17.1_20260112.1, release=1766032510, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, tcib_managed=true, io.openshift.expose-services=, container_name=cinder_scheduler, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:58:47Z, architecture=x86_64, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, vcs-type=git, com.redhat.component=openstack-cinder-scheduler-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:58:47Z, version=17.1.13, name=rhosp-rhel9/openstack-cinder-scheduler, vendor=Red Hat, Inc.) Feb 2 08:15:25 np0005604725 systemd[1]: tmp-crun.tfSif5.mount: Deactivated successfully. Feb 2 08:15:25 np0005604725 podman[121781]: 2026-02-02 08:15:25.337226382 +0000 UTC m=+0.080552819 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-cinder-api-container, io.buildah.version=1.41.5, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 cinder-api, config_id=tripleo_step4, name=rhosp-rhel9/openstack-cinder-api, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:58:44Z, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, architecture=x86_64, batch=17.1_20260112.1, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.expose-services=, build-date=2026-01-12T22:58:44Z, release=1766032510, version=17.1.13, container_name=cinder_api_cron, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api) Feb 2 08:15:25 np0005604725 podman[121780]: 2026-02-02 08:15:25.363938965 +0000 UTC m=+0.113977418 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=cinder_scheduler, build-date=2026-01-12T22:58:47Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, version=17.1.13, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, config_id=tripleo_step4, io.openshift.expose-services=, architecture=x86_64, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, vendor=Red Hat, Inc., url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-cinder-scheduler-container, name=rhosp-rhel9/openstack-cinder-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:58:47Z, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, tcib_managed=true) Feb 2 08:15:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:15:25 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:15:25 np0005604725 podman[121781]: 2026-02-02 08:15:25.419702679 +0000 UTC m=+0.163029176 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.component=openstack-cinder-api-container, version=17.1.13, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, batch=17.1_20260112.1, build-date=2026-01-12T22:58:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.buildah.version=1.41.5, release=1766032510, container_name=cinder_api_cron, managed_by=tripleo_ansible, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:58:44Z, vcs-type=git, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, architecture=x86_64, maintainer=OpenStack TripleO Team, url=https://www.redhat.com) Feb 2 08:15:25 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:15:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:15:25 np0005604725 podman[121836]: 2026-02-02 08:15:25.511124482 +0000 UTC m=+0.111159061 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=healthy, maintainer=OpenStack TripleO Team, release=1766032510, description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.buildah.version=1.41.5, com.redhat.component=openstack-ceilometer-central-container, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, version=17.1.13, name=rhosp-rhel9/openstack-ceilometer-central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, batch=17.1_20260112.1, build-date=2026-01-12T23:07:24Z, url=https://www.redhat.com, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, org.opencontainers.image.created=2026-01-12T23:07:24Z, vcs-type=git, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, config_id=tripleo_step4, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.expose-services=, container_name=ceilometer_agent_central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:15:25 np0005604725 podman[121849]: 2026-02-02 08:15:25.547212193 +0000 UTC m=+0.085357027 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=healthy, tcib_managed=true, com.redhat.component=openstack-ceilometer-notification-container, version=17.1.13, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-ceilometer-notification, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.openshift.expose-services=, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, vendor=Red Hat, Inc., vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, config_id=tripleo_step4, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, build-date=2026-01-12T23:07:25Z, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T23:07:25Z, container_name=ceilometer_agent_notification, architecture=x86_64) Feb 2 08:15:25 np0005604725 podman[121836]: 2026-02-02 08:15:25.593986242 +0000 UTC m=+0.194020911 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, name=rhosp-rhel9/openstack-ceilometer-central, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, release=1766032510, url=https://www.redhat.com, version=17.1.13, io.openshift.expose-services=, container_name=ceilometer_agent_central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, description=Red Hat OpenStack Platform 17.1 ceilometer-central, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T23:07:24Z, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, distribution-scope=public, build-date=2026-01-12T23:07:24Z, com.redhat.component=openstack-ceilometer-central-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, config_id=tripleo_step4, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, batch=17.1_20260112.1, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vcs-type=git, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:15:25 np0005604725 podman[121849]: 2026-02-02 08:15:25.601863405 +0000 UTC m=+0.140008249 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, vendor=Red Hat, Inc., vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, tcib_managed=true, build-date=2026-01-12T23:07:25Z, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, container_name=ceilometer_agent_notification, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, config_id=tripleo_step4, io.openshift.expose-services=, architecture=x86_64, distribution-scope=public, name=rhosp-rhel9/openstack-ceilometer-notification, org.opencontainers.image.created=2026-01-12T23:07:25Z, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, com.redhat.component=openstack-ceilometer-notification-container, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:15:25 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:15:25 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:15:25 np0005604725 python3[121837]: ansible-systemd Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Feb 2 08:15:25 np0005604725 systemd[1]: Reloading. Feb 2 08:15:25 np0005604725 systemd-rc-local-generator[121971]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:25 np0005604725 systemd-sysv-generator[121974]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:25 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:25 np0005604725 sshd[121982]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:15:26 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:15:26 np0005604725 systemd[1]: tmp-crun.8qFlAN.mount: Deactivated successfully. Feb 2 08:15:26 np0005604725 podman[122007]: 2026-02-02 08:15:26.478750132 +0000 UTC m=+0.074984198 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, org.opencontainers.image.created=2026-01-12T22:53:19Z, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-heat-api, version=17.1.13, vcs-ref=755001522886c265e88561b4997cab642504a845, summary=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_step4, container_name=heat_api_cron, vcs-type=git, managed_by=tripleo_ansible, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, tcib_managed=true, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:53:19Z, com.redhat.component=openstack-heat-api-container, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:15:26 np0005604725 podman[122007]: 2026-02-02 08:15:26.519903287 +0000 UTC m=+0.116137353 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, summary=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:53:19Z, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, name=rhosp-rhel9/openstack-heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, io.buildah.version=1.41.5, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:53:19Z, vcs-type=git, vendor=Red Hat, Inc., distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, release=1766032510, description=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, url=https://www.redhat.com, com.redhat.component=openstack-heat-api-container, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, container_name=heat_api_cron, config_id=tripleo_step4) Feb 2 08:15:26 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:15:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:15:27 np0005604725 systemd[1]: tmp-crun.CbsZmj.mount: Deactivated successfully. Feb 2 08:15:27 np0005604725 podman[122144]: 2026-02-02 08:15:27.116962496 +0000 UTC m=+0.074580825 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=healthy, architecture=x86_64, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:53:38Z, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, com.redhat.component=openstack-heat-engine-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, vcs-ref=755001522886c265e88561b4997cab642504a845, summary=Red Hat OpenStack Platform 17.1 heat-engine, version=17.1.13, io.buildah.version=1.41.5, io.openshift.expose-services=, vendor=Red Hat, Inc., url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, org.opencontainers.image.created=2026-01-12T22:53:38Z, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 heat-engine, release=1766032510, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=heat_engine, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-heat-engine) Feb 2 08:15:27 np0005604725 podman[122144]: 2026-02-02 08:15:27.132133993 +0000 UTC m=+0.089752342 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, distribution-scope=public, vcs-ref=755001522886c265e88561b4997cab642504a845, vcs-type=git, release=1766032510, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 heat-engine, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:53:38Z, name=rhosp-rhel9/openstack-heat-engine, vendor=Red Hat, Inc., tcib_managed=true, container_name=heat_engine, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 heat-engine, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, com.redhat.component=openstack-heat-engine-container, config_id=tripleo_step4, build-date=2026-01-12T22:53:38Z, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845) Feb 2 08:15:27 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:15:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:15:27 np0005604725 python3[122145]: ansible-systemd Invoked with state=restarted name=tripleo_ceilometer_agent_central.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:27 np0005604725 podman[122178]: 2026-02-02 08:15:27.312976456 +0000 UTC m=+0.062979098 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, container_name=logrotate_crond, io.openshift.expose-services=, managed_by=tripleo_ansible, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-cron-container, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:15Z, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, config_id=tripleo_step4, tcib_managed=true, name=rhosp-rhel9/openstack-cron, vcs-type=git, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:15Z, io.buildah.version=1.41.5, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:15:27 np0005604725 systemd[1]: Reloading. Feb 2 08:15:27 np0005604725 podman[122178]: 2026-02-02 08:15:27.351836772 +0000 UTC m=+0.101839414 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, io.openshift.expose-services=, architecture=x86_64, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:15Z, build-date=2026-01-12T22:10:15Z, summary=Red Hat OpenStack Platform 17.1 cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, description=Red Hat OpenStack Platform 17.1 cron, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=logrotate_crond, release=1766032510, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, vendor=Red Hat, Inc., distribution-scope=public, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-cron-container, name=rhosp-rhel9/openstack-cron, maintainer=OpenStack TripleO Team, tcib_managed=true, vcs-type=git, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, url=https://www.redhat.com) Feb 2 08:15:27 np0005604725 systemd-rc-local-generator[122231]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:27 np0005604725 systemd-sysv-generator[122238]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:27 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:27 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:15:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:15:27 np0005604725 systemd[1]: Starting ceilometer_agent_central container... Feb 2 08:15:27 np0005604725 podman[122258]: 2026-02-02 08:15:27.852630849 +0000 UTC m=+0.072150961 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, version=17.1.13, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, release=1766032510, org.opencontainers.image.created=2026-01-12T22:52:22Z, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=manila_api_cron, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, url=https://www.redhat.com, com.redhat.component=openstack-manila-api-container, config_id=tripleo_step4, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, summary=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, build-date=2026-01-12T22:52:22Z, vendor=Red Hat, Inc., io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 manila-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-manila-api, vcs-type=git, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api) Feb 2 08:15:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:15:27 np0005604725 systemd[1]: Started ceilometer_agent_central container. Feb 2 08:15:27 np0005604725 podman[122258]: 2026-02-02 08:15:27.882842079 +0000 UTC m=+0.102362191 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, io.openshift.expose-services=, com.redhat.component=openstack-manila-api-container, org.opencontainers.image.created=2026-01-12T22:52:22Z, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 manila-api, name=rhosp-rhel9/openstack-manila-api, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 manila-api, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, container_name=manila_api_cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, build-date=2026-01-12T22:52:22Z, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, version=17.1.13, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, batch=17.1_20260112.1, config_id=tripleo_step4, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible) Feb 2 08:15:27 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:15:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:15:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:15:27 np0005604725 podman[122305]: 2026-02-02 08:15:27.95698261 +0000 UTC m=+0.080536469 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, org.opencontainers.image.created=2026-01-12T22:53:19Z, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, name=rhosp-rhel9/openstack-heat-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, container_name=heat_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, vcs-ref=755001522886c265e88561b4997cab642504a845, com.redhat.component=openstack-heat-api-container, vcs-type=git, io.buildah.version=1.41.5, batch=17.1_20260112.1, url=https://www.redhat.com, version=17.1.13, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, release=1766032510, build-date=2026-01-12T22:53:19Z, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api) Feb 2 08:15:28 np0005604725 podman[122352]: 2026-02-02 08:15:28.014231561 +0000 UTC m=+0.056534871 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, build-date=2026-01-12T22:58:44Z, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, release=1766032510, summary=Red Hat OpenStack Platform 17.1 cinder-api, url=https://www.redhat.com, name=rhosp-rhel9/openstack-cinder-api, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:58:44Z, maintainer=OpenStack TripleO Team, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 cinder-api, container_name=cinder_api, batch=17.1_20260112.1, managed_by=tripleo_ansible, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-cinder-api-container, version=17.1.13, distribution-scope=public, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e) Feb 2 08:15:28 np0005604725 podman[122305]: 2026-02-02 08:15:28.023891558 +0000 UTC m=+0.147445407 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.created=2026-01-12T22:53:19Z, vcs-ref=755001522886c265e88561b4997cab642504a845, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:53:19Z, summary=Red Hat OpenStack Platform 17.1 heat-api, tcib_managed=true, vcs-type=git, container_name=heat_api, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp-rhel9/openstack-heat-api, release=1766032510, vendor=Red Hat, Inc., config_id=tripleo_step4, io.openshift.expose-services=, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-heat-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.buildah.version=1.41.5) Feb 2 08:15:28 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:15:28 np0005604725 podman[122356]: 2026-02-02 08:15:28.062272919 +0000 UTC m=+0.100588086 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=healthy, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:52:54Z, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, description=Red Hat OpenStack Platform 17.1 manila-scheduler, build-date=2026-01-12T22:52:54Z, name=rhosp-rhel9/openstack-manila-scheduler, container_name=manila_scheduler, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, config_id=tripleo_step4, version=17.1.13, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, release=1766032510, managed_by=tripleo_ansible, com.redhat.component=openstack-manila-scheduler-container, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., vcs-type=git, batch=17.1_20260112.1, architecture=x86_64, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:15:28 np0005604725 podman[122352]: 2026-02-02 08:15:28.08376234 +0000 UTC m=+0.126065650 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, tcib_managed=true, release=1766032510, summary=Red Hat OpenStack Platform 17.1 cinder-api, build-date=2026-01-12T22:58:44Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, batch=17.1_20260112.1, version=17.1.13, io.buildah.version=1.41.5, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, maintainer=OpenStack TripleO Team, distribution-scope=public, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-cinder-api, vcs-type=git, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-cinder-api-container, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, container_name=cinder_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api) Feb 2 08:15:28 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:15:28 np0005604725 podman[122356]: 2026-02-02 08:15:28.135277685 +0000 UTC m=+0.173592902 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, url=https://www.redhat.com, version=17.1.13, container_name=manila_scheduler, release=1766032510, com.redhat.component=openstack-manila-scheduler-container, build-date=2026-01-12T22:52:54Z, tcib_managed=true, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 manila-scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, batch=17.1_20260112.1, config_id=tripleo_step4, io.openshift.expose-services=, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-manila-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:52:54Z) Feb 2 08:15:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:15:28 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:15:28 np0005604725 podman[122410]: 2026-02-02 08:15:28.274978163 +0000 UTC m=+0.093860839 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, name=rhosp-rhel9/openstack-heat-api-cfn, distribution-scope=public, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-ref=755001522886c265e88561b4997cab642504a845, build-date=2026-01-12T22:54:02Z, maintainer=OpenStack TripleO Team, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, container_name=heat_api_cfn, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:54:02Z, vcs-type=git, architecture=x86_64, url=https://www.redhat.com, com.redhat.component=openstack-heat-api-cfn-container, io.buildah.version=1.41.5, version=17.1.13, config_id=tripleo_step4) Feb 2 08:15:28 np0005604725 podman[122410]: 2026-02-02 08:15:28.360962128 +0000 UTC m=+0.179844754 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-ref=755001522886c265e88561b4997cab642504a845, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:54:02Z, distribution-scope=public, architecture=x86_64, tcib_managed=true, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-heat-api-cfn, org.opencontainers.image.created=2026-01-12T22:54:02Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=heat_api_cfn, version=17.1.13, com.redhat.component=openstack-heat-api-cfn-container, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, release=1766032510, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 heat-api-cfn, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:15:28 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:15:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:15:28 np0005604725 podman[122473]: 2026-02-02 08:15:28.566523343 +0000 UTC m=+0.061873885 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=healthy, build-date=2026-01-12T22:57:35Z, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, container_name=neutron_api, tcib_managed=true, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, org.opencontainers.image.created=2026-01-12T22:57:35Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, distribution-scope=public, com.redhat.component=openstack-neutron-server-container, config_id=tripleo_step4, release=1766032510, summary=Red Hat OpenStack Platform 17.1 neutron-server, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 neutron-server, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-neutron-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, io.buildah.version=1.41.5, url=https://www.redhat.com, architecture=x86_64, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, managed_by=tripleo_ansible, version=17.1.13) Feb 2 08:15:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:15:28 np0005604725 podman[122473]: 2026-02-02 08:15:28.765789103 +0000 UTC m=+0.261139635 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, name=rhosp-rhel9/openstack-neutron-server, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, url=https://www.redhat.com, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:57:35Z, summary=Red Hat OpenStack Platform 17.1 neutron-server, vendor=Red Hat, Inc., distribution-scope=public, maintainer=OpenStack TripleO Team, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, build-date=2026-01-12T22:57:35Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, version=17.1.13, release=1766032510, description=Red Hat OpenStack Platform 17.1 neutron-server, tcib_managed=true, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, batch=17.1_20260112.1, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-neutron-server-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=neutron_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, managed_by=tripleo_ansible) Feb 2 08:15:28 np0005604725 python3[122474]: ansible-systemd Invoked with state=restarted name=tripleo_ceilometer_agent_notification.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:28 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:15:28 np0005604725 systemd[1]: Reloading. Feb 2 08:15:28 np0005604725 podman[122506]: 2026-02-02 08:15:28.83655447 +0000 UTC m=+0.080439216 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=healthy, com.redhat.component=openstack-nova-conductor-container, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 nova-conductor, maintainer=OpenStack TripleO Team, container_name=nova_conductor, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, vcs-type=git, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.expose-services=, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, batch=17.1_20260112.1, build-date=2026-01-12T23:32:18Z, vendor=Red Hat, Inc., release=1766032510, distribution-scope=public, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T23:32:18Z, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-nova-conductor) Feb 2 08:15:28 np0005604725 podman[122506]: 2026-02-02 08:15:28.890843171 +0000 UTC m=+0.134727867 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, batch=17.1_20260112.1, com.redhat.component=openstack-nova-conductor-container, io.buildah.version=1.41.5, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-conductor, version=17.1.13, container_name=nova_conductor, release=1766032510, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, distribution-scope=public, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 nova-conductor, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-nova-conductor, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T23:32:18Z, io.openshift.expose-services=, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, org.opencontainers.image.created=2026-01-12T23:32:18Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, architecture=x86_64) Feb 2 08:15:28 np0005604725 systemd-rc-local-generator[122554]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:28 np0005604725 systemd-sysv-generator[122559]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:28 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:29 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:15:29 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:15:29 np0005604725 systemd[1]: Starting ceilometer_agent_notification container... Feb 2 08:15:29 np0005604725 systemd[1]: Started ceilometer_agent_notification container. Feb 2 08:15:29 np0005604725 podman[122586]: 2026-02-02 08:15:29.435743744 +0000 UTC m=+0.120680904 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=healthy, description=Red Hat OpenStack Platform 17.1 nova-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-nova-scheduler, config_id=tripleo_step4, container_name=nova_scheduler, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, url=https://www.redhat.com, build-date=2026-01-12T23:32:05Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, vcs-type=git, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T23:32:05Z, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, batch=17.1_20260112.1, architecture=x86_64, com.redhat.component=openstack-nova-scheduler-container, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, maintainer=OpenStack TripleO Team, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, managed_by=tripleo_ansible) Feb 2 08:15:29 np0005604725 podman[122586]: 2026-02-02 08:15:29.466266173 +0000 UTC m=+0.151203323 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T23:32:05Z, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, vcs-type=git, release=1766032510, batch=17.1_20260112.1, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-nova-scheduler-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, io.openshift.expose-services=, name=rhosp-rhel9/openstack-nova-scheduler, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-scheduler, managed_by=tripleo_ansible, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, distribution-scope=public, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, build-date=2026-01-12T23:32:05Z, config_id=tripleo_step4, container_name=nova_scheduler) Feb 2 08:15:29 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:15:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:15:30 np0005604725 systemd[1]: tmp-crun.DzYrsE.mount: Deactivated successfully. Feb 2 08:15:30 np0005604725 podman[122648]: 2026-02-02 08:15:30.295752413 +0000 UTC m=+0.102045110 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=healthy, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, url=https://www.redhat.com, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, tcib_managed=true, name=rhosp-rhel9/openstack-nova-novncproxy, com.redhat.component=openstack-nova-novncproxy-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, architecture=x86_64, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, container_name=nova_vnc_proxy, release=1766032510, io.openshift.expose-services=, build-date=2026-01-12T23:32:22Z, maintainer=OpenStack TripleO Team, distribution-scope=public, vcs-type=git, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T23:32:22Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, config_id=tripleo_step4) Feb 2 08:15:30 np0005604725 python3[122649]: ansible-systemd Invoked with state=restarted name=tripleo_cinder_api.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:30 np0005604725 systemd[1]: Reloading. Feb 2 08:15:30 np0005604725 systemd-rc-local-generator[122722]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:30 np0005604725 systemd-sysv-generator[122725]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:30 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:30 np0005604725 podman[122648]: 2026-02-02 08:15:30.687197776 +0000 UTC m=+0.493490533 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., managed_by=tripleo_ansible, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T23:32:22Z, container_name=nova_vnc_proxy, build-date=2026-01-12T23:32:22Z, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, name=rhosp-rhel9/openstack-nova-novncproxy, com.redhat.component=openstack-nova-novncproxy-container, distribution-scope=public, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, io.openshift.expose-services=, url=https://www.redhat.com) Feb 2 08:15:31 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Deactivated successfully. Feb 2 08:15:31 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:15:31 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:15:31 np0005604725 systemd[1]: Starting cinder_api container... Feb 2 08:15:31 np0005604725 systemd[1]: tmp-crun.u3STNV.mount: Deactivated successfully. Feb 2 08:15:31 np0005604725 podman[122741]: 2026-02-02 08:15:31.161551019 +0000 UTC m=+0.103098973 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, build-date=2026-01-12T22:50:57Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, name=rhosp-rhel9/openstack-swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, summary=Red Hat OpenStack Platform 17.1 swift-container, maintainer=OpenStack TripleO Team, container_name=swift_container_replicator, config_id=tripleo_step4, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-container-container, io.openshift.expose-services=, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:57Z, tcib_managed=true, io.buildah.version=1.41.5, vcs-type=git, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container) Feb 2 08:15:31 np0005604725 podman[122743]: 2026-02-02 08:15:31.19959796 +0000 UTC m=+0.140904557 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=healthy, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, name=rhosp-rhel9/openstack-swift-account, tcib_managed=true, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:50:44Z, com.redhat.component=openstack-swift-account-container, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=swift_account_replicator, vcs-type=git, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, managed_by=tripleo_ansible, version=17.1.13, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:50:44Z, release=1766032510, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, distribution-scope=public) Feb 2 08:15:31 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:15:31 np0005604725 systemd[1]: Started cinder_api container. Feb 2 08:15:31 np0005604725 podman[122741]: 2026-02-02 08:15:31.271065468 +0000 UTC m=+0.212613422 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, build-date=2026-01-12T22:50:57Z, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 swift-container, maintainer=OpenStack TripleO Team, release=1766032510, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, vendor=Red Hat, Inc., container_name=swift_container_replicator, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, io.buildah.version=1.41.5, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-type=git, io.openshift.expose-services=, com.redhat.component=openstack-swift-container-container, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z) Feb 2 08:15:31 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Deactivated successfully. Feb 2 08:15:31 np0005604725 podman[122743]: 2026-02-02 08:15:31.331915641 +0000 UTC m=+0.273222178 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, distribution-scope=public, io.openshift.expose-services=, url=https://www.redhat.com, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:44Z, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-account, architecture=x86_64, managed_by=tripleo_ansible, version=17.1.13, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, name=rhosp-rhel9/openstack-swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:50:44Z, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, container_name=swift_account_replicator, release=1766032510, tcib_managed=true, config_id=tripleo_step4, com.redhat.component=openstack-swift-account-container) Feb 2 08:15:31 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:15:31 np0005604725 podman[122856]: 2026-02-02 08:15:31.331634082 +0000 UTC m=+0.081757266 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=healthy, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:44Z, name=rhosp-rhel9/openstack-swift-account, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.component=openstack-swift-account-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vendor=Red Hat, Inc., distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, managed_by=tripleo_ansible, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, version=17.1.13, io.buildah.version=1.41.5, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=swift_account_server, vcs-type=git, tcib_managed=true, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, build-date=2026-01-12T22:50:44Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, config_id=tripleo_step4) Feb 2 08:15:31 np0005604725 podman[122856]: 2026-02-02 08:15:31.525052852 +0000 UTC m=+0.275176096 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, io.openshift.expose-services=, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:44Z, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-account, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-account-container, org.opencontainers.image.created=2026-01-12T22:50:44Z, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, vcs-type=git, io.buildah.version=1.41.5, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, container_name=swift_account_server, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-swift-account, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, architecture=x86_64, config_id=tripleo_step4, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-account, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, vendor=Red Hat, Inc.) Feb 2 08:15:31 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:15:31 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Deactivated successfully. Feb 2 08:15:31 np0005604725 podman[122910]: 2026-02-02 08:15:31.630194627 +0000 UTC m=+0.076941208 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, build-date=2026-01-12T22:50:57Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., container_name=swift_container_server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, tcib_managed=true, url=https://www.redhat.com, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:57Z, com.redhat.component=openstack-swift-container-container, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-swift-container, distribution-scope=public) Feb 2 08:15:31 np0005604725 podman[122910]: 2026-02-02 08:15:31.79836145 +0000 UTC m=+0.245108051 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_container_server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, com.redhat.component=openstack-swift-container-container, vcs-type=git, description=Red Hat OpenStack Platform 17.1 swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, config_id=tripleo_step4, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, name=rhosp-rhel9/openstack-swift-container, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:50:57Z, tcib_managed=true, io.buildah.version=1.41.5, build-date=2026-01-12T22:50:57Z, managed_by=tripleo_ansible, vendor=Red Hat, Inc., architecture=x86_64, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1) Feb 2 08:15:31 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Deactivated successfully. Feb 2 08:15:32 np0005604725 python3[122963]: ansible-systemd Invoked with state=restarted name=tripleo_cinder_api_cron.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:15:32 np0005604725 systemd[1]: Reloading. Feb 2 08:15:32 np0005604725 podman[122968]: 2026-02-02 08:15:32.483050336 +0000 UTC m=+0.084319975 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=healthy, io.openshift.expose-services=, build-date=2026-01-12T22:50:56Z, tcib_managed=true, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:56Z, architecture=x86_64, distribution-scope=public, container_name=swift_object_replicator, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-object-container, io.buildah.version=1.41.5, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-object, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, name=rhosp-rhel9/openstack-swift-object, url=https://www.redhat.com, managed_by=tripleo_ansible, vendor=Red Hat, Inc.) Feb 2 08:15:32 np0005604725 systemd-sysv-generator[123035]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:32 np0005604725 systemd-rc-local-generator[123030]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:32 np0005604725 podman[122968]: 2026-02-02 08:15:32.600927122 +0000 UTC m=+0.202196751 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-object-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, container_name=swift_object_replicator, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 swift-object, batch=17.1_20260112.1, config_id=tripleo_step4, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, distribution-scope=public, tcib_managed=true, name=rhosp-rhel9/openstack-swift-object, io.buildah.version=1.41.5, release=1766032510, description=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, vendor=Red Hat, Inc., io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, architecture=x86_64, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:56Z) Feb 2 08:15:32 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:32 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Deactivated successfully. Feb 2 08:15:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:15:32 np0005604725 systemd[1]: Starting cinder_api_cron container... Feb 2 08:15:32 np0005604725 podman[123059]: 2026-02-02 08:15:32.99286386 +0000 UTC m=+0.066551399 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=healthy, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, url=https://www.redhat.com, release=1766032510, com.redhat.component=openstack-swift-object-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, config_id=tripleo_step4, managed_by=tripleo_ansible, vcs-type=git, version=17.1.13, container_name=swift_object_server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, maintainer=OpenStack TripleO Team, architecture=x86_64, build-date=2026-01-12T22:50:56Z, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, io.openshift.expose-services=, distribution-scope=public, tcib_managed=true, batch=17.1_20260112.1, io.buildah.version=1.41.5, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:50:56Z, description=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:15:33 np0005604725 systemd[1]: Started cinder_api_cron container. Feb 2 08:15:33 np0005604725 podman[123059]: 2026-02-02 08:15:33.183930248 +0000 UTC m=+0.257617807 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, com.redhat.component=openstack-swift-object-container, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:50:56Z, container_name=swift_object_server, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, name=rhosp-rhel9/openstack-swift-object, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, vcs-type=git, distribution-scope=public, version=17.1.13, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, io.openshift.expose-services=, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:50:56Z, architecture=x86_64) Feb 2 08:15:33 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Deactivated successfully. Feb 2 08:15:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:15:33 np0005604725 podman[123130]: 2026-02-02 08:15:33.768689289 +0000 UTC m=+0.103016101 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=healthy, tcib_managed=true, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-object, vendor=Red Hat, Inc., build-date=2026-01-12T22:50:56Z, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 swift-object, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, version=17.1.13, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, release=1766032510, com.redhat.component=openstack-swift-object-container, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, batch=17.1_20260112.1, container_name=swift_rsync, org.opencontainers.image.created=2026-01-12T22:50:56Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com) Feb 2 08:15:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:15:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:15:33 np0005604725 systemd[1]: tmp-crun.WBaCdn.mount: Deactivated successfully. Feb 2 08:15:33 np0005604725 podman[123158]: 2026-02-02 08:15:33.872776511 +0000 UTC m=+0.080130507 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, description=Red Hat OpenStack Platform 17.1 ovn-northd, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:34:06Z, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, name=rhosp-rhel9/openstack-ovn-northd, org.opencontainers.image.created=2026-01-12T22:34:06Z, version=17.1.13, vendor=Red Hat, Inc., tcib_managed=true, io.buildah.version=1.41.5, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 ovn-northd, config_id=ovn_cluster_northd, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, managed_by=tripleo_ansible, com.redhat.component=openstack-ovn-northd-container, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=ovn_cluster_northd, distribution-scope=public) Feb 2 08:15:33 np0005604725 podman[123158]: 2026-02-02 08:15:33.881746286 +0000 UTC m=+0.089100302 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, com.redhat.component=openstack-ovn-northd-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, summary=Red Hat OpenStack Platform 17.1 ovn-northd, config_id=ovn_cluster_northd, name=rhosp-rhel9/openstack-ovn-northd, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:34:06Z, tcib_managed=true, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 ovn-northd, version=17.1.13, container_name=ovn_cluster_northd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vendor=Red Hat, Inc., architecture=x86_64, batch=17.1_20260112.1, release=1766032510, build-date=2026-01-12T22:34:06Z) Feb 2 08:15:33 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:15:33 np0005604725 python3[123131]: ansible-systemd Invoked with state=restarted name=tripleo_cinder_scheduler.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:33 np0005604725 podman[123153]: 2026-02-02 08:15:33.920233621 +0000 UTC m=+0.128620268 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=healthy, org.opencontainers.image.created=2026-01-12T22:36:40Z, com.redhat.component=openstack-ovn-controller-container, summary=Red Hat OpenStack Platform 17.1 ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, vcs-type=git, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 ovn-controller, build-date=2026-01-12T22:36:40Z, name=rhosp-rhel9/openstack-ovn-controller, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, container_name=ovn_controller, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, batch=17.1_20260112.1, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, io.buildah.version=1.41.5, config_id=tripleo_step4, url=https://www.redhat.com, tcib_managed=true, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller) Feb 2 08:15:33 np0005604725 podman[123153]: 2026-02-02 08:15:33.950842002 +0000 UTC m=+0.159228639 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 ovn-controller, name=rhosp-rhel9/openstack-ovn-controller, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, distribution-scope=public, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:36:40Z, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible, container_name=ovn_controller, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, build-date=2026-01-12T22:36:40Z, com.redhat.component=openstack-ovn-controller-container, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.openshift.expose-services=, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller) Feb 2 08:15:33 np0005604725 systemd[1]: Reloading. Feb 2 08:15:34 np0005604725 systemd-rc-local-generator[123235]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:34 np0005604725 systemd-sysv-generator[123239]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:34 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:34 np0005604725 podman[123130]: 2026-02-02 08:15:34.220656063 +0000 UTC m=+0.554982805 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:56Z, version=17.1.13, architecture=x86_64, maintainer=OpenStack TripleO Team, release=1766032510, managed_by=tripleo_ansible, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=swift_rsync, summary=Red Hat OpenStack Platform 17.1 swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, config_id=tripleo_step4, com.redhat.component=openstack-swift-object-container, description=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, build-date=2026-01-12T22:50:56Z) Feb 2 08:15:34 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:15:34 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Deactivated successfully. Feb 2 08:15:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:15:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:15:34 np0005604725 systemd[1]: Starting cinder_scheduler container... Feb 2 08:15:34 np0005604725 systemd[1]: Started cinder_scheduler container. Feb 2 08:15:34 np0005604725 podman[123266]: 2026-02-02 08:15:34.591901355 +0000 UTC m=+0.069012135 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, release=1766032510, vcs-type=git, description=Red Hat OpenStack Platform 17.1 placement-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:34:35Z, config_id=tripleo_step4, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, managed_by=tripleo_ansible, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-placement-api, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 placement-api, build-date=2026-01-12T22:34:35Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, container_name=placement_api, architecture=x86_64, com.redhat.component=openstack-placement-api-container) Feb 2 08:15:34 np0005604725 podman[123264]: 2026-02-02 08:15:34.640339715 +0000 UTC m=+0.117235488 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, container_name=memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, managed_by=tripleo_ansible, build-date=2026-01-12T22:12:26Z, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, version=17.1.13, tcib_managed=true, com.redhat.component=openstack-memcached-container, name=rhosp-rhel9/openstack-memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, distribution-scope=public, vendor=Red Hat, Inc., batch=17.1_20260112.1, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:12:26Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 memcached) Feb 2 08:15:34 np0005604725 podman[123266]: 2026-02-02 08:15:34.656881794 +0000 UTC m=+0.133992564 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-placement-api, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, managed_by=tripleo_ansible, config_id=tripleo_step4, build-date=2026-01-12T22:34:35Z, io.openshift.expose-services=, vcs-type=git, com.redhat.component=openstack-placement-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, description=Red Hat OpenStack Platform 17.1 placement-api, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:35Z, container_name=placement_api, distribution-scope=public, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, tcib_managed=true, release=1766032510, summary=Red Hat OpenStack Platform 17.1 placement-api, url=https://www.redhat.com, vendor=Red Hat, Inc.) Feb 2 08:15:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:15:34 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:15:34 np0005604725 podman[123264]: 2026-02-02 08:15:34.683883104 +0000 UTC m=+0.160778897 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:12:26Z, com.redhat.component=openstack-memcached-container, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:12:26Z, tcib_managed=true, managed_by=tripleo_ansible, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 memcached, version=17.1.13, name=rhosp-rhel9/openstack-memcached, url=https://www.redhat.com, io.openshift.expose-services=, vendor=Red Hat, Inc., vcs-type=git, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, summary=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1, config_id=tripleo_step1, release=1766032510) Feb 2 08:15:34 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:15:34 np0005604725 podman[123326]: 2026-02-02 08:15:34.726653201 +0000 UTC m=+0.052697273 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, architecture=x86_64, name=rhosp-rhel9/openstack-qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, release=1766032510, managed_by=tripleo_ansible, batch=17.1_20260112.1, tcib_managed=true, container_name=metrics_qdr, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:14Z, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:14Z, vendor=Red Hat, Inc., io.buildah.version=1.41.5, com.redhat.component=openstack-qdrouterd-container) Feb 2 08:15:34 np0005604725 podman[123326]: 2026-02-02 08:15:34.929860672 +0000 UTC m=+0.255904764 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vcs-type=git, managed_by=tripleo_ansible, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2026-01-12T22:10:14Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, url=https://www.redhat.com, io.openshift.expose-services=, version=17.1.13, name=rhosp-rhel9/openstack-qdrouterd, vendor=Red Hat, Inc., com.redhat.component=openstack-qdrouterd-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, container_name=metrics_qdr, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5) Feb 2 08:15:34 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:15:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:15:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:15:35 np0005604725 podman[123407]: 2026-02-02 08:15:35.308614055 +0000 UTC m=+0.059037668 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=healthy, com.redhat.component=openstack-glance-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, maintainer=OpenStack TripleO Team, version=17.1.13, managed_by=tripleo_ansible, vendor=Red Hat, Inc., container_name=glance_api_cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, tcib_managed=true, url=https://www.redhat.com, release=1766032510, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:34:42Z, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_step4, io.openshift.expose-services=, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, build-date=2026-01-12T22:34:42Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}) Feb 2 08:15:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:15:35 np0005604725 podman[123408]: 2026-02-02 08:15:35.355055134 +0000 UTC m=+0.099283415 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=healthy, build-date=2026-01-12T22:34:42Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:42Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-type=git, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, container_name=glance_api, tcib_managed=true, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, vendor=Red Hat, Inc., architecture=x86_64, vcs-ref=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, config_id=tripleo_step4, com.redhat.component=openstack-glance-api-container, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:15:35 np0005604725 systemd[1]: tmp-crun.PUL1ic.mount: Deactivated successfully. Feb 2 08:15:35 np0005604725 podman[123440]: 2026-02-02 08:15:35.416055901 +0000 UTC m=+0.053572949 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=healthy, container_name=glance_api_internal, summary=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, version=17.1.13, com.redhat.component=openstack-glance-api-container, distribution-scope=public, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, architecture=x86_64, io.openshift.expose-services=, release=1766032510, name=rhosp-rhel9/openstack-glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:34:42Z, vendor=Red Hat, Inc., vcs-type=git, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:15:35 np0005604725 podman[123407]: 2026-02-02 08:15:35.446793916 +0000 UTC m=+0.197217559 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, name=rhosp-rhel9/openstack-glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, managed_by=tripleo_ansible, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20260112.1, build-date=2026-01-12T22:34:42Z, release=1766032510, architecture=x86_64, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, com.redhat.component=openstack-glance-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, org.opencontainers.image.created=2026-01-12T22:34:42Z, version=17.1.13, description=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_step4, vcs-type=git, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, container_name=glance_api_cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:15:35 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:15:35 np0005604725 podman[123408]: 2026-02-02 08:15:35.537762635 +0000 UTC m=+0.281990916 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, container_name=glance_api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, io.buildah.version=1.41.5, url=https://www.redhat.com, com.redhat.component=openstack-glance-api-container, build-date=2026-01-12T22:34:42Z, config_id=tripleo_step4, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, maintainer=OpenStack TripleO Team, release=1766032510, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}) Feb 2 08:15:35 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Deactivated successfully. Feb 2 08:15:35 np0005604725 podman[123440]: 2026-02-02 08:15:35.615876938 +0000 UTC m=+0.253394066 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vcs-type=git, batch=17.1_20260112.1, com.redhat.component=openstack-glance-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:34:42Z, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.buildah.version=1.41.5, version=17.1.13, vcs-ref=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, distribution-scope=public, container_name=glance_api_internal, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-glance-api, build-date=2026-01-12T22:34:42Z) Feb 2 08:15:35 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Deactivated successfully. Feb 2 08:15:35 np0005604725 python3[123481]: ansible-systemd Invoked with state=restarted name=tripleo_glance_api.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:35 np0005604725 systemd[1]: Reloading. Feb 2 08:15:35 np0005604725 systemd-sysv-generator[123540]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:35 np0005604725 systemd-rc-local-generator[123535]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:35 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:36 np0005604725 systemd[1]: Starting glance_api container... Feb 2 08:15:36 np0005604725 systemd[1]: Started glance_api container. Feb 2 08:15:37 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:15:37 np0005604725 podman[123646]: 2026-02-02 08:15:37.305310744 +0000 UTC m=+0.070744688 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, container_name=swift_proxy, com.redhat.component=openstack-swift-proxy-server-container, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, config_id=tripleo_step4, vendor=Red Hat, Inc., io.openshift.expose-services=, release=1766032510, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, io.buildah.version=1.41.5, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-swift-proxy-server, build-date=2026-01-12T22:50:51Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.created=2026-01-12T22:50:51Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible) Feb 2 08:15:37 np0005604725 python3[123645]: ansible-systemd Invoked with state=restarted name=tripleo_glance_api_cron.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:37 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:15:37 np0005604725 podman[123646]: 2026-02-02 08:15:37.514570302 +0000 UTC m=+0.280004286 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:51Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, maintainer=OpenStack TripleO Team, container_name=swift_proxy, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, build-date=2026-01-12T22:50:51Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, batch=17.1_20260112.1, com.redhat.component=openstack-swift-proxy-server-container, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-swift-proxy-server, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible) Feb 2 08:15:37 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Deactivated successfully. Feb 2 08:15:37 np0005604725 systemd[1]: Reloading. Feb 2 08:15:37 np0005604725 podman[123674]: 2026-02-02 08:15:37.600105723 +0000 UTC m=+0.088842274 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=healthy, distribution-scope=public, io.openshift.expose-services=, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-nova-api-container, config_id=tripleo_step4, architecture=x86_64, build-date=2026-01-12T23:31:50Z, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, summary=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.buildah.version=1.41.5, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, container_name=nova_metadata, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-nova-api, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, version=17.1.13) Feb 2 08:15:37 np0005604725 podman[123674]: 2026-02-02 08:15:37.68515309 +0000 UTC m=+0.173889701 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, distribution-scope=public, url=https://www.redhat.com, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, release=1766032510, description=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, com.redhat.component=openstack-nova-api-container, container_name=nova_metadata, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, build-date=2026-01-12T23:31:50Z, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, tcib_managed=true, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api) Feb 2 08:15:37 np0005604725 systemd-rc-local-generator[123746]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:37 np0005604725 systemd-sysv-generator[123750]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:37 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:38 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:15:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:15:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:15:38 np0005604725 systemd[1]: Starting glance_api_cron container... Feb 2 08:15:38 np0005604725 systemd[1]: tmp-crun.915Or7.mount: Deactivated successfully. Feb 2 08:15:38 np0005604725 podman[123764]: 2026-02-02 08:15:38.160023299 +0000 UTC m=+0.071020125 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=healthy, managed_by=tripleo_ansible, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=nova_api_cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, summary=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., vcs-type=git, version=17.1.13, tcib_managed=true, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, build-date=2026-01-12T23:31:50Z, release=1766032510, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1, com.redhat.component=openstack-nova-api-container, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:15:38 np0005604725 podman[123764]: 2026-02-02 08:15:38.171359728 +0000 UTC m=+0.082356554 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, config_id=tripleo_step4, url=https://www.redhat.com, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, container_name=nova_api_cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, name=rhosp-rhel9/openstack-nova-api, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, tcib_managed=true, architecture=x86_64, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, com.redhat.component=openstack-nova-api-container, build-date=2026-01-12T23:31:50Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, release=1766032510, distribution-scope=public) Feb 2 08:15:38 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:15:38 np0005604725 podman[123765]: 2026-02-02 08:15:38.211550475 +0000 UTC m=+0.122180860 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=healthy, name=rhosp-rhel9/openstack-nova-api, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T23:31:50Z, description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, vcs-type=git, io.buildah.version=1.41.5, tcib_managed=true, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, container_name=nova_api, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, com.redhat.component=openstack-nova-api-container, io.openshift.expose-services=, distribution-scope=public, version=17.1.13, batch=17.1_20260112.1, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc.) Feb 2 08:15:38 np0005604725 systemd[1]: Started glance_api_cron container. Feb 2 08:15:38 np0005604725 podman[123765]: 2026-02-02 08:15:38.324235622 +0000 UTC m=+0.234866007 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-nova-api, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, architecture=x86_64, batch=17.1_20260112.1, config_id=tripleo_step4, container_name=nova_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, url=https://www.redhat.com, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T23:31:50Z, description=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, managed_by=tripleo_ansible, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=) Feb 2 08:15:38 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:15:39 np0005604725 python3[123853]: ansible-systemd Invoked with state=restarted name=tripleo_glance_api_internal.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:39 np0005604725 systemd[1]: Reloading. Feb 2 08:15:39 np0005604725 systemd-rc-local-generator[123888]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:39 np0005604725 systemd-sysv-generator[123893]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:39 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:39 np0005604725 systemd[1]: Starting dnf makecache... Feb 2 08:15:39 np0005604725 systemd[1]: Starting glance_api_internal container... Feb 2 08:15:39 np0005604725 systemd[1]: Started glance_api_internal container. Feb 2 08:15:40 np0005604725 dnf[123926]: Updating Subscription Management repositories. Feb 2 08:15:40 np0005604725 python3[124048]: ansible-systemd Invoked with state=restarted name=tripleo_glance_api_internal_tls_proxy.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:40 np0005604725 systemd[1]: Reloading. Feb 2 08:15:41 np0005604725 systemd-sysv-generator[124148]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:41 np0005604725 systemd-rc-local-generator[124145]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:41 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:41 np0005604725 systemd[1]: Starting glance_api_internal_tls_proxy container... Feb 2 08:15:41 np0005604725 systemd[1]: Started glance_api_internal_tls_proxy container. Feb 2 08:15:41 np0005604725 dnf[123926]: Metadata cache refreshed recently. Feb 2 08:15:42 np0005604725 systemd[1]: dnf-makecache.service: Deactivated successfully. Feb 2 08:15:42 np0005604725 systemd[1]: Finished dnf makecache. Feb 2 08:15:42 np0005604725 systemd[1]: dnf-makecache.service: Consumed 2.413s CPU time. Feb 2 08:15:42 np0005604725 python3[124324]: ansible-systemd Invoked with state=restarted name=tripleo_glance_api_tls_proxy.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:42 np0005604725 systemd[1]: Reloading. Feb 2 08:15:42 np0005604725 systemd-rc-local-generator[124373]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:42 np0005604725 systemd-sysv-generator[124379]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:42 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:43 np0005604725 systemd[1]: Starting glance_api_tls_proxy container... Feb 2 08:15:43 np0005604725 systemd[1]: Started glance_api_tls_proxy container. Feb 2 08:15:44 np0005604725 python3[124441]: ansible-systemd Invoked with state=restarted name=tripleo_heat_api.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:44 np0005604725 systemd[1]: Reloading. Feb 2 08:15:44 np0005604725 systemd-rc-local-generator[124478]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:44 np0005604725 systemd-sysv-generator[124482]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:44 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:44 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:15:44 np0005604725 systemd[1]: Starting heat_api container... Feb 2 08:15:44 np0005604725 podman[124489]: 2026-02-02 08:15:44.774585519 +0000 UTC m=+0.079776516 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, batch=17.1_20260112.1, release=1766032510, url=https://www.redhat.com, com.redhat.component=openstack-collectd-container, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, io.openshift.expose-services=, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-collectd, distribution-scope=public, container_name=collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, vendor=Red Hat, Inc., version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:15Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step3, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 collectd, build-date=2026-01-12T22:10:15Z, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 collectd, vcs-type=git) Feb 2 08:15:44 np0005604725 podman[124489]: 2026-02-02 08:15:44.785283567 +0000 UTC m=+0.090474564 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, description=Red Hat OpenStack Platform 17.1 collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, version=17.1.13, io.buildah.version=1.41.5, config_id=tripleo_step3, batch=17.1_20260112.1, release=1766032510, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:15Z, summary=Red Hat OpenStack Platform 17.1 collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, com.redhat.component=openstack-collectd-container, name=rhosp-rhel9/openstack-collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=collectd, org.opencontainers.image.created=2026-01-12T22:10:15Z, io.openshift.expose-services=, managed_by=tripleo_ansible, tcib_managed=true, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd) Feb 2 08:15:44 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:15:44 np0005604725 systemd[1]: Started heat_api container. Feb 2 08:15:45 np0005604725 python3[124600]: ansible-systemd Invoked with state=restarted name=tripleo_heat_api_cfn.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:45 np0005604725 systemd[1]: Reloading. Feb 2 08:15:46 np0005604725 systemd-rc-local-generator[124643]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:46 np0005604725 systemd-sysv-generator[124648]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:46 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:46 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:15:46 np0005604725 systemd[1]: Starting heat_api_cfn container... Feb 2 08:15:46 np0005604725 podman[124666]: 2026-02-02 08:15:46.432412361 +0000 UTC m=+0.062216104 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-horizon-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, vcs-type=git, build-date=2026-01-12T22:34:41Z, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 horizon, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, config_id=tripleo_step3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, managed_by=tripleo_ansible, io.buildah.version=1.41.5, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-horizon, container_name=horizon, release=1766032510) Feb 2 08:15:46 np0005604725 systemd[1]: Started heat_api_cfn container. Feb 2 08:15:46 np0005604725 podman[124666]: 2026-02-02 08:15:46.485964689 +0000 UTC m=+0.115768422 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, vendor=Red Hat, Inc., com.redhat.component=openstack-horizon-container, build-date=2026-01-12T22:34:41Z, managed_by=tripleo_ansible, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-horizon, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, container_name=horizon, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:41Z, version=17.1.13, batch=17.1_20260112.1, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, config_id=tripleo_step3, summary=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=) Feb 2 08:15:46 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:15:47 np0005604725 python3[124777]: ansible-systemd Invoked with state=restarted name=tripleo_heat_api_cron.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:47 np0005604725 systemd[1]: Reloading. Feb 2 08:15:47 np0005604725 systemd-sysv-generator[124817]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:47 np0005604725 systemd-rc-local-generator[124813]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:47 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:48 np0005604725 systemd[1]: Starting heat_api_cron container... Feb 2 08:15:48 np0005604725 systemd[1]: Started heat_api_cron container. Feb 2 08:15:48 np0005604725 python3[124875]: ansible-systemd Invoked with state=restarted name=tripleo_heat_engine.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:49 np0005604725 systemd[1]: Reloading. Feb 2 08:15:49 np0005604725 systemd-rc-local-generator[124916]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:49 np0005604725 systemd-sysv-generator[124922]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:49 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:49 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:15:49 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:15:49 np0005604725 systemd[1]: Starting heat_engine container... Feb 2 08:15:49 np0005604725 systemd[1]: tmp-crun.z7doeA.mount: Deactivated successfully. Feb 2 08:15:49 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:15:49 np0005604725 podman[124941]: 2026-02-02 08:15:49.623825547 +0000 UTC m=+0.090793705 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, build-date=2026-01-12T22:33:53Z, com.redhat.component=openstack-keystone-container, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, vendor=Red Hat, Inc., config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, io.buildah.version=1.41.5, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=keystone_cron, distribution-scope=public, version=17.1.13, config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:33:53Z) Feb 2 08:15:49 np0005604725 podman[124941]: 2026-02-02 08:15:49.634895767 +0000 UTC m=+0.101863945 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, batch=17.1_20260112.1, io.buildah.version=1.41.5, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, release=1766032510, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, description=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:33:53Z, name=rhosp-rhel9/openstack-keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:33:53Z, container_name=keystone_cron, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step3, vcs-type=git, io.openshift.expose-services=, version=17.1.13, com.redhat.component=openstack-keystone-container, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:15:49 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:15:49 np0005604725 systemd[1]: tmp-crun.9iv3h8.mount: Deactivated successfully. Feb 2 08:15:49 np0005604725 podman[124942]: 2026-02-02 08:15:49.722673198 +0000 UTC m=+0.190025738 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, url=https://www.redhat.com, container_name=iscsid, com.redhat.component=openstack-iscsid-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_step3, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:34:43Z, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 iscsid, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, io.openshift.expose-services=, name=rhosp-rhel9/openstack-iscsid, build-date=2026-01-12T22:34:43Z, tcib_managed=true, managed_by=tripleo_ansible, io.buildah.version=1.41.5, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, vcs-type=git, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team) Feb 2 08:15:49 np0005604725 podman[124942]: 2026-02-02 08:15:49.735307846 +0000 UTC m=+0.202660416 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 iscsid, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.expose-services=, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 iscsid, build-date=2026-01-12T22:34:43Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-iscsid, com.redhat.component=openstack-iscsid-container, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, org.opencontainers.image.created=2026-01-12T22:34:43Z, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, batch=17.1_20260112.1, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, container_name=iscsid, release=1766032510) Feb 2 08:15:49 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:15:49 np0005604725 podman[124979]: 2026-02-02 08:15:49.697612217 +0000 UTC m=+0.072838132 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, container_name=keystone, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step3, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, com.redhat.component=openstack-keystone-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, version=17.1.13, vcs-ref=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, distribution-scope=public, name=rhosp-rhel9/openstack-keystone, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:33:53Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 keystone, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:33:53Z, architecture=x86_64) Feb 2 08:15:49 np0005604725 systemd[1]: Started heat_engine container. Feb 2 08:15:49 np0005604725 podman[124979]: 2026-02-02 08:15:49.845070343 +0000 UTC m=+0.220296268 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, tcib_managed=true, container_name=keystone, description=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step3, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-keystone-container, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, distribution-scope=public, build-date=2026-01-12T22:33:53Z, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, vendor=Red Hat, Inc., batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, version=17.1.13, name=rhosp-rhel9/openstack-keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=) Feb 2 08:15:49 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:15:50 np0005604725 python3[125057]: ansible-systemd Invoked with state=restarted name=tripleo_logrotate_crond.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:50 np0005604725 systemd[1]: Reloading. Feb 2 08:15:51 np0005604725 systemd-rc-local-generator[125103]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:51 np0005604725 systemd-sysv-generator[125107]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:51 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:51 np0005604725 systemd[1]: Starting logrotate_crond container... Feb 2 08:15:51 np0005604725 systemd[1]: Started logrotate_crond container. Feb 2 08:15:52 np0005604725 python3[125226]: ansible-systemd Invoked with state=restarted name=tripleo_manila_api.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:52 np0005604725 systemd[1]: Reloading. Feb 2 08:15:52 np0005604725 systemd-sysv-generator[125257]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:52 np0005604725 systemd-rc-local-generator[125254]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:52 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:53 np0005604725 systemd[1]: Starting manila_api container... Feb 2 08:15:53 np0005604725 systemd[1]: Started manila_api container. Feb 2 08:15:54 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:15:54 np0005604725 python3[125424]: ansible-systemd Invoked with state=restarted name=tripleo_manila_api_cron.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:54 np0005604725 systemd[1]: Reloading. Feb 2 08:15:54 np0005604725 podman[125441]: 2026-02-02 08:15:54.351335149 +0000 UTC m=+0.097347826 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, url=https://www.redhat.com, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-mariadb-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, build-date=2026-01-12T22:10:18Z, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.openshift.expose-services=, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 mariadb, container_name=clustercheck, name=rhosp-rhel9/openstack-mariadb, release=1766032510, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step2) Feb 2 08:15:54 np0005604725 podman[125441]: 2026-02-02 08:15:54.403040381 +0000 UTC m=+0.149053028 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, architecture=x86_64, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, version=17.1.13, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, config_id=tripleo_step2, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=clustercheck, vcs-type=git, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-mariadb, com.redhat.component=openstack-mariadb-container, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, release=1766032510, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:15:54 np0005604725 systemd-sysv-generator[125521]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:54 np0005604725 systemd-rc-local-generator[125518]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:54 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:54 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:15:54 np0005604725 systemd[1]: Starting manila_api_cron container... Feb 2 08:15:54 np0005604725 systemd[1]: Started manila_api_cron container. Feb 2 08:15:55 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:15:55 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:15:55 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:15:55 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:15:55 np0005604725 systemd[1]: tmp-crun.Q52yRr.mount: Deactivated successfully. Feb 2 08:15:55 np0005604725 podman[125679]: 2026-02-02 08:15:55.706728179 +0000 UTC m=+0.125746380 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, vcs-type=git, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, url=https://www.redhat.com, io.buildah.version=1.41.5, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.expose-services=, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, name=rhosp-rhel9/openstack-cinder-api, version=17.1.13, com.redhat.component=openstack-cinder-api-container, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:58:44Z, container_name=cinder_api_cron, build-date=2026-01-12T22:58:44Z, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, config_id=tripleo_step4, tcib_managed=true) Feb 2 08:15:55 np0005604725 podman[125677]: 2026-02-02 08:15:55.65769162 +0000 UTC m=+0.080649292 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=healthy, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:58:47Z, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, distribution-scope=public, name=rhosp-rhel9/openstack-cinder-scheduler, com.redhat.component=openstack-cinder-scheduler-container, build-date=2026-01-12T22:58:47Z, architecture=x86_64, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, batch=17.1_20260112.1, io.buildah.version=1.41.5, io.openshift.expose-services=, url=https://www.redhat.com, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, release=1766032510, vendor=Red Hat, Inc., org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, tcib_managed=true, version=17.1.13, container_name=cinder_scheduler) Feb 2 08:15:55 np0005604725 podman[125707]: 2026-02-02 08:15:55.760693179 +0000 UTC m=+0.078342432 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, url=https://www.redhat.com, config_id=tripleo_step4, container_name=ceilometer_agent_central, maintainer=OpenStack TripleO Team, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, version=17.1.13, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, org.opencontainers.image.created=2026-01-12T23:07:24Z, managed_by=tripleo_ansible, com.redhat.component=openstack-ceilometer-central-container, description=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, name=rhosp-rhel9/openstack-ceilometer-central, batch=17.1_20260112.1, build-date=2026-01-12T23:07:24Z) Feb 2 08:15:55 np0005604725 podman[125707]: 2026-02-02 08:15:55.789899308 +0000 UTC m=+0.107548591 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, build-date=2026-01-12T23:07:24Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-ceilometer-central-container, vcs-type=git, vendor=Red Hat, Inc., architecture=x86_64, io.openshift.expose-services=, io.buildah.version=1.41.5, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, managed_by=tripleo_ansible, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T23:07:24Z, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, name=rhosp-rhel9/openstack-ceilometer-central, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, config_id=tripleo_step4, tcib_managed=true, container_name=ceilometer_agent_central, description=Red Hat OpenStack Platform 17.1 ceilometer-central) Feb 2 08:15:55 np0005604725 podman[125679]: 2026-02-02 08:15:55.797842851 +0000 UTC m=+0.216861042 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, container_name=cinder_api_cron, vcs-type=git, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., architecture=x86_64, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:58:44Z, build-date=2026-01-12T22:58:44Z, url=https://www.redhat.com, batch=17.1_20260112.1, io.openshift.expose-services=, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, distribution-scope=public, version=17.1.13, com.redhat.component=openstack-cinder-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-cinder-api) Feb 2 08:15:55 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:15:55 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:15:55 np0005604725 python3[125678]: ansible-systemd Invoked with state=restarted name=tripleo_manila_scheduler.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:55 np0005604725 podman[125677]: 2026-02-02 08:15:55.843179107 +0000 UTC m=+0.266136779 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, io.buildah.version=1.41.5, managed_by=tripleo_ansible, architecture=x86_64, release=1766032510, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, version=17.1.13, build-date=2026-01-12T22:58:47Z, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=cinder_scheduler, name=rhosp-rhel9/openstack-cinder-scheduler, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, url=https://www.redhat.com, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:58:47Z, maintainer=OpenStack TripleO Team, distribution-scope=public, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.component=openstack-cinder-scheduler-container, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}) Feb 2 08:15:55 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:15:55 np0005604725 systemd[1]: Reloading. Feb 2 08:15:55 np0005604725 podman[125711]: 2026-02-02 08:15:55.924173969 +0000 UTC m=+0.212202800 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=healthy, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, batch=17.1_20260112.1, tcib_managed=true, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, build-date=2026-01-12T23:07:25Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, name=rhosp-rhel9/openstack-ceilometer-notification, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, io.buildah.version=1.41.5, com.redhat.component=openstack-ceilometer-notification-container, distribution-scope=public, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, vcs-type=git, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, config_id=tripleo_step4, container_name=ceilometer_agent_notification, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, release=1766032510, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, org.opencontainers.image.created=2026-01-12T23:07:25Z, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:15:55 np0005604725 podman[125711]: 2026-02-02 08:15:55.950243751 +0000 UTC m=+0.238272632 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, maintainer=OpenStack TripleO Team, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-ceilometer-notification-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, tcib_managed=true, io.openshift.expose-services=, build-date=2026-01-12T23:07:25Z, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, batch=17.1_20260112.1, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=ceilometer_agent_notification, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:07:25Z, managed_by=tripleo_ansible, config_id=tripleo_step4, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-ceilometer-notification, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, architecture=x86_64, release=1766032510, io.buildah.version=1.41.5, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 ceilometer-notification) Feb 2 08:15:56 np0005604725 systemd-rc-local-generator[125800]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:56 np0005604725 systemd-sysv-generator[125805]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:56 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:56 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:15:56 np0005604725 systemd[1]: Starting manila_scheduler container... Feb 2 08:15:56 np0005604725 systemd[1]: Started manila_scheduler container. Feb 2 08:15:57 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:15:57 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:15:57 np0005604725 podman[125980]: 2026-02-02 08:15:57.328581535 +0000 UTC m=+0.076987860 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=healthy, version=17.1.13, batch=17.1_20260112.1, com.redhat.component=openstack-heat-engine-container, release=1766032510, container_name=heat_engine, vcs-ref=755001522886c265e88561b4997cab642504a845, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 heat-engine, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.expose-services=, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:53:38Z, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, name=rhosp-rhel9/openstack-heat-engine, vcs-type=git, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 heat-engine, build-date=2026-01-12T22:53:38Z, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, io.buildah.version=1.41.5) Feb 2 08:15:57 np0005604725 systemd[1]: tmp-crun.SInjud.mount: Deactivated successfully. Feb 2 08:15:57 np0005604725 podman[125979]: 2026-02-02 08:15:57.353298626 +0000 UTC m=+0.097012786 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, vcs-ref=755001522886c265e88561b4997cab642504a845, org.opencontainers.image.created=2026-01-12T22:53:19Z, com.redhat.component=openstack-heat-api-container, version=17.1.13, managed_by=tripleo_ansible, architecture=x86_64, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-heat-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, summary=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., url=https://www.redhat.com, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, container_name=heat_api_cron, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, tcib_managed=true, distribution-scope=public) Feb 2 08:15:57 np0005604725 podman[125979]: 2026-02-02 08:15:57.362754497 +0000 UTC m=+0.106468647 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, tcib_managed=true, name=rhosp-rhel9/openstack-heat-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, version=17.1.13, container_name=heat_api_cron, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:53:19Z, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, vcs-ref=755001522886c265e88561b4997cab642504a845, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, config_id=tripleo_step4, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, build-date=2026-01-12T22:53:19Z, architecture=x86_64, release=1766032510, com.redhat.component=openstack-heat-api-container) Feb 2 08:15:57 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:15:57 np0005604725 podman[125980]: 2026-02-02 08:15:57.380831733 +0000 UTC m=+0.129238078 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, vcs-type=git, description=Red Hat OpenStack Platform 17.1 heat-engine, com.redhat.component=openstack-heat-engine-container, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:53:38Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, distribution-scope=public, url=https://www.redhat.com, name=rhosp-rhel9/openstack-heat-engine, build-date=2026-01-12T22:53:38Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, release=1766032510, tcib_managed=true, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, container_name=heat_engine, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, io.buildah.version=1.41.5, batch=17.1_20260112.1, config_id=tripleo_step4, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 heat-engine) Feb 2 08:15:57 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:15:57 np0005604725 python3[125996]: ansible-systemd Invoked with state=restarted name=tripleo_neutron_api.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:57 np0005604725 systemd[1]: Reloading. Feb 2 08:15:57 np0005604725 systemd-rc-local-generator[126060]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:57 np0005604725 systemd-sysv-generator[126064]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:57 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:15:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:15:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:15:58 np0005604725 systemd[1]: Starting neutron_api container... Feb 2 08:15:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:15:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:15:58 np0005604725 systemd[1]: Started neutron_api container. Feb 2 08:15:58 np0005604725 podman[126075]: 2026-02-02 08:15:58.220506475 +0000 UTC m=+0.140095661 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, name=rhosp-rhel9/openstack-cron, architecture=x86_64, container_name=logrotate_crond, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cron, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:15Z, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, version=17.1.13, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, config_id=tripleo_step4, io.buildah.version=1.41.5, vcs-type=git, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 cron, release=1766032510, build-date=2026-01-12T22:10:15Z, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-cron-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron) Feb 2 08:15:58 np0005604725 podman[126132]: 2026-02-02 08:15:58.278427188 +0000 UTC m=+0.093266550 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=healthy, com.redhat.component=openstack-manila-scheduler-container, name=rhosp-rhel9/openstack-manila-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:52:54Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, architecture=x86_64, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=manila_scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, version=17.1.13, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 manila-scheduler, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:52:54Z, config_id=tripleo_step4, vcs-type=git, vendor=Red Hat, Inc., tcib_managed=true, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, release=1766032510, io.buildah.version=1.41.5) Feb 2 08:15:58 np0005604725 podman[126075]: 2026-02-02 08:15:58.285732693 +0000 UTC m=+0.205321849 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, batch=17.1_20260112.1, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, summary=Red Hat OpenStack Platform 17.1 cron, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:15Z, vcs-type=git, com.redhat.component=openstack-cron-container, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, managed_by=tripleo_ansible, distribution-scope=public, io.buildah.version=1.41.5, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-cron, io.openshift.expose-services=, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, architecture=x86_64, url=https://www.redhat.com, container_name=logrotate_crond, description=Red Hat OpenStack Platform 17.1 cron, build-date=2026-01-12T22:10:15Z) Feb 2 08:15:58 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:15:58 np0005604725 podman[126129]: 2026-02-02 08:15:58.249330593 +0000 UTC m=+0.070218852 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T22:58:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, io.openshift.expose-services=, build-date=2026-01-12T22:58:44Z, description=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, release=1766032510, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, container_name=cinder_api, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, name=rhosp-rhel9/openstack-cinder-api, com.redhat.component=openstack-cinder-api-container, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, url=https://www.redhat.com, managed_by=tripleo_ansible, vcs-type=git, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc.) Feb 2 08:15:58 np0005604725 podman[126076]: 2026-02-02 08:15:58.153618717 +0000 UTC m=+0.072523762 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, vcs-type=git, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, build-date=2026-01-12T22:52:22Z, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, distribution-scope=public, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, container_name=manila_api_cron, com.redhat.component=openstack-manila-api-container, io.openshift.expose-services=, url=https://www.redhat.com, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:52:22Z, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 manila-api, config_id=tripleo_step4, name=rhosp-rhel9/openstack-manila-api) Feb 2 08:15:58 np0005604725 podman[126129]: 2026-02-02 08:15:58.313479796 +0000 UTC m=+0.134368075 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, tcib_managed=true, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=cinder_api, url=https://www.redhat.com, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, com.redhat.component=openstack-cinder-api-container, org.opencontainers.image.created=2026-01-12T22:58:44Z, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, release=1766032510, vcs-type=git, architecture=x86_64, config_id=tripleo_step4, vendor=Red Hat, Inc., org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, name=rhosp-rhel9/openstack-cinder-api, build-date=2026-01-12T22:58:44Z, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, description=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:15:58 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:15:58 np0005604725 podman[126132]: 2026-02-02 08:15:58.324749292 +0000 UTC m=+0.139588544 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, vcs-type=git, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, org.opencontainers.image.created=2026-01-12T22:52:54Z, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=manila_scheduler, url=https://www.redhat.com, config_id=tripleo_step4, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-manila-scheduler, architecture=x86_64, version=17.1.13, build-date=2026-01-12T22:52:54Z, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, vendor=Red Hat, Inc., tcib_managed=true, release=1766032510, description=Red Hat OpenStack Platform 17.1 manila-scheduler, io.buildah.version=1.41.5, distribution-scope=public, com.redhat.component=openstack-manila-scheduler-container, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:15:58 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:15:58 np0005604725 podman[126076]: 2026-02-02 08:15:58.33605029 +0000 UTC m=+0.254955335 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, container_name=manila_api_cron, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, vcs-type=git, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, architecture=x86_64, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, version=17.1.13, config_id=tripleo_step4, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:52:22Z, build-date=2026-01-12T22:52:22Z, release=1766032510, com.redhat.component=openstack-manila-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, name=rhosp-rhel9/openstack-manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, distribution-scope=public) Feb 2 08:15:58 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:15:58 np0005604725 podman[126074]: 2026-02-02 08:15:58.29148643 +0000 UTC m=+0.208638071 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, config_id=tripleo_step4, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, container_name=heat_api, architecture=x86_64, vcs-ref=755001522886c265e88561b4997cab642504a845, batch=17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:53:19Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, name=rhosp-rhel9/openstack-heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, summary=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, com.redhat.component=openstack-heat-api-container, build-date=2026-01-12T22:53:19Z, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:15:58 np0005604725 podman[126074]: 2026-02-02 08:15:58.425911615 +0000 UTC m=+0.343063286 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, vcs-ref=755001522886c265e88561b4997cab642504a845, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, description=Red Hat OpenStack Platform 17.1 heat-api, container_name=heat_api, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., managed_by=tripleo_ansible, build-date=2026-01-12T22:53:19Z, org.opencontainers.image.created=2026-01-12T22:53:19Z, io.buildah.version=1.41.5, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-heat-api-container, name=rhosp-rhel9/openstack-heat-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, version=17.1.13) Feb 2 08:15:58 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:15:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:15:58 np0005604725 podman[126218]: 2026-02-02 08:15:58.516722029 +0000 UTC m=+0.058414298 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-heat-api-cfn, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, build-date=2026-01-12T22:54:02Z, org.opencontainers.image.created=2026-01-12T22:54:02Z, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, maintainer=OpenStack TripleO Team, version=17.1.13, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, managed_by=tripleo_ansible, config_id=tripleo_step4, tcib_managed=true, container_name=heat_api_cfn, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, url=https://www.redhat.com, com.redhat.component=openstack-heat-api-cfn-container, release=1766032510) Feb 2 08:15:58 np0005604725 podman[126218]: 2026-02-02 08:15:58.582828973 +0000 UTC m=+0.124521232 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, url=https://www.redhat.com, container_name=heat_api_cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-ref=755001522886c265e88561b4997cab642504a845, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, release=1766032510, com.redhat.component=openstack-heat-api-cfn-container, io.buildah.version=1.41.5, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:54:02Z, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, architecture=x86_64, build-date=2026-01-12T22:54:02Z, config_id=tripleo_step4, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-heat-api-cfn, batch=17.1_20260112.1, distribution-scope=public, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}) Feb 2 08:15:58 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:15:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:15:59 np0005604725 podman[126268]: 2026-02-02 08:15:59.079484412 +0000 UTC m=+0.079880019 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=healthy, release=1766032510, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, container_name=neutron_api, vendor=Red Hat, Inc., batch=17.1_20260112.1, distribution-scope=public, build-date=2026-01-12T22:57:35Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, description=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, maintainer=OpenStack TripleO Team, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, tcib_managed=true, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, com.redhat.component=openstack-neutron-server-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, architecture=x86_64) Feb 2 08:15:59 np0005604725 podman[126268]: 2026-02-02 08:15:59.23380812 +0000 UTC m=+0.234203677 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, vendor=Red Hat, Inc., build-date=2026-01-12T22:57:35Z, description=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, url=https://www.redhat.com, container_name=neutron_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, maintainer=OpenStack TripleO Team, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, distribution-scope=public, release=1766032510, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:57:35Z, io.openshift.expose-services=, name=rhosp-rhel9/openstack-neutron-server, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 neutron-server, managed_by=tripleo_ansible, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:15:59 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:15:59 np0005604725 python3[126269]: ansible-systemd Invoked with state=restarted name=tripleo_neutron_server_tls_proxy.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:15:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:15:59 np0005604725 systemd[1]: Reloading. Feb 2 08:15:59 np0005604725 podman[126305]: 2026-02-02 08:15:59.395081472 +0000 UTC m=+0.078054412 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=healthy, build-date=2026-01-12T23:32:18Z, distribution-scope=public, url=https://www.redhat.com, batch=17.1_20260112.1, io.openshift.expose-services=, com.redhat.component=openstack-nova-conductor-container, description=Red Hat OpenStack Platform 17.1 nova-conductor, name=rhosp-rhel9/openstack-nova-conductor, org.opencontainers.image.created=2026-01-12T23:32:18Z, vcs-type=git, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, tcib_managed=true, container_name=nova_conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, release=1766032510, vendor=Red Hat, Inc., managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-conductor, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13) Feb 2 08:15:59 np0005604725 podman[126305]: 2026-02-02 08:15:59.423830466 +0000 UTC m=+0.106803406 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, tcib_managed=true, container_name=nova_conductor, name=rhosp-rhel9/openstack-nova-conductor, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, distribution-scope=public, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-conductor, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, vendor=Red Hat, Inc., build-date=2026-01-12T23:32:18Z, com.redhat.component=openstack-nova-conductor-container, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-conductor, architecture=x86_64, org.opencontainers.image.created=2026-01-12T23:32:18Z, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:15:59 np0005604725 systemd-rc-local-generator[126359]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:15:59 np0005604725 systemd-sysv-generator[126366]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:15:59 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:15:59 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:15:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:15:59 np0005604725 systemd[1]: Starting neutron_server_tls_proxy container... Feb 2 08:15:59 np0005604725 systemd[1]: Started neutron_server_tls_proxy container. Feb 2 08:15:59 np0005604725 podman[126383]: 2026-02-02 08:15:59.932588768 +0000 UTC m=+0.125987547 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T23:32:05Z, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 nova-scheduler, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, distribution-scope=public, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, managed_by=tripleo_ansible, url=https://www.redhat.com, build-date=2026-01-12T23:32:05Z, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, io.buildah.version=1.41.5, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-nova-scheduler-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, container_name=nova_scheduler, name=rhosp-rhel9/openstack-nova-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, vendor=Red Hat, Inc., tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler) Feb 2 08:15:59 np0005604725 podman[126383]: 2026-02-02 08:15:59.95377803 +0000 UTC m=+0.147176809 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, name=rhosp-rhel9/openstack-nova-scheduler, release=1766032510, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 nova-scheduler, tcib_managed=true, io.openshift.expose-services=, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, com.redhat.component=openstack-nova-scheduler-container, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., version=17.1.13, build-date=2026-01-12T23:32:05Z, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T23:32:05Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, distribution-scope=public, container_name=nova_scheduler, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, io.buildah.version=1.41.5) Feb 2 08:15:59 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:16:00 np0005604725 python3[126449]: ansible-systemd Invoked with state=restarted name=tripleo_nova_api.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:00 np0005604725 systemd[1]: Reloading. Feb 2 08:16:01 np0005604725 systemd-rc-local-generator[126485]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:01 np0005604725 systemd-sysv-generator[126492]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:01 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:16:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:16:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:16:01 np0005604725 systemd[1]: Starting nova_api container... Feb 2 08:16:01 np0005604725 podman[126567]: 2026-02-02 08:16:01.539760133 +0000 UTC m=+0.067818257 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=healthy, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:50:44Z, managed_by=tripleo_ansible, io.buildah.version=1.41.5, vcs-type=git, vendor=Red Hat, Inc., batch=17.1_20260112.1, distribution-scope=public, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=swift_account_replicator, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, config_id=tripleo_step4, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:50:44Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, url=https://www.redhat.com, io.openshift.expose-services=, com.redhat.component=openstack-swift-account-container, tcib_managed=true, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 swift-account, name=rhosp-rhel9/openstack-swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account) Feb 2 08:16:01 np0005604725 podman[126568]: 2026-02-02 08:16:01.589330928 +0000 UTC m=+0.117464984 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=healthy, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, name=rhosp-rhel9/openstack-nova-novncproxy, architecture=x86_64, version=17.1.13, io.openshift.expose-services=, vendor=Red Hat, Inc., vcs-type=git, org.opencontainers.image.created=2026-01-12T23:32:22Z, distribution-scope=public, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T23:32:22Z, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, container_name=nova_vnc_proxy, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, com.redhat.component=openstack-nova-novncproxy-container, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, release=1766032510, batch=17.1_20260112.1) Feb 2 08:16:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:16:01 np0005604725 podman[126563]: 2026-02-02 08:16:01.648572181 +0000 UTC m=+0.174815629 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, container_name=swift_container_replicator, name=rhosp-rhel9/openstack-swift-container, version=17.1.13, tcib_managed=true, release=1766032510, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, vcs-type=git, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.expose-services=, com.redhat.component=openstack-swift-container-container, config_id=tripleo_step4, io.buildah.version=1.41.5, build-date=2026-01-12T22:50:57Z, org.opencontainers.image.created=2026-01-12T22:50:57Z, vendor=Red Hat, Inc., managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:16:01 np0005604725 podman[126567]: 2026-02-02 08:16:01.667211865 +0000 UTC m=+0.195269999 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, vendor=Red Hat, Inc., org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, distribution-scope=public, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, io.buildah.version=1.41.5, io.openshift.expose-services=, com.redhat.component=openstack-swift-account-container, build-date=2026-01-12T22:50:44Z, container_name=swift_account_replicator, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-swift-account, maintainer=OpenStack TripleO Team, vcs-type=git, managed_by=tripleo_ansible, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, release=1766032510, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, batch=17.1_20260112.1) Feb 2 08:16:01 np0005604725 systemd[1]: tmp-crun.cnFHdr.mount: Deactivated successfully. Feb 2 08:16:01 np0005604725 podman[126637]: 2026-02-02 08:16:01.695591898 +0000 UTC m=+0.082794569 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=healthy, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:44Z, config_id=tripleo_step4, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.openshift.expose-services=, com.redhat.component=openstack-swift-account-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, managed_by=tripleo_ansible, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, distribution-scope=public, vendor=Red Hat, Inc., io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:50:44Z, name=rhosp-rhel9/openstack-swift-account, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-account, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, container_name=swift_account_server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, maintainer=OpenStack TripleO Team) Feb 2 08:16:01 np0005604725 systemd[1]: Started nova_api container. Feb 2 08:16:01 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:16:01 np0005604725 podman[126563]: 2026-02-02 08:16:01.767795348 +0000 UTC m=+0.294038806 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, build-date=2026-01-12T22:50:57Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, container_name=swift_container_replicator, name=rhosp-rhel9/openstack-swift-container, architecture=x86_64, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, distribution-scope=public, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-container, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:50:57Z, io.buildah.version=1.41.5, tcib_managed=true, com.redhat.component=openstack-swift-container-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, vendor=Red Hat, Inc., release=1766032510, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container) Feb 2 08:16:01 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Deactivated successfully. Feb 2 08:16:01 np0005604725 podman[126637]: 2026-02-02 08:16:01.866722322 +0000 UTC m=+0.253924913 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:44Z, name=rhosp-rhel9/openstack-swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-swift-account-container, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, container_name=swift_account_server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, summary=Red Hat OpenStack Platform 17.1 swift-account, distribution-scope=public, vendor=Red Hat, Inc., version=17.1.13, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:44Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git) Feb 2 08:16:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:16:01 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Deactivated successfully. Feb 2 08:16:01 np0005604725 podman[126700]: 2026-02-02 08:16:01.978955185 +0000 UTC m=+0.084112259 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=healthy, container_name=swift_container_server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, vendor=Red Hat, Inc., vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:50:57Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-container, release=1766032510, summary=Red Hat OpenStack Platform 17.1 swift-container, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:57Z, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, version=17.1.13, com.redhat.component=openstack-swift-container-container, managed_by=tripleo_ansible, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, tcib_managed=true, io.buildah.version=1.41.5, batch=17.1_20260112.1, config_id=tripleo_step4, architecture=x86_64, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container) Feb 2 08:16:02 np0005604725 podman[126568]: 2026-02-02 08:16:02.031296406 +0000 UTC m=+0.559430482 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, container_name=nova_vnc_proxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, tcib_managed=true, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.buildah.version=1.41.5, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-nova-novncproxy, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, vcs-type=git, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.openshift.expose-services=, url=https://www.redhat.com, version=17.1.13, release=1766032510, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-nova-novncproxy-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, build-date=2026-01-12T23:32:22Z, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:16:02 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Deactivated successfully. Feb 2 08:16:02 np0005604725 podman[126700]: 2026-02-02 08:16:02.163979668 +0000 UTC m=+0.269136742 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, container_name=swift_container_server, managed_by=tripleo_ansible, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:50:57Z, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:50:57Z, release=1766032510, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, tcib_managed=true, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-container, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-container-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-swift-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, config_id=tripleo_step4, architecture=x86_64, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:16:02 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Deactivated successfully. Feb 2 08:16:02 np0005604725 podman[126733]: 2026-02-02 08:16:02.278743448 +0000 UTC m=+0.082682885 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.component=openstack-mariadb-container, name=rhosp-rhel9/openstack-mariadb, io.buildah.version=1.41.5, version=17.1.13, tcib_managed=true, vendor=Red Hat, Inc., release=1766032510, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, vcs-type=git, architecture=x86_64, build-date=2026-01-12T22:10:18Z) Feb 2 08:16:02 np0005604725 podman[126733]: 2026-02-02 08:16:02.311989691 +0000 UTC m=+0.115929168 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, vcs-type=git, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:18Z, batch=17.1_20260112.1, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-mariadb, url=https://www.redhat.com, io.buildah.version=1.41.5, build-date=2026-01-12T22:10:18Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:16:02 np0005604725 podman[126807]: 2026-02-02 08:16:02.717361942 +0000 UTC m=+0.068763186 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, version=17.1.13, distribution-scope=public, io.openshift.expose-services=, vcs-type=git, build-date=2026-01-12T22:10:16Z, description=Red Hat OpenStack Platform 17.1 redis, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, com.redhat.component=openstack-redis-container, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:16Z, summary=Red Hat OpenStack Platform 17.1 redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, name=rhosp-rhel9/openstack-redis, vendor=Red Hat, Inc., architecture=x86_64, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:16:02 np0005604725 podman[126807]: 2026-02-02 08:16:02.749039077 +0000 UTC m=+0.100440341 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, release=1766032510, url=https://www.redhat.com, com.redhat.component=openstack-redis-container, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, vendor=Red Hat, Inc., architecture=x86_64, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 redis, summary=Red Hat OpenStack Platform 17.1 redis, build-date=2026-01-12T22:10:16Z, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-redis, org.opencontainers.image.created=2026-01-12T22:10:16Z, io.buildah.version=1.41.5) Feb 2 08:16:02 np0005604725 python3[126795]: ansible-systemd Invoked with state=restarted name=tripleo_nova_api_cron.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:02 np0005604725 systemd[1]: Reloading. Feb 2 08:16:02 np0005604725 podman[126828]: 2026-02-02 08:16:02.865055386 +0000 UTC m=+0.138394648 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 haproxy, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-haproxy-container, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 haproxy, batch=17.1_20260112.1, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, io.openshift.expose-services=, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:12Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:12Z, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy) Feb 2 08:16:02 np0005604725 podman[126828]: 2026-02-02 08:16:02.898060992 +0000 UTC m=+0.171400264 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, tcib_managed=true, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-haproxy, batch=17.1_20260112.1, release=1766032510, io.openshift.expose-services=, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:12Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, version=17.1.13, architecture=x86_64, vendor=Red Hat, Inc.) Feb 2 08:16:02 np0005604725 systemd-sysv-generator[126909]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:02 np0005604725 systemd-rc-local-generator[126906]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:03 np0005604725 podman[126859]: 2026-02-02 08:16:03.029177576 +0000 UTC m=+0.150237034 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.created=2026-01-12T22:10:14Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, batch=17.1_20260112.1, version=17.1.13, url=https://www.redhat.com, io.buildah.version=1.41.5, release=1766032510, com.redhat.component=openstack-rabbitmq-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-type=git, build-date=2026-01-12T22:10:14Z, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, name=rhosp-rhel9/openstack-rabbitmq) Feb 2 08:16:03 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:03 np0005604725 podman[126859]: 2026-02-02 08:16:03.061907062 +0000 UTC m=+0.182966510 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, batch=17.1_20260112.1, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp-rhel9/openstack-rabbitmq, io.openshift.expose-services=, tcib_managed=true, io.buildah.version=1.41.5, build-date=2026-01-12T22:10:14Z, summary=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, release=1766032510, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 rabbitmq, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:14Z, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, maintainer=OpenStack TripleO Team) Feb 2 08:16:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:16:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:16:03 np0005604725 systemd[1]: Starting nova_api_cron container... Feb 2 08:16:03 np0005604725 podman[126946]: 2026-02-02 08:16:03.397586809 +0000 UTC m=+0.061481062 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, batch=17.1_20260112.1, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 swift-object, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:50:56Z, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-swift-object, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_object_replicator, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., config_id=tripleo_step4, build-date=2026-01-12T22:50:56Z, maintainer=OpenStack TripleO Team, version=17.1.13, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-object-container, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:16:03 np0005604725 systemd[1]: Started nova_api_cron container. Feb 2 08:16:03 np0005604725 podman[126946]: 2026-02-02 08:16:03.513713133 +0000 UTC m=+0.177607376 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, build-date=2026-01-12T22:50:56Z, description=Red Hat OpenStack Platform 17.1 swift-object, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-swift-object, vcs-type=git, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, config_id=tripleo_step4, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:50:56Z, release=1766032510, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_object_replicator, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-object-container, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:16:03 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Deactivated successfully. Feb 2 08:16:03 np0005604725 podman[126945]: 2026-02-02 08:16:03.517908131 +0000 UTC m=+0.180790162 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=healthy, vcs-type=git, batch=17.1_20260112.1, release=1766032510, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:56Z, io.buildah.version=1.41.5, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, container_name=swift_object_server, io.openshift.expose-services=, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, com.redhat.component=openstack-swift-object-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, build-date=2026-01-12T22:50:56Z, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:16:03 np0005604725 podman[126945]: 2026-02-02 08:16:03.714763017 +0000 UTC m=+0.377645048 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:50:56Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, version=17.1.13, name=rhosp-rhel9/openstack-swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_object_server, architecture=x86_64, vcs-type=git, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.openshift.expose-services=, io.buildah.version=1.41.5, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, com.redhat.component=openstack-swift-object-container, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:16:03 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Deactivated successfully. Feb 2 08:16:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:16:04 np0005604725 systemd[1]: tmp-crun.fIdnYH.mount: Deactivated successfully. Feb 2 08:16:04 np0005604725 podman[127048]: 2026-02-02 08:16:04.288837719 +0000 UTC m=+0.099888714 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:34:06Z, managed_by=tripleo_ansible, container_name=ovn_cluster_northd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, url=https://www.redhat.com, name=rhosp-rhel9/openstack-ovn-northd, com.redhat.component=openstack-ovn-northd-container, vcs-type=git, vendor=Red Hat, Inc., config_id=ovn_cluster_northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:34:06Z, batch=17.1_20260112.1, architecture=x86_64, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 ovn-northd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, maintainer=OpenStack TripleO Team, version=17.1.13, release=1766032510, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, description=Red Hat OpenStack Platform 17.1 ovn-northd, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:16:04 np0005604725 podman[127048]: 2026-02-02 08:16:04.304254254 +0000 UTC m=+0.115305309 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, io.openshift.expose-services=, version=17.1.13, container_name=ovn_cluster_northd, summary=Red Hat OpenStack Platform 17.1 ovn-northd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_id=ovn_cluster_northd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, com.redhat.component=openstack-ovn-northd-container, org.opencontainers.image.created=2026-01-12T22:34:06Z, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, name=rhosp-rhel9/openstack-ovn-northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, description=Red Hat OpenStack Platform 17.1 ovn-northd, distribution-scope=public, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, tcib_managed=true, vendor=Red Hat, Inc., url=https://www.redhat.com, architecture=x86_64, build-date=2026-01-12T22:34:06Z, release=1766032510, vcs-type=git, io.buildah.version=1.41.5) Feb 2 08:16:04 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:16:04 np0005604725 python3[127049]: ansible-systemd Invoked with state=restarted name=tripleo_nova_conductor.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:16:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:16:04 np0005604725 systemd[1]: Reloading. Feb 2 08:16:04 np0005604725 podman[127083]: 2026-02-02 08:16:04.603332685 +0000 UTC m=+0.078818346 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-swift-object-container, version=17.1.13, url=https://www.redhat.com, container_name=swift_rsync, org.opencontainers.image.created=2026-01-12T22:50:56Z, config_id=tripleo_step4, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, distribution-scope=public, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:50:56Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-object, tcib_managed=true, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, release=1766032510, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, vendor=Red Hat, Inc.) Feb 2 08:16:04 np0005604725 podman[127079]: 2026-02-02 08:16:04.671924785 +0000 UTC m=+0.148522720 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=healthy, com.redhat.component=openstack-ovn-controller-container, config_id=tripleo_step4, name=rhosp-rhel9/openstack-ovn-controller, release=1766032510, vendor=Red Hat, Inc., config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, io.buildah.version=1.41.5, managed_by=tripleo_ansible, tcib_managed=true, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:36:40Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, summary=Red Hat OpenStack Platform 17.1 ovn-controller, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vcs-type=git, container_name=ovn_controller, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, build-date=2026-01-12T22:36:40Z, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, batch=17.1_20260112.1) Feb 2 08:16:04 np0005604725 systemd-sysv-generator[127168]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:04 np0005604725 systemd-rc-local-generator[127165]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:04 np0005604725 podman[127079]: 2026-02-02 08:16:04.696757609 +0000 UTC m=+0.173355514 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible, distribution-scope=public, maintainer=OpenStack TripleO Team, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, org.opencontainers.image.created=2026-01-12T22:36:40Z, batch=17.1_20260112.1, vendor=Red Hat, Inc., config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, release=1766032510, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 ovn-controller, url=https://www.redhat.com, name=rhosp-rhel9/openstack-ovn-controller, tcib_managed=true, com.redhat.component=openstack-ovn-controller-container, container_name=ovn_controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.expose-services=, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vcs-type=git, build-date=2026-01-12T22:36:40Z, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller) Feb 2 08:16:04 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:05 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Deactivated successfully. Feb 2 08:16:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:16:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:16:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:16:05 np0005604725 podman[127083]: 2026-02-02 08:16:05.04911955 +0000 UTC m=+0.524605251 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, vendor=Red Hat, Inc., tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, com.redhat.component=openstack-swift-object-container, summary=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-object, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, managed_by=tripleo_ansible, vcs-type=git, batch=17.1_20260112.1, architecture=x86_64, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.created=2026-01-12T22:50:56Z, container_name=swift_rsync, build-date=2026-01-12T22:50:56Z, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:16:05 np0005604725 systemd[1]: Starting nova_conductor container... Feb 2 08:16:05 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:16:05 np0005604725 podman[127191]: 2026-02-02 08:16:05.127570533 +0000 UTC m=+0.071943304 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=healthy, architecture=x86_64, io.buildah.version=1.41.5, managed_by=tripleo_ansible, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 placement-api, version=17.1.13, container_name=placement_api, build-date=2026-01-12T22:34:35Z, distribution-scope=public, com.redhat.component=openstack-placement-api-container, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-placement-api, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.created=2026-01-12T22:34:35Z, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, config_id=tripleo_step4, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, url=https://www.redhat.com) Feb 2 08:16:05 np0005604725 systemd[1]: Started nova_conductor container. Feb 2 08:16:05 np0005604725 podman[127191]: 2026-02-02 08:16:05.191886002 +0000 UTC m=+0.136258793 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:35Z, description=Red Hat OpenStack Platform 17.1 placement-api, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, version=17.1.13, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:35Z, com.redhat.component=openstack-placement-api-container, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, name=rhosp-rhel9/openstack-placement-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, vendor=Red Hat, Inc., container_name=placement_api, distribution-scope=public, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 placement-api, url=https://www.redhat.com, vcs-type=git, io.buildah.version=1.41.5, io.openshift.expose-services=) Feb 2 08:16:05 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:16:05 np0005604725 podman[127189]: 2026-02-02 08:16:05.237972349 +0000 UTC m=+0.184387613 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:14Z, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, vendor=Red Hat, Inc., config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, batch=17.1_20260112.1, version=17.1.13, name=rhosp-rhel9/openstack-qdrouterd, tcib_managed=true, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:14Z, url=https://www.redhat.com, release=1766032510, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:16:05 np0005604725 podman[127187]: 2026-02-02 08:16:05.304406323 +0000 UTC m=+0.248755774 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, container_name=memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., distribution-scope=public, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, summary=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, architecture=x86_64, tcib_managed=true, build-date=2026-01-12T22:12:26Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-memcached-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, config_id=tripleo_step1, name=rhosp-rhel9/openstack-memcached, vcs-type=git, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, maintainer=OpenStack TripleO Team, release=1766032510) Feb 2 08:16:05 np0005604725 podman[127187]: 2026-02-02 08:16:05.328917338 +0000 UTC m=+0.273266759 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, vcs-type=git, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 memcached, summary=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., io.buildah.version=1.41.5, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, version=17.1.13, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=memcached, managed_by=tripleo_ansible, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, com.redhat.component=openstack-memcached-container, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:12:26Z, org.opencontainers.image.created=2026-01-12T22:12:26Z) Feb 2 08:16:05 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:16:05 np0005604725 podman[127189]: 2026-02-02 08:16:05.477947463 +0000 UTC m=+0.424362747 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:14Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., vcs-type=git, architecture=x86_64, distribution-scope=public, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, batch=17.1_20260112.1, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-qdrouterd-container, name=rhosp-rhel9/openstack-qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, version=17.1.13, container_name=metrics_qdr, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, maintainer=OpenStack TripleO Team) Feb 2 08:16:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:16:05 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:16:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:16:05 np0005604725 podman[127320]: 2026-02-02 08:16:05.600587896 +0000 UTC m=+0.085213513 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=healthy, vcs-ref=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:34:42Z, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, com.redhat.component=openstack-glance-api-container, name=rhosp-rhel9/openstack-glance-api, url=https://www.redhat.com, config_id=tripleo_step4, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, build-date=2026-01-12T22:34:42Z, container_name=glance_api_cron, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, tcib_managed=true, distribution-scope=public, io.openshift.expose-services=) Feb 2 08:16:05 np0005604725 podman[127320]: 2026-02-02 08:16:05.635821579 +0000 UTC m=+0.120447216 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, com.redhat.component=openstack-glance-api-container, url=https://www.redhat.com, batch=17.1_20260112.1, architecture=x86_64, io.openshift.expose-services=, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:42Z, managed_by=tripleo_ansible, vcs-type=git, container_name=glance_api_cron, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:34:42Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., distribution-scope=public, io.buildah.version=1.41.5, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api) Feb 2 08:16:05 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:16:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:16:05 np0005604725 podman[127346]: 2026-02-02 08:16:05.700410566 +0000 UTC m=+0.094000642 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, architecture=x86_64, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, version=17.1.13, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, tcib_managed=true, com.redhat.component=openstack-glance-api-container, name=rhosp-rhel9/openstack-glance-api, build-date=2026-01-12T22:34:42Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., vcs-type=git, description=Red Hat OpenStack Platform 17.1 glance-api, container_name=glance_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, release=1766032510) Feb 2 08:16:05 np0005604725 podman[127359]: 2026-02-02 08:16:05.776609651 +0000 UTC m=+0.102525275 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=healthy, name=rhosp-rhel9/openstack-glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, distribution-scope=public, release=1766032510, batch=17.1_20260112.1, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 glance-api, container_name=glance_api_internal, vendor=Red Hat, Inc., io.buildah.version=1.41.5, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:34:42Z, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-glance-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.openshift.expose-services=, version=17.1.13, config_id=tripleo_step4, vcs-ref=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:16:05 np0005604725 podman[127346]: 2026-02-02 08:16:05.937897353 +0000 UTC m=+0.331487399 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-glance-api, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, config_id=tripleo_step4, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., com.redhat.component=openstack-glance-api-container, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, build-date=2026-01-12T22:34:42Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, distribution-scope=public, container_name=glance_api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:42Z, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:16:05 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Deactivated successfully. Feb 2 08:16:06 np0005604725 podman[127359]: 2026-02-02 08:16:06.001422768 +0000 UTC m=+0.327338382 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, io.openshift.expose-services=, vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, container_name=glance_api_internal, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, tcib_managed=true, vendor=Red Hat, Inc., url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, name=rhosp-rhel9/openstack-glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 glance-api, build-date=2026-01-12T22:34:42Z, org.opencontainers.image.created=2026-01-12T22:34:42Z, com.redhat.component=openstack-glance-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, architecture=x86_64, config_id=tripleo_step4) Feb 2 08:16:06 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Deactivated successfully. Feb 2 08:16:06 np0005604725 python3[127419]: ansible-systemd Invoked with state=restarted name=tripleo_nova_metadata.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:06 np0005604725 systemd[1]: Reloading. Feb 2 08:16:06 np0005604725 systemd-rc-local-generator[127452]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:06 np0005604725 systemd-sysv-generator[127456]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:06 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:06 np0005604725 systemd[1]: Starting nova_metadata container... Feb 2 08:16:07 np0005604725 systemd[1]: Started nova_metadata container. Feb 2 08:16:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:16:07 np0005604725 systemd[1]: tmp-crun.IY8EPd.mount: Deactivated successfully. Feb 2 08:16:07 np0005604725 podman[127569]: 2026-02-02 08:16:07.883605564 +0000 UTC m=+0.105549039 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=healthy, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp-rhel9/openstack-swift-proxy-server, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:50:51Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=swift_proxy, version=17.1.13, io.buildah.version=1.41.5, batch=17.1_20260112.1, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, distribution-scope=public, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-swift-proxy-server-container, tcib_managed=true, io.openshift.expose-services=, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_id=tripleo_step4, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:50:51Z) Feb 2 08:16:08 np0005604725 python3[127568]: ansible-systemd Invoked with state=restarted name=tripleo_nova_scheduler.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:08 np0005604725 systemd[1]: Reloading. Feb 2 08:16:08 np0005604725 podman[127569]: 2026-02-02 08:16:08.166114564 +0000 UTC m=+0.388058039 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.buildah.version=1.41.5, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, release=1766032510, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, url=https://www.redhat.com, container_name=swift_proxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-swift-proxy-server, org.opencontainers.image.created=2026-01-12T22:50:51Z, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-swift-proxy-server-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, build-date=2026-01-12T22:50:51Z, config_id=tripleo_step4, distribution-scope=public) Feb 2 08:16:08 np0005604725 systemd-rc-local-generator[127680]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:08 np0005604725 systemd-sysv-generator[127684]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:08 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:08 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Deactivated successfully. Feb 2 08:16:08 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:16:08 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:16:08 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:16:08 np0005604725 systemd[1]: Starting nova_scheduler container... Feb 2 08:16:08 np0005604725 systemd[1]: Started nova_scheduler container. Feb 2 08:16:08 np0005604725 systemd[1]: tmp-crun.E7zf9W.mount: Deactivated successfully. Feb 2 08:16:08 np0005604725 podman[127700]: 2026-02-02 08:16:08.731668764 +0000 UTC m=+0.115912307 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=healthy, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, version=17.1.13, build-date=2026-01-12T23:31:50Z, config_id=tripleo_step4, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, name=rhosp-rhel9/openstack-nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, architecture=x86_64, com.redhat.component=openstack-nova-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=nova_api_cron, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.buildah.version=1.41.5, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, org.opencontainers.image.created=2026-01-12T23:31:50Z, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:16:08 np0005604725 podman[127700]: 2026-02-02 08:16:08.737714521 +0000 UTC m=+0.121958034 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, container_name=nova_api_cron, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, architecture=x86_64, config_id=tripleo_step4, version=17.1.13, url=https://www.redhat.com, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T23:31:50Z, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, name=rhosp-rhel9/openstack-nova-api, com.redhat.component=openstack-nova-api-container, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, release=1766032510) Feb 2 08:16:08 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:16:08 np0005604725 podman[127701]: 2026-02-02 08:16:08.791717192 +0000 UTC m=+0.178766711 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, io.buildah.version=1.41.5, version=17.1.13, config_id=tripleo_step4, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, name=rhosp-rhel9/openstack-nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=nova_metadata, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, build-date=2026-01-12T23:31:50Z, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, release=1766032510, distribution-scope=public, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T23:31:50Z, vcs-type=git, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:16:08 np0005604725 podman[127702]: 2026-02-02 08:16:08.742378534 +0000 UTC m=+0.124545582 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-nova-api, build-date=2026-01-12T23:31:50Z, architecture=x86_64, container_name=nova_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, config_id=tripleo_step4, vcs-type=git, description=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, tcib_managed=true, maintainer=OpenStack TripleO Team, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:31:50Z, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, managed_by=tripleo_ansible, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, vendor=Red Hat, Inc.) Feb 2 08:16:08 np0005604725 podman[127701]: 2026-02-02 08:16:08.8699918 +0000 UTC m=+0.257041259 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, container_name=nova_metadata, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step4, io.buildah.version=1.41.5, url=https://www.redhat.com, io.openshift.expose-services=, build-date=2026-01-12T23:31:50Z, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., release=1766032510, org.opencontainers.image.created=2026-01-12T23:31:50Z, tcib_managed=true, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, com.redhat.component=openstack-nova-api-container, name=rhosp-rhel9/openstack-nova-api, maintainer=OpenStack TripleO Team, distribution-scope=public, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible) Feb 2 08:16:08 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:16:08 np0005604725 podman[127702]: 2026-02-02 08:16:08.925110515 +0000 UTC m=+0.307277553 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, container_name=nova_api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T23:31:50Z, com.redhat.component=openstack-nova-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, distribution-scope=public, architecture=x86_64, vendor=Red Hat, Inc., managed_by=tripleo_ansible, release=1766032510, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.13, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-nova-api, build-date=2026-01-12T23:31:50Z, description=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git) Feb 2 08:16:08 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:16:09 np0005604725 python3[127820]: ansible-systemd Invoked with state=restarted name=tripleo_nova_vnc_proxy.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:09 np0005604725 systemd[1]: Reloading. Feb 2 08:16:09 np0005604725 systemd-rc-local-generator[127912]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:09 np0005604725 systemd-sysv-generator[127916]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:09 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:10 np0005604725 systemd[1]: Starting nova_vnc_proxy container... Feb 2 08:16:10 np0005604725 systemd[1]: Started nova_vnc_proxy container. Feb 2 08:16:11 np0005604725 python3[128051]: ansible-systemd Invoked with state=restarted name=tripleo_ovn_controller.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:11 np0005604725 systemd[1]: Reloading. Feb 2 08:16:11 np0005604725 systemd-rc-local-generator[128078]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:11 np0005604725 systemd-sysv-generator[128083]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:11 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:11 np0005604725 systemd[1]: Starting ovn_controller container... Feb 2 08:16:11 np0005604725 tripleo-start-podman-container[128158]: Creating additional drop-in dependency for "ovn_controller" (270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad) Feb 2 08:16:11 np0005604725 systemd[1]: Reloading. Feb 2 08:16:12 np0005604725 systemd-rc-local-generator[128235]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:12 np0005604725 systemd-sysv-generator[128238]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:12 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:12 np0005604725 systemd[1]: Started ovn_controller container. Feb 2 08:16:13 np0005604725 python3[128284]: ansible-systemd Invoked with state=restarted name=tripleo_placement_api.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:13 np0005604725 systemd[1]: Reloading. Feb 2 08:16:13 np0005604725 systemd-rc-local-generator[128304]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:13 np0005604725 systemd-sysv-generator[128317]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:13 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:13 np0005604725 systemd[1]: Starting placement_api container... Feb 2 08:16:13 np0005604725 systemd[1]: Started placement_api container. Feb 2 08:16:14 np0005604725 python3[128376]: ansible-systemd Invoked with state=restarted name=tripleo_swift_account_auditor.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:14 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:16:14 np0005604725 systemd[1]: Reloading. Feb 2 08:16:15 np0005604725 podman[128386]: 2026-02-02 08:16:14.993731159 +0000 UTC m=+0.107096627 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:10:15Z, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, name=rhosp-rhel9/openstack-collectd, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 collectd, io.openshift.expose-services=, version=17.1.13, batch=17.1_20260112.1, vendor=Red Hat, Inc., architecture=x86_64, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, managed_by=tripleo_ansible, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-collectd-container, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:10:15Z, summary=Red Hat OpenStack Platform 17.1 collectd) Feb 2 08:16:15 np0005604725 podman[128386]: 2026-02-02 08:16:15.028379214 +0000 UTC m=+0.141744712 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, maintainer=OpenStack TripleO Team, version=17.1.13, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, url=https://www.redhat.com, io.openshift.expose-services=, managed_by=tripleo_ansible, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-collectd-container, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, tcib_managed=true, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:15Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:15Z, description=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, name=rhosp-rhel9/openstack-collectd, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 collectd) Feb 2 08:16:15 np0005604725 systemd-rc-local-generator[128447]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:15 np0005604725 systemd-sysv-generator[128451]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:15 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:15 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:16:15 np0005604725 systemd[1]: Starting swift_account_auditor container... Feb 2 08:16:15 np0005604725 systemd[1]: Started swift_account_auditor container. Feb 2 08:16:16 np0005604725 python3[128552]: ansible-systemd Invoked with state=restarted name=tripleo_swift_account_reaper.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:16 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:16:16 np0005604725 systemd[1]: Reloading. Feb 2 08:16:16 np0005604725 podman[128554]: 2026-02-02 08:16:16.72167772 +0000 UTC m=+0.092602961 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., vcs-type=git, managed_by=tripleo_ansible, build-date=2026-01-12T22:34:41Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.buildah.version=1.41.5, config_id=tripleo_step3, release=1766032510, tcib_managed=true, url=https://www.redhat.com, container_name=horizon, summary=Red Hat OpenStack Platform 17.1 horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:41Z, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, com.redhat.component=openstack-horizon-container, distribution-scope=public, architecture=x86_64, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=) Feb 2 08:16:16 np0005604725 podman[128554]: 2026-02-02 08:16:16.761091452 +0000 UTC m=+0.132016703 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:34:41Z, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, vcs-type=git, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, com.redhat.component=openstack-horizon-container, build-date=2026-01-12T22:34:41Z, maintainer=OpenStack TripleO Team, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, container_name=horizon, io.openshift.expose-services=, version=17.1.13, description=Red Hat OpenStack Platform 17.1 horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 horizon, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, config_id=tripleo_step3, name=rhosp-rhel9/openstack-horizon) Feb 2 08:16:16 np0005604725 systemd-rc-local-generator[128614]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:16 np0005604725 systemd-sysv-generator[128617]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:16 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:17 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:16:17 np0005604725 systemd[1]: Starting swift_account_reaper container... Feb 2 08:16:17 np0005604725 systemd[1]: Started swift_account_reaper container. Feb 2 08:16:18 np0005604725 python3[128735]: ansible-systemd Invoked with state=restarted name=tripleo_swift_account_replicator.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:18 np0005604725 systemd[1]: Reloading. Feb 2 08:16:18 np0005604725 systemd-rc-local-generator[128760]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:18 np0005604725 systemd-sysv-generator[128763]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:18 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:19 np0005604725 systemd[1]: Starting swift_account_replicator container... Feb 2 08:16:19 np0005604725 systemd[1]: Started swift_account_replicator container. Feb 2 08:16:19 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:16:19 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:16:19 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:16:20 np0005604725 systemd[1]: tmp-crun.3f9FIP.mount: Deactivated successfully. Feb 2 08:16:20 np0005604725 podman[128839]: 2026-02-02 08:16:20.040332698 +0000 UTC m=+0.083014374 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, release=1766032510, name=rhosp-rhel9/openstack-keystone, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, tcib_managed=true, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.created=2026-01-12T22:33:53Z, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, architecture=x86_64, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=keystone_cron, io.openshift.expose-services=, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-keystone-container, build-date=2026-01-12T22:33:53Z, distribution-scope=public, config_id=tripleo_step3) Feb 2 08:16:20 np0005604725 podman[128839]: 2026-02-02 08:16:20.071555068 +0000 UTC m=+0.114236744 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, com.redhat.component=openstack-keystone-container, summary=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, config_id=tripleo_step3, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:33:53Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, tcib_managed=true, architecture=x86_64, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone_cron, batch=17.1_20260112.1, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.buildah.version=1.41.5, version=17.1.13, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, name=rhosp-rhel9/openstack-keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:33:53Z, vendor=Red Hat, Inc., url=https://www.redhat.com) Feb 2 08:16:20 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:16:20 np0005604725 podman[128840]: 2026-02-02 08:16:20.083786085 +0000 UTC m=+0.125016847 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, distribution-scope=public, tcib_managed=true, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.component=openstack-iscsid-container, vcs-ref=705339545363fec600102567c4e923938e0f43b3, container_name=iscsid, io.openshift.expose-services=, build-date=2026-01-12T22:34:43Z, maintainer=OpenStack TripleO Team, vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, url=https://www.redhat.com, version=17.1.13, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, name=rhosp-rhel9/openstack-iscsid, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, release=1766032510) Feb 2 08:16:20 np0005604725 podman[128840]: 2026-02-02 08:16:20.095463964 +0000 UTC m=+0.136694716 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, release=1766032510, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, container_name=iscsid, architecture=x86_64, distribution-scope=public, io.buildah.version=1.41.5, vcs-type=git, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., managed_by=tripleo_ansible, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, com.redhat.component=openstack-iscsid-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, summary=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_step3, url=https://www.redhat.com, build-date=2026-01-12T22:34:43Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:34:43Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid) Feb 2 08:16:20 np0005604725 podman[128837]: 2026-02-02 08:16:20.047403906 +0000 UTC m=+0.091457735 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, com.redhat.component=openstack-keystone-container, tcib_managed=true, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 keystone, summary=Red Hat OpenStack Platform 17.1 keystone, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T22:33:53Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., container_name=keystone, version=17.1.13, config_id=tripleo_step3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:33:53Z, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:16:20 np0005604725 podman[128837]: 2026-02-02 08:16:20.126035225 +0000 UTC m=+0.170089074 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, description=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, name=rhosp-rhel9/openstack-keystone, batch=17.1_20260112.1, version=17.1.13, container_name=keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.buildah.version=1.41.5, io.openshift.expose-services=, com.redhat.component=openstack-keystone-container, release=1766032510, build-date=2026-01-12T22:33:53Z, summary=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:33:53Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:16:20 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:16:20 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:16:20 np0005604725 python3[128838]: ansible-systemd Invoked with state=restarted name=tripleo_swift_account_server.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:20 np0005604725 systemd[1]: Reloading. Feb 2 08:16:20 np0005604725 systemd-rc-local-generator[128940]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:20 np0005604725 systemd-sysv-generator[128946]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:20 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:20 np0005604725 systemd[1]: Starting swift_account_server container... Feb 2 08:16:20 np0005604725 systemd[1]: Started swift_account_server container. Feb 2 08:16:22 np0005604725 python3[129058]: ansible-systemd Invoked with state=restarted name=tripleo_swift_container_auditor.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:22 np0005604725 systemd[1]: Reloading. Feb 2 08:16:22 np0005604725 systemd-rc-local-generator[129114]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:22 np0005604725 systemd-sysv-generator[129117]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:22 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:22 np0005604725 systemd[1]: Starting swift_container_auditor container... Feb 2 08:16:22 np0005604725 systemd[1]: Started swift_container_auditor container. Feb 2 08:16:23 np0005604725 python3[129288]: ansible-systemd Invoked with state=restarted name=tripleo_swift_container_replicator.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:23 np0005604725 systemd[1]: Reloading. Feb 2 08:16:24 np0005604725 systemd-rc-local-generator[129379]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:24 np0005604725 systemd-sysv-generator[129383]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:24 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:24 np0005604725 systemd[1]: Starting swift_container_replicator container... Feb 2 08:16:24 np0005604725 systemd[1]: Started swift_container_replicator container. Feb 2 08:16:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:16:25 np0005604725 systemd[1]: tmp-crun.V27rFp.mount: Deactivated successfully. Feb 2 08:16:25 np0005604725 podman[129458]: 2026-02-02 08:16:25.223309093 +0000 UTC m=+0.092909149 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, vcs-type=git, config_id=tripleo_step2, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, container_name=clustercheck, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:18Z, name=rhosp-rhel9/openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:18Z, com.redhat.component=openstack-mariadb-container, tcib_managed=true, io.openshift.expose-services=, architecture=x86_64, version=17.1.13, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team) Feb 2 08:16:25 np0005604725 podman[129458]: 2026-02-02 08:16:25.258597419 +0000 UTC m=+0.128197485 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, name=rhosp-rhel9/openstack-mariadb, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-mariadb-container, vcs-type=git, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, release=1766032510, tcib_managed=true, io.openshift.expose-services=, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step2, container_name=clustercheck, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, batch=17.1_20260112.1, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:18Z, maintainer=OpenStack TripleO Team) Feb 2 08:16:25 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:16:25 np0005604725 python3[129457]: ansible-systemd Invoked with state=restarted name=tripleo_swift_container_server.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:25 np0005604725 systemd[1]: Reloading. Feb 2 08:16:25 np0005604725 systemd-rc-local-generator[129623]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:25 np0005604725 systemd-sysv-generator[129626]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:25 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:16:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:16:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:16:25 np0005604725 systemd[1]: Starting swift_container_server container... Feb 2 08:16:25 np0005604725 podman[129640]: 2026-02-02 08:16:25.972665988 +0000 UTC m=+0.074981728 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=healthy, config_id=tripleo_step4, name=rhosp-rhel9/openstack-ceilometer-central, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, release=1766032510, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T23:07:24Z, vendor=Red Hat, Inc., com.redhat.component=openstack-ceilometer-central-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=ceilometer_agent_central, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, distribution-scope=public, managed_by=tripleo_ansible, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, batch=17.1_20260112.1, build-date=2026-01-12T23:07:24Z, description=Red Hat OpenStack Platform 17.1 ceilometer-central, architecture=x86_64, vcs-type=git) Feb 2 08:16:26 np0005604725 podman[129641]: 2026-02-02 08:16:26.016906319 +0000 UTC m=+0.117755373 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=healthy, com.redhat.component=openstack-cinder-scheduler-container, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, release=1766032510, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, url=https://www.redhat.com, name=rhosp-rhel9/openstack-cinder-scheduler, org.opencontainers.image.created=2026-01-12T22:58:47Z, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, tcib_managed=true, container_name=cinder_scheduler, managed_by=tripleo_ansible, vendor=Red Hat, Inc., build-date=2026-01-12T22:58:47Z, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, vcs-type=git, io.openshift.expose-services=, batch=17.1_20260112.1, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler) Feb 2 08:16:26 np0005604725 podman[129642]: 2026-02-02 08:16:26.00035084 +0000 UTC m=+0.095785699 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, batch=17.1_20260112.1, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, release=1766032510, io.buildah.version=1.41.5, build-date=2026-01-12T22:58:44Z, description=Red Hat OpenStack Platform 17.1 cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, url=https://www.redhat.com, com.redhat.component=openstack-cinder-api-container, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 cinder-api, architecture=x86_64, container_name=cinder_api_cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:58:44Z, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, vcs-type=git, vendor=Red Hat, Inc., tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:16:26 np0005604725 podman[129640]: 2026-02-02 08:16:26.052925627 +0000 UTC m=+0.155241337 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 ceilometer-central, architecture=x86_64, org.opencontainers.image.created=2026-01-12T23:07:24Z, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, io.openshift.expose-services=, build-date=2026-01-12T23:07:24Z, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, container_name=ceilometer_agent_central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, com.redhat.component=openstack-ceilometer-central-container, name=rhosp-rhel9/openstack-ceilometer-central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, batch=17.1_20260112.1, version=17.1.13, url=https://www.redhat.com, tcib_managed=true, vendor=Red Hat, Inc., release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public) Feb 2 08:16:26 np0005604725 systemd[1]: Started swift_container_server container. Feb 2 08:16:26 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:16:26 np0005604725 podman[129641]: 2026-02-02 08:16:26.076212384 +0000 UTC m=+0.177061488 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, container_name=cinder_scheduler, maintainer=OpenStack TripleO Team, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, managed_by=tripleo_ansible, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, release=1766032510, batch=17.1_20260112.1, io.openshift.expose-services=, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, architecture=x86_64, build-date=2026-01-12T22:58:47Z, org.opencontainers.image.created=2026-01-12T22:58:47Z, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, vcs-type=git, vendor=Red Hat, Inc., config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, com.redhat.component=openstack-cinder-scheduler-container, tcib_managed=true, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}) Feb 2 08:16:26 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:16:26 np0005604725 podman[129642]: 2026-02-02 08:16:26.135009853 +0000 UTC m=+0.230444732 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, distribution-scope=public, vendor=Red Hat, Inc., url=https://www.redhat.com, com.redhat.component=openstack-cinder-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:58:44Z, architecture=x86_64, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, build-date=2026-01-12T22:58:44Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 cinder-api, container_name=cinder_api_cron, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.expose-services=, managed_by=tripleo_ansible, tcib_managed=true, name=rhosp-rhel9/openstack-cinder-api) Feb 2 08:16:26 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:16:26 np0005604725 systemd[1]: tmp-crun.DuCSOq.mount: Deactivated successfully. Feb 2 08:16:26 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:16:27 np0005604725 systemd[1]: tmp-crun.DQFQI1.mount: Deactivated successfully. Feb 2 08:16:27 np0005604725 podman[129763]: 2026-02-02 08:16:27.091143118 +0000 UTC m=+0.121928411 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=healthy, io.buildah.version=1.41.5, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, com.redhat.component=openstack-ceilometer-notification-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, architecture=x86_64, url=https://www.redhat.com, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, vcs-type=git, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, name=rhosp-rhel9/openstack-ceilometer-notification, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, config_id=tripleo_step4, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, org.opencontainers.image.created=2026-01-12T23:07:25Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, vendor=Red Hat, Inc., build-date=2026-01-12T23:07:25Z, version=17.1.13, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, maintainer=OpenStack TripleO Team, container_name=ceilometer_agent_notification, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible) Feb 2 08:16:27 np0005604725 podman[129763]: 2026-02-02 08:16:27.143385936 +0000 UTC m=+0.174171229 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, batch=17.1_20260112.1, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.openshift.expose-services=, architecture=x86_64, vendor=Red Hat, Inc., distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, version=17.1.13, config_id=tripleo_step4, com.redhat.component=openstack-ceilometer-notification-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-ceilometer-notification, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, container_name=ceilometer_agent_notification, build-date=2026-01-12T23:07:25Z, org.opencontainers.image.created=2026-01-12T23:07:25Z, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, release=1766032510) Feb 2 08:16:27 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:16:27 np0005604725 python3[129764]: ansible-systemd Invoked with state=restarted name=tripleo_swift_container_updater.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:27 np0005604725 systemd[1]: Reloading. Feb 2 08:16:27 np0005604725 systemd-rc-local-generator[129881]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:27 np0005604725 systemd-sysv-generator[129886]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:27 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:16:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:16:27 np0005604725 systemd[1]: Starting swift_container_updater container... Feb 2 08:16:27 np0005604725 podman[129894]: 2026-02-02 08:16:27.838258674 +0000 UTC m=+0.058141950 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=healthy, release=1766032510, name=rhosp-rhel9/openstack-heat-engine, container_name=heat_engine, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 heat-engine, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, vcs-type=git, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, com.redhat.component=openstack-heat-engine-container, config_id=tripleo_step4, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:53:38Z, vcs-ref=755001522886c265e88561b4997cab642504a845, url=https://www.redhat.com, version=17.1.13, description=Red Hat OpenStack Platform 17.1 heat-engine, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.buildah.version=1.41.5, build-date=2026-01-12T22:53:38Z, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:16:27 np0005604725 podman[129893]: 2026-02-02 08:16:27.885769985 +0000 UTC m=+0.104905029 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, description=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp-rhel9/openstack-heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, com.redhat.component=openstack-heat-api-container, summary=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, version=17.1.13, batch=17.1_20260112.1, managed_by=tripleo_ansible, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:53:19Z, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.openshift.expose-services=, tcib_managed=true, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, container_name=heat_api_cron, io.buildah.version=1.41.5, vcs-ref=755001522886c265e88561b4997cab642504a845, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., build-date=2026-01-12T22:53:19Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, config_id=tripleo_step4, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api) Feb 2 08:16:27 np0005604725 podman[129893]: 2026-02-02 08:16:27.893116611 +0000 UTC m=+0.112251675 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, distribution-scope=public, name=rhosp-rhel9/openstack-heat-api, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., url=https://www.redhat.com, batch=17.1_20260112.1, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:53:19Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=heat_api_cron, version=17.1.13, vcs-ref=755001522886c265e88561b4997cab642504a845, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-type=git, io.buildah.version=1.41.5, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:53:19Z, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, com.redhat.component=openstack-heat-api-container, summary=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_step4) Feb 2 08:16:27 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:16:27 np0005604725 podman[129894]: 2026-02-02 08:16:27.913067604 +0000 UTC m=+0.132950880 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, batch=17.1_20260112.1, build-date=2026-01-12T22:53:38Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 heat-engine, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, url=https://www.redhat.com, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, org.opencontainers.image.created=2026-01-12T22:53:38Z, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, io.openshift.expose-services=, tcib_managed=true, vcs-ref=755001522886c265e88561b4997cab642504a845, name=rhosp-rhel9/openstack-heat-engine, description=Red Hat OpenStack Platform 17.1 heat-engine, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, com.redhat.component=openstack-heat-engine-container, vendor=Red Hat, Inc., vcs-type=git, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=heat_engine, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, architecture=x86_64) Feb 2 08:16:27 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:16:27 np0005604725 systemd[1]: Started swift_container_updater container. Feb 2 08:16:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:16:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:16:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:16:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:16:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:16:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:16:28 np0005604725 systemd[1]: tmp-crun.33R7r9.mount: Deactivated successfully. Feb 2 08:16:28 np0005604725 podman[129989]: 2026-02-02 08:16:28.805779809 +0000 UTC m=+0.084276663 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, managed_by=tripleo_ansible, config_id=tripleo_step4, name=rhosp-rhel9/openstack-cron, org.opencontainers.image.created=2026-01-12T22:10:15Z, description=Red Hat OpenStack Platform 17.1 cron, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, vcs-type=git, build-date=2026-01-12T22:10:15Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, io.buildah.version=1.41.5, tcib_managed=true, container_name=logrotate_crond, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, io.openshift.expose-services=, com.redhat.component=openstack-cron-container, release=1766032510, summary=Red Hat OpenStack Platform 17.1 cron) Feb 2 08:16:28 np0005604725 podman[129989]: 2026-02-02 08:16:28.817161339 +0000 UTC m=+0.095658193 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, summary=Red Hat OpenStack Platform 17.1 cron, io.buildah.version=1.41.5, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, vendor=Red Hat, Inc., batch=17.1_20260112.1, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:15Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-cron-container, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 cron, tcib_managed=true, config_id=tripleo_step4, architecture=x86_64, build-date=2026-01-12T22:10:15Z, container_name=logrotate_crond, name=rhosp-rhel9/openstack-cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, vcs-type=git, io.openshift.expose-services=, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:16:28 np0005604725 podman[129987]: 2026-02-02 08:16:28.82658942 +0000 UTC m=+0.112547494 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, vcs-type=git, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:58:44Z, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, url=https://www.redhat.com, io.buildah.version=1.41.5, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, com.redhat.component=openstack-cinder-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, build-date=2026-01-12T22:58:44Z, config_id=tripleo_step4, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, distribution-scope=public, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, release=1766032510, architecture=x86_64, container_name=cinder_api, description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e) Feb 2 08:16:28 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:16:28 np0005604725 podman[129999]: 2026-02-02 08:16:28.916790815 +0000 UTC m=+0.181996420 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=healthy, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, description=Red Hat OpenStack Platform 17.1 manila-api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:52:22Z, build-date=2026-01-12T22:52:22Z, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, vendor=Red Hat, Inc., com.redhat.component=openstack-manila-api-container, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, io.buildah.version=1.41.5, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, distribution-scope=public, name=rhosp-rhel9/openstack-manila-api, io.openshift.expose-services=, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, architecture=x86_64, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, container_name=manila_api_cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13) Feb 2 08:16:28 np0005604725 podman[129988]: 2026-02-02 08:16:28.869402377 +0000 UTC m=+0.151816831 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, org.opencontainers.image.created=2026-01-12T22:53:19Z, com.redhat.component=openstack-heat-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, build-date=2026-01-12T22:53:19Z, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, version=17.1.13, batch=17.1_20260112.1, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, container_name=heat_api, config_id=tripleo_step4, tcib_managed=true, io.buildah.version=1.41.5, vendor=Red Hat, Inc., distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-heat-api) Feb 2 08:16:28 np0005604725 podman[129999]: 2026-02-02 08:16:28.927860606 +0000 UTC m=+0.193066231 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.component=openstack-manila-api-container, container_name=manila_api_cron, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, build-date=2026-01-12T22:52:22Z, distribution-scope=public, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, architecture=x86_64, config_id=tripleo_step4, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, tcib_managed=true, managed_by=tripleo_ansible, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, name=rhosp-rhel9/openstack-manila-api, version=17.1.13, description=Red Hat OpenStack Platform 17.1 manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:52:22Z, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 manila-api) Feb 2 08:16:28 np0005604725 podman[130003]: 2026-02-02 08:16:28.878744454 +0000 UTC m=+0.149095988 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, distribution-scope=public, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, release=1766032510, com.redhat.component=openstack-heat-api-cfn-container, container_name=heat_api_cfn, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., vcs-ref=755001522886c265e88561b4997cab642504a845, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, version=17.1.13, io.openshift.expose-services=, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-type=git, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_id=tripleo_step4, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:54:02Z, build-date=2026-01-12T22:54:02Z, name=rhosp-rhel9/openstack-heat-api-cfn) Feb 2 08:16:28 np0005604725 podman[129987]: 2026-02-02 08:16:28.933297823 +0000 UTC m=+0.219255887 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, build-date=2026-01-12T22:58:44Z, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.expose-services=, com.redhat.component=openstack-cinder-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, io.buildah.version=1.41.5, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, config_id=tripleo_step4, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, vcs-type=git, architecture=x86_64, name=rhosp-rhel9/openstack-cinder-api, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=cinder_api, managed_by=tripleo_ansible, tcib_managed=true) Feb 2 08:16:28 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:16:28 np0005604725 podman[130008]: 2026-02-02 08:16:28.899755271 +0000 UTC m=+0.161421698 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=healthy, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=manila_scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-manila-scheduler, vendor=Red Hat, Inc., io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, release=1766032510, build-date=2026-01-12T22:52:54Z, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, managed_by=tripleo_ansible, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, com.redhat.component=openstack-manila-scheduler-container, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, description=Red Hat OpenStack Platform 17.1 manila-scheduler, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:52:54Z, tcib_managed=true) Feb 2 08:16:28 np0005604725 podman[129988]: 2026-02-02 08:16:28.969777465 +0000 UTC m=+0.252191909 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, org.opencontainers.image.created=2026-01-12T22:53:19Z, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-heat-api, com.redhat.component=openstack-heat-api-container, container_name=heat_api, tcib_managed=true, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, distribution-scope=public, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, batch=17.1_20260112.1, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:53:19Z, release=1766032510, vcs-type=git) Feb 2 08:16:28 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:16:28 np0005604725 python3[129986]: ansible-systemd Invoked with state=restarted name=tripleo_swift_object_auditor.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:28 np0005604725 podman[130003]: 2026-02-02 08:16:28.990377149 +0000 UTC m=+0.260728713 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, container_name=heat_api_cfn, url=https://www.redhat.com, vcs-ref=755001522886c265e88561b4997cab642504a845, vcs-type=git, com.redhat.component=openstack-heat-api-cfn-container, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:54:02Z, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, io.buildah.version=1.41.5, architecture=x86_64, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, tcib_managed=true, batch=17.1_20260112.1, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, distribution-scope=public, build-date=2026-01-12T22:54:02Z, name=rhosp-rhel9/openstack-heat-api-cfn) Feb 2 08:16:28 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:16:29 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:16:29 np0005604725 systemd[1]: Reloading. Feb 2 08:16:29 np0005604725 podman[130008]: 2026-02-02 08:16:29.034083394 +0000 UTC m=+0.295749901 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-manila-scheduler-container, description=Red Hat OpenStack Platform 17.1 manila-scheduler, url=https://www.redhat.com, architecture=x86_64, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:52:54Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, batch=17.1_20260112.1, tcib_managed=true, version=17.1.13, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:52:54Z, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, name=rhosp-rhel9/openstack-manila-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.openshift.expose-services=, container_name=manila_scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler) Feb 2 08:16:29 np0005604725 systemd-rc-local-generator[130149]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:29 np0005604725 systemd-sysv-generator[130156]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:29 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:29 np0005604725 systemd[1]: tmp-crun.s57iwY.mount: Deactivated successfully. Feb 2 08:16:29 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:16:29 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:16:29 np0005604725 systemd[1]: Starting swift_object_auditor container... Feb 2 08:16:29 np0005604725 systemd[1]: Started swift_object_auditor container. Feb 2 08:16:29 np0005604725 podman[130185]: 2026-02-02 08:16:29.726863507 +0000 UTC m=+0.144160057 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=healthy, container_name=neutron_api, build-date=2026-01-12T22:57:35Z, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-neutron-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 neutron-server, release=1766032510, config_id=tripleo_step4, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, architecture=x86_64, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 neutron-server, batch=17.1_20260112.1, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, com.redhat.component=openstack-neutron-server-container, org.opencontainers.image.created=2026-01-12T22:57:35Z, tcib_managed=true, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, managed_by=tripleo_ansible, vcs-type=git, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:16:29 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:16:29 np0005604725 podman[130218]: 2026-02-02 08:16:29.911995012 +0000 UTC m=+0.062749441 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=healthy, build-date=2026-01-12T23:32:18Z, io.openshift.expose-services=, name=rhosp-rhel9/openstack-nova-conductor, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T23:32:18Z, com.redhat.component=openstack-nova-conductor-container, batch=17.1_20260112.1, architecture=x86_64, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 nova-conductor, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, distribution-scope=public, version=17.1.13, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, container_name=nova_conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.buildah.version=1.41.5) Feb 2 08:16:29 np0005604725 podman[130218]: 2026-02-02 08:16:29.934446283 +0000 UTC m=+0.085200682 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, container_name=nova_conductor, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-conductor, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T23:32:18Z, com.redhat.component=openstack-nova-conductor-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, architecture=x86_64, tcib_managed=true, version=17.1.13, build-date=2026-01-12T23:32:18Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-nova-conductor, url=https://www.redhat.com, vcs-type=git, vendor=Red Hat, Inc., batch=17.1_20260112.1, release=1766032510, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor) Feb 2 08:16:29 np0005604725 podman[130185]: 2026-02-02 08:16:29.94310946 +0000 UTC m=+0.360405980 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, vendor=Red Hat, Inc., vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, managed_by=tripleo_ansible, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, com.redhat.component=openstack-neutron-server-container, url=https://www.redhat.com, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 neutron-server, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=neutron_api, io.openshift.expose-services=, release=1766032510, config_id=tripleo_step4, build-date=2026-01-12T22:57:35Z, tcib_managed=true, name=rhosp-rhel9/openstack-neutron-server, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f) Feb 2 08:16:29 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:16:29 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:16:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:16:30 np0005604725 podman[130255]: 2026-02-02 08:16:30.380374842 +0000 UTC m=+0.120444946 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=healthy, managed_by=tripleo_ansible, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, config_id=tripleo_step4, io.openshift.expose-services=, release=1766032510, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, container_name=nova_scheduler, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, name=rhosp-rhel9/openstack-nova-scheduler, url=https://www.redhat.com, com.redhat.component=openstack-nova-scheduler-container, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, build-date=2026-01-12T23:32:05Z, org.opencontainers.image.created=2026-01-12T23:32:05Z, vendor=Red Hat, Inc., distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, description=Red Hat OpenStack Platform 17.1 nova-scheduler, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:16:30 np0005604725 podman[130255]: 2026-02-02 08:16:30.404644129 +0000 UTC m=+0.144714233 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, io.openshift.expose-services=, tcib_managed=true, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:32:05Z, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-scheduler, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, vcs-type=git, com.redhat.component=openstack-nova-scheduler-container, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.created=2026-01-12T23:32:05Z, name=rhosp-rhel9/openstack-nova-scheduler, version=17.1.13, container_name=nova_scheduler, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 nova-scheduler, release=1766032510, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, config_id=tripleo_step4, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler) Feb 2 08:16:30 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:16:30 np0005604725 python3[130305]: ansible-systemd Invoked with state=restarted name=tripleo_swift_object_expirer.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:30 np0005604725 systemd[1]: Reloading. Feb 2 08:16:30 np0005604725 systemd-rc-local-generator[130340]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:30 np0005604725 systemd-sysv-generator[130343]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:31 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:31 np0005604725 systemd[1]: Starting swift_object_expirer container... Feb 2 08:16:31 np0005604725 systemd[1]: Started swift_object_expirer container. Feb 2 08:16:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:16:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:16:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:16:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:16:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:16:32 np0005604725 podman[130464]: 2026-02-02 08:16:32.288413353 +0000 UTC m=+0.075554965 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, summary=Red Hat OpenStack Platform 17.1 swift-container, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-swift-container, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-container-container, description=Red Hat OpenStack Platform 17.1 swift-container, url=https://www.redhat.com, architecture=x86_64, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, version=17.1.13, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, io.buildah.version=1.41.5, io.openshift.expose-services=, container_name=swift_container_server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:57Z, distribution-scope=public) Feb 2 08:16:32 np0005604725 systemd[1]: tmp-crun.Anr0r3.mount: Deactivated successfully. Feb 2 08:16:32 np0005604725 podman[130473]: 2026-02-02 08:16:32.403348519 +0000 UTC m=+0.179229955 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, com.redhat.component=openstack-nova-novncproxy-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, maintainer=OpenStack TripleO Team, container_name=nova_vnc_proxy, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., io.buildah.version=1.41.5, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step4, vcs-type=git, tcib_managed=true, io.openshift.expose-services=, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-nova-novncproxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, architecture=x86_64, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1, build-date=2026-01-12T23:32:22Z, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy) Feb 2 08:16:32 np0005604725 podman[130470]: 2026-02-02 08:16:32.455962198 +0000 UTC m=+0.236777885 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=healthy, description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.component=openstack-swift-account-container, tcib_managed=true, architecture=x86_64, batch=17.1_20260112.1, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, container_name=swift_account_replicator, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:50:44Z, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-swift-account, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, org.opencontainers.image.created=2026-01-12T22:50:44Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.openshift.expose-services=, url=https://www.redhat.com) Feb 2 08:16:32 np0005604725 python3[130463]: ansible-systemd Invoked with state=restarted name=tripleo_swift_object_replicator.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:32 np0005604725 podman[130484]: 2026-02-02 08:16:32.524834378 +0000 UTC m=+0.297022249 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, managed_by=tripleo_ansible, version=17.1.13, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, build-date=2026-01-12T22:50:44Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, name=rhosp-rhel9/openstack-swift-account, com.redhat.component=openstack-swift-account-container, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, tcib_managed=true, vendor=Red Hat, Inc., io.buildah.version=1.41.5, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_account_server, vcs-type=git, config_id=tripleo_step4, release=1766032510, url=https://www.redhat.com, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:16:32 np0005604725 systemd[1]: Reloading. Feb 2 08:16:32 np0005604725 podman[130464]: 2026-02-02 08:16:32.545620727 +0000 UTC m=+0.332762319 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:50:57Z, io.openshift.expose-services=, batch=17.1_20260112.1, version=17.1.13, vcs-type=git, vendor=Red Hat, Inc., config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, url=https://www.redhat.com, container_name=swift_container_server, com.redhat.component=openstack-swift-container-container, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:57Z, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, distribution-scope=public, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, description=Red Hat OpenStack Platform 17.1 swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container) Feb 2 08:16:32 np0005604725 podman[130470]: 2026-02-02 08:16:32.565970993 +0000 UTC m=+0.346786640 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-account, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, container_name=swift_account_replicator, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:50:44Z, io.openshift.expose-services=, managed_by=tripleo_ansible, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-account, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, url=https://www.redhat.com, com.redhat.component=openstack-swift-account-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, vendor=Red Hat, Inc., io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:50:44Z, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, version=17.1.13, description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64) Feb 2 08:16:32 np0005604725 podman[130465]: 2026-02-02 08:16:32.377475414 +0000 UTC m=+0.159658033 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=healthy, config_id=tripleo_step4, architecture=x86_64, io.buildah.version=1.41.5, vcs-type=git, url=https://www.redhat.com, container_name=swift_container_replicator, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-container, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, io.openshift.expose-services=, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-swift-container, vendor=Red Hat, Inc., batch=17.1_20260112.1, com.redhat.component=openstack-swift-container-container, tcib_managed=true, release=1766032510, build-date=2026-01-12T22:50:57Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:57Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-container) Feb 2 08:16:32 np0005604725 podman[130465]: 2026-02-02 08:16:32.608812701 +0000 UTC m=+0.390995310 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, managed_by=tripleo_ansible, batch=17.1_20260112.1, config_id=tripleo_step4, io.openshift.expose-services=, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_container_replicator, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, tcib_managed=true, build-date=2026-01-12T22:50:57Z, name=rhosp-rhel9/openstack-swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, distribution-scope=public, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, url=https://www.redhat.com, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-container-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5) Feb 2 08:16:32 np0005604725 systemd-rc-local-generator[130638]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:32 np0005604725 systemd-sysv-generator[130645]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:32 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:32 np0005604725 podman[130484]: 2026-02-02 08:16:32.734813178 +0000 UTC m=+0.507001059 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, tcib_managed=true, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, container_name=swift_account_server, io.buildah.version=1.41.5, build-date=2026-01-12T22:50:44Z, com.redhat.component=openstack-swift-account-container, vendor=Red Hat, Inc., version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-swift-account, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, summary=Red Hat OpenStack Platform 17.1 swift-account, architecture=x86_64, distribution-scope=public, config_id=tripleo_step4, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:50:44Z, description=Red Hat OpenStack Platform 17.1 swift-account, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account) Feb 2 08:16:32 np0005604725 podman[130473]: 2026-02-02 08:16:32.76934744 +0000 UTC m=+0.545228856 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, config_id=tripleo_step4, url=https://www.redhat.com, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, distribution-scope=public, tcib_managed=true, vendor=Red Hat, Inc., io.openshift.expose-services=, com.redhat.component=openstack-nova-novncproxy-container, managed_by=tripleo_ansible, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T23:32:22Z, container_name=nova_vnc_proxy, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, architecture=x86_64, release=1766032510, name=rhosp-rhel9/openstack-nova-novncproxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, io.buildah.version=1.41.5) Feb 2 08:16:33 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Deactivated successfully. Feb 2 08:16:33 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Deactivated successfully. Feb 2 08:16:33 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:16:33 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Deactivated successfully. Feb 2 08:16:33 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Deactivated successfully. Feb 2 08:16:33 np0005604725 systemd[1]: Starting swift_object_replicator container... Feb 2 08:16:33 np0005604725 systemd[1]: Started swift_object_replicator container. Feb 2 08:16:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:16:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:16:33 np0005604725 podman[130709]: 2026-02-02 08:16:33.844324352 +0000 UTC m=+0.083989865 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., build-date=2026-01-12T22:50:56Z, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, tcib_managed=true, container_name=swift_object_server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.created=2026-01-12T22:50:56Z, com.redhat.component=openstack-swift-object-container, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, version=17.1.13, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, architecture=x86_64, release=1766032510, description=Red Hat OpenStack Platform 17.1 swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, config_id=tripleo_step4, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:16:33 np0005604725 podman[130711]: 2026-02-02 08:16:33.89431403 +0000 UTC m=+0.131321501 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-swift-object, tcib_managed=true, distribution-scope=public, vendor=Red Hat, Inc., version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, vcs-type=git, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:50:56Z, managed_by=tripleo_ansible, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, architecture=x86_64, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:50:56Z, config_id=tripleo_step4, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=swift_object_replicator, url=https://www.redhat.com) Feb 2 08:16:34 np0005604725 podman[130711]: 2026-02-02 08:16:34.009927847 +0000 UTC m=+0.246935318 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:56Z, container_name=swift_object_replicator, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-swift-object-container, org.opencontainers.image.created=2026-01-12T22:50:56Z, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-object, version=17.1.13, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, tcib_managed=true, config_id=tripleo_step4) Feb 2 08:16:34 np0005604725 python3[130710]: ansible-systemd Invoked with state=restarted name=tripleo_swift_object_server.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:34 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Deactivated successfully. Feb 2 08:16:34 np0005604725 podman[130709]: 2026-02-02 08:16:34.053847397 +0000 UTC m=+0.293512920 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, org.opencontainers.image.created=2026-01-12T22:50:56Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=swift_object_server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-swift-object, version=17.1.13, config_id=tripleo_step4, release=1766032510, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, managed_by=tripleo_ansible, com.redhat.component=openstack-swift-object-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., build-date=2026-01-12T22:50:56Z, io.buildah.version=1.41.5, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, vcs-type=git) Feb 2 08:16:34 np0005604725 systemd[1]: Reloading. Feb 2 08:16:34 np0005604725 systemd-sysv-generator[130793]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:34 np0005604725 systemd-rc-local-generator[130790]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:34 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:34 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Deactivated successfully. Feb 2 08:16:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:16:34 np0005604725 systemd[1]: Starting swift_object_server container... Feb 2 08:16:34 np0005604725 systemd[1]: Started swift_object_server container. Feb 2 08:16:34 np0005604725 podman[130829]: 2026-02-02 08:16:34.643670864 +0000 UTC m=+0.071796150 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:34:06Z, version=17.1.13, io.buildah.version=1.41.5, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, build-date=2026-01-12T22:34:06Z, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 ovn-northd, name=rhosp-rhel9/openstack-ovn-northd, vendor=Red Hat, Inc., container_name=ovn_cluster_northd, summary=Red Hat OpenStack Platform 17.1 ovn-northd, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, io.openshift.expose-services=, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, vcs-type=git, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, config_id=ovn_cluster_northd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, maintainer=OpenStack TripleO Team, tcib_managed=true, com.redhat.component=openstack-ovn-northd-container, distribution-scope=public, batch=17.1_20260112.1) Feb 2 08:16:34 np0005604725 podman[130829]: 2026-02-02 08:16:34.655172368 +0000 UTC m=+0.083297664 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:06Z, container_name=ovn_cluster_northd, name=rhosp-rhel9/openstack-ovn-northd, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, com.redhat.component=openstack-ovn-northd-container, config_id=ovn_cluster_northd, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 ovn-northd, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 ovn-northd, release=1766032510, vcs-type=git, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, vendor=Red Hat, Inc., tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:34:06Z, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:16:34 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:16:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:16:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:16:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:16:35 np0005604725 podman[130893]: 2026-02-02 08:16:35.332667011 +0000 UTC m=+0.081337503 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=healthy, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, com.redhat.component=openstack-swift-object-container, container_name=swift_rsync, build-date=2026-01-12T22:50:56Z, io.buildah.version=1.41.5, tcib_managed=true, name=rhosp-rhel9/openstack-swift-object, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.openshift.expose-services=, vcs-type=git, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, version=17.1.13, batch=17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z) Feb 2 08:16:35 np0005604725 podman[130889]: 2026-02-02 08:16:35.311007305 +0000 UTC m=+0.063953629 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=healthy, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:36:40Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, com.redhat.component=openstack-ovn-controller-container, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, io.buildah.version=1.41.5, release=1766032510, build-date=2026-01-12T22:36:40Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 ovn-controller, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, vendor=Red Hat, Inc., io.openshift.expose-services=, name=rhosp-rhel9/openstack-ovn-controller, vcs-type=git, architecture=x86_64, version=17.1.13, config_id=tripleo_step4, distribution-scope=public, maintainer=OpenStack TripleO Team, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=ovn_controller, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller) Feb 2 08:16:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:16:35 np0005604725 podman[130894]: 2026-02-02 08:16:35.387979603 +0000 UTC m=+0.138275275 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-placement-api, tcib_managed=true, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:34:35Z, description=Red Hat OpenStack Platform 17.1 placement-api, architecture=x86_64, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:34:35Z, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-type=git, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-placement-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, release=1766032510, container_name=placement_api, summary=Red Hat OpenStack Platform 17.1 placement-api) Feb 2 08:16:35 np0005604725 podman[130889]: 2026-02-02 08:16:35.396889277 +0000 UTC m=+0.149835631 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, distribution-scope=public, container_name=ovn_controller, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, url=https://www.redhat.com, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, managed_by=tripleo_ansible, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 ovn-controller, summary=Red Hat OpenStack Platform 17.1 ovn-controller, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, org.opencontainers.image.created=2026-01-12T22:36:40Z, name=rhosp-rhel9/openstack-ovn-controller, vcs-type=git, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:36:40Z, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, release=1766032510, com.redhat.component=openstack-ovn-controller-container, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, batch=17.1_20260112.1) Feb 2 08:16:35 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Deactivated successfully. Feb 2 08:16:35 np0005604725 podman[130989]: 2026-02-02 08:16:35.449982351 +0000 UTC m=+0.062997120 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, version=17.1.13, distribution-scope=public, com.redhat.component=openstack-memcached-container, vcs-type=git, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:12:26Z, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, summary=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:12:26Z, name=rhosp-rhel9/openstack-memcached, release=1766032510, io.buildah.version=1.41.5, container_name=memcached, managed_by=tripleo_ansible, tcib_managed=true, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:16:35 np0005604725 podman[130989]: 2026-02-02 08:16:35.46685183 +0000 UTC m=+0.079866619 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, io.buildah.version=1.41.5, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, distribution-scope=public, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, container_name=memcached, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, build-date=2026-01-12T22:12:26Z, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step1, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, summary=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, org.opencontainers.image.created=2026-01-12T22:12:26Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, vcs-type=git, description=Red Hat OpenStack Platform 17.1 memcached) Feb 2 08:16:35 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:16:35 np0005604725 podman[130894]: 2026-02-02 08:16:35.489917529 +0000 UTC m=+0.240213181 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, org.opencontainers.image.created=2026-01-12T22:34:35Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, version=17.1.13, name=rhosp-rhel9/openstack-placement-api, build-date=2026-01-12T22:34:35Z, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, release=1766032510, architecture=x86_64, distribution-scope=public, maintainer=OpenStack TripleO Team, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 placement-api, container_name=placement_api, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.expose-services=, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-placement-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:16:35 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:16:35 np0005604725 python3[130990]: ansible-systemd Invoked with state=restarted name=tripleo_swift_object_updater.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:16:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:16:35 np0005604725 systemd[1]: Reloading. Feb 2 08:16:35 np0005604725 podman[131042]: 2026-02-02 08:16:35.733913515 +0000 UTC m=+0.082839719 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, container_name=metrics_qdr, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:14Z, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, name=rhosp-rhel9/openstack-qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2026-01-12T22:10:14Z, com.redhat.component=openstack-qdrouterd-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, version=17.1.13) Feb 2 08:16:35 np0005604725 podman[131048]: 2026-02-02 08:16:35.776677741 +0000 UTC m=+0.110506900 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=healthy, org.opencontainers.image.created=2026-01-12T22:34:42Z, batch=17.1_20260112.1, distribution-scope=public, architecture=x86_64, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-glance-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, config_id=tripleo_step4, container_name=glance_api_cron, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, build-date=2026-01-12T22:34:42Z, description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, name=rhosp-rhel9/openstack-glance-api) Feb 2 08:16:35 np0005604725 podman[131048]: 2026-02-02 08:16:35.784804781 +0000 UTC m=+0.118633920 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, build-date=2026-01-12T22:34:42Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step4, distribution-scope=public, io.openshift.expose-services=, container_name=glance_api_cron, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:34:42Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-glance-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, name=rhosp-rhel9/openstack-glance-api, vendor=Red Hat, Inc.) Feb 2 08:16:35 np0005604725 podman[130893]: 2026-02-02 08:16:35.806967753 +0000 UTC m=+0.555638245 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:56Z, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, release=1766032510, version=17.1.13, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, vcs-type=git, description=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64, container_name=swift_rsync, managed_by=tripleo_ansible, url=https://www.redhat.com, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, name=rhosp-rhel9/openstack-swift-object, com.redhat.component=openstack-swift-object-container, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:16:35 np0005604725 systemd-rc-local-generator[131107]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:35 np0005604725 systemd-sysv-generator[131114]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:35 np0005604725 podman[131042]: 2026-02-02 08:16:35.898891551 +0000 UTC m=+0.247817785 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vendor=Red Hat, Inc., io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:14Z, distribution-scope=public, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, description=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, config_id=tripleo_step1, container_name=metrics_qdr, architecture=x86_64, io.openshift.expose-services=, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, version=17.1.13, build-date=2026-01-12T22:10:14Z, name=rhosp-rhel9/openstack-qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-qdrouterd-container) Feb 2 08:16:35 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:36 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:16:36 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:16:36 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:16:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:16:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:16:36 np0005604725 systemd[1]: Starting swift_object_updater container... Feb 2 08:16:36 np0005604725 podman[131127]: 2026-02-02 08:16:36.28758069 +0000 UTC m=+0.059440810 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=healthy, architecture=x86_64, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:42Z, url=https://www.redhat.com, batch=17.1_20260112.1, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp-rhel9/openstack-glance-api, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, release=1766032510, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=glance_api_internal, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:34:42Z, vendor=Red Hat, Inc., org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-glance-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}) Feb 2 08:16:36 np0005604725 systemd[1]: Started swift_object_updater container. Feb 2 08:16:36 np0005604725 podman[131128]: 2026-02-02 08:16:36.389594178 +0000 UTC m=+0.160289213 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=healthy, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, release=1766032510, build-date=2026-01-12T22:34:42Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, config_id=tripleo_step4, name=rhosp-rhel9/openstack-glance-api, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, url=https://www.redhat.com, container_name=glance_api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:34:42Z, io.buildah.version=1.41.5, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, com.redhat.component=openstack-glance-api-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:16:36 np0005604725 podman[131127]: 2026-02-02 08:16:36.465040409 +0000 UTC m=+0.236900579 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, container_name=glance_api_internal, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, name=rhosp-rhel9/openstack-glance-api, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20260112.1, com.redhat.component=openstack-glance-api-container, distribution-scope=public, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:34:42Z, architecture=x86_64, managed_by=tripleo_ansible, release=1766032510, version=17.1.13, build-date=2026-01-12T22:34:42Z, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, url=https://www.redhat.com) Feb 2 08:16:36 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Deactivated successfully. Feb 2 08:16:36 np0005604725 podman[131128]: 2026-02-02 08:16:36.62501323 +0000 UTC m=+0.395708235 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, vendor=Red Hat, Inc., container_name=glance_api, release=1766032510, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:42Z, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-glance-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, managed_by=tripleo_ansible, tcib_managed=true, io.openshift.expose-services=, version=17.1.13, distribution-scope=public, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, name=rhosp-rhel9/openstack-glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:16:36 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Deactivated successfully. Feb 2 08:16:37 np0005604725 python3[131277]: ansible-systemd Invoked with state=restarted name=tripleo_swift_proxy.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:37 np0005604725 systemd[1]: Reloading. Feb 2 08:16:37 np0005604725 systemd-rc-local-generator[131353]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:37 np0005604725 systemd-sysv-generator[131356]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:37 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:37 np0005604725 systemd[1]: Starting swift_proxy container... Feb 2 08:16:38 np0005604725 systemd[1]: Started swift_proxy container. Feb 2 08:16:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:16:38 np0005604725 systemd[1]: tmp-crun.fH10MS.mount: Deactivated successfully. Feb 2 08:16:38 np0005604725 podman[131494]: 2026-02-02 08:16:38.73324272 +0000 UTC m=+0.071251913 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=healthy, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:50:51Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_id=tripleo_step4, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-swift-proxy-server, release=1766032510, distribution-scope=public, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, build-date=2026-01-12T22:50:51Z, url=https://www.redhat.com, container_name=swift_proxy, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server) Feb 2 08:16:38 np0005604725 python3[131493]: ansible-systemd Invoked with state=restarted name=tripleo_swift_proxy_tls_proxy.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:16:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:16:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:16:38 np0005604725 podman[131494]: 2026-02-02 08:16:38.975294857 +0000 UTC m=+0.313304080 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=swift_proxy, build-date=2026-01-12T22:50:51Z, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp-rhel9/openstack-swift-proxy-server, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, com.redhat.component=openstack-swift-proxy-server-container, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:51Z, url=https://www.redhat.com, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, distribution-scope=public, release=1766032510, batch=17.1_20260112.1, managed_by=tripleo_ansible, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:16:38 np0005604725 systemd[1]: Reloading. Feb 2 08:16:39 np0005604725 podman[131590]: 2026-02-02 08:16:39.072607851 +0000 UTC m=+0.116745313 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T23:31:50Z, com.redhat.component=openstack-nova-api-container, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-nova-api, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=nova_api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., build-date=2026-01-12T23:31:50Z, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, version=17.1.13, description=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, tcib_managed=true) Feb 2 08:16:39 np0005604725 systemd-rc-local-generator[131669]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:39 np0005604725 systemd-sysv-generator[131674]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:39 np0005604725 podman[131582]: 2026-02-02 08:16:39.138731506 +0000 UTC m=+0.191119522 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=healthy, release=1766032510, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, name=rhosp-rhel9/openstack-nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, build-date=2026-01-12T23:31:50Z, version=17.1.13, description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_api_cron, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, distribution-scope=public, config_id=tripleo_step4, managed_by=tripleo_ansible, com.redhat.component=openstack-nova-api-container, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., architecture=x86_64, url=https://www.redhat.com) Feb 2 08:16:39 np0005604725 podman[131582]: 2026-02-02 08:16:39.17139052 +0000 UTC m=+0.223778516 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, io.buildah.version=1.41.5, vendor=Red Hat, Inc., version=17.1.13, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, com.redhat.component=openstack-nova-api-container, distribution-scope=public, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, name=rhosp-rhel9/openstack-nova-api, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, release=1766032510, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, url=https://www.redhat.com, build-date=2026-01-12T23:31:50Z, container_name=nova_api_cron) Feb 2 08:16:39 np0005604725 podman[131590]: 2026-02-02 08:16:39.199280528 +0000 UTC m=+0.243418000 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, container_name=nova_api, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, org.opencontainers.image.created=2026-01-12T23:31:50Z, vendor=Red Hat, Inc., url=https://www.redhat.com, architecture=x86_64, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, name=rhosp-rhel9/openstack-nova-api, com.redhat.component=openstack-nova-api-container, release=1766032510, config_id=tripleo_step4, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, vcs-type=git, distribution-scope=public, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:16:39 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:39 np0005604725 podman[131583]: 2026-02-02 08:16:39.176612821 +0000 UTC m=+0.227213482 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, distribution-scope=public, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vcs-type=git, description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=nova_metadata, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.13, build-date=2026-01-12T23:31:50Z, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, batch=17.1_20260112.1, io.buildah.version=1.41.5, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-nova-api, release=1766032510, com.redhat.component=openstack-nova-api-container) Feb 2 08:16:39 np0005604725 podman[131583]: 2026-02-02 08:16:39.242956962 +0000 UTC m=+0.293557543 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, vendor=Red Hat, Inc., vcs-type=git, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, name=rhosp-rhel9/openstack-nova-api, io.openshift.expose-services=, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.5, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=nova_metadata, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.13, build-date=2026-01-12T23:31:50Z, batch=17.1_20260112.1, url=https://www.redhat.com, com.redhat.component=openstack-nova-api-container, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, tcib_managed=true, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T23:31:50Z) Feb 2 08:16:39 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Deactivated successfully. Feb 2 08:16:39 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:16:39 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:16:39 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:16:39 np0005604725 systemd[1]: Starting swift_proxy_tls_proxy container... Feb 2 08:16:39 np0005604725 systemd[1]: Started swift_proxy_tls_proxy container. Feb 2 08:16:40 np0005604725 python3[131820]: ansible-systemd Invoked with state=restarted name=tripleo_swift_rsync.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:16:40 np0005604725 systemd[1]: Reloading. Feb 2 08:16:40 np0005604725 systemd-sysv-generator[131908]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:16:40 np0005604725 systemd-rc-local-generator[131899]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:16:40 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:16:41 np0005604725 systemd[1]: Starting swift_rsync container... Feb 2 08:16:41 np0005604725 systemd[1]: Started swift_rsync container. Feb 2 08:16:41 np0005604725 python3[131966]: ansible-file Invoked with path=/var/lib/container-puppet/container-puppet-tasks4.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:16:43 np0005604725 python3[132180]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=True puppet_config=/var/lib/container-puppet/container-puppet-tasks4.json short_hostname=np0005604725 step=4 update_config_hash_only=False Feb 2 08:16:44 np0005604725 python3[132220]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:16:44 np0005604725 python3[132236]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_4 config_pattern=container-puppet-*.json config_overrides={} debug=True Feb 2 08:16:46 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:16:46 np0005604725 podman[132328]: 2026-02-02 08:16:46.360703643 +0000 UTC m=+0.099143872 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, description=Red Hat OpenStack Platform 17.1 collectd, vendor=Red Hat, Inc., config_id=tripleo_step3, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, batch=17.1_20260112.1, architecture=x86_64, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=collectd, name=rhosp-rhel9/openstack-collectd, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:15Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, url=https://www.redhat.com, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, release=1766032510, vcs-type=git, build-date=2026-01-12T22:10:15Z, com.redhat.component=openstack-collectd-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=) Feb 2 08:16:46 np0005604725 podman[132328]: 2026-02-02 08:16:46.372692041 +0000 UTC m=+0.111132290 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, batch=17.1_20260112.1, config_id=tripleo_step3, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., version=17.1.13, managed_by=tripleo_ansible, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=collectd, com.redhat.component=openstack-collectd-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:15Z, description=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-collectd, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 collectd, build-date=2026-01-12T22:10:15Z) Feb 2 08:16:46 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:16:47 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:16:47 np0005604725 podman[132371]: 2026-02-02 08:16:47.357111676 +0000 UTC m=+0.099326876 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:41Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, architecture=x86_64, io.openshift.expose-services=, tcib_managed=true, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step3, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 horizon, name=rhosp-rhel9/openstack-horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, container_name=horizon, maintainer=OpenStack TripleO Team, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, url=https://www.redhat.com, batch=17.1_20260112.1, com.redhat.component=openstack-horizon-container, build-date=2026-01-12T22:34:41Z, version=17.1.13, description=Red Hat OpenStack Platform 17.1 horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, managed_by=tripleo_ansible, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:16:47 np0005604725 podman[132371]: 2026-02-02 08:16:47.397776188 +0000 UTC m=+0.139991418 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, vcs-type=git, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, name=rhosp-rhel9/openstack-horizon, architecture=x86_64, version=17.1.13, maintainer=OpenStack TripleO Team, tcib_managed=true, container_name=horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:41Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, build-date=2026-01-12T22:34:41Z, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, io.openshift.expose-services=, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 horizon, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, com.redhat.component=openstack-horizon-container, vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, managed_by=tripleo_ansible) Feb 2 08:16:47 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:16:50 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:16:50 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:16:50 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:16:50 np0005604725 podman[132515]: 2026-02-02 08:16:50.345459574 +0000 UTC m=+0.092492567 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, release=1766032510, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.buildah.version=1.41.5, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, description=Red Hat OpenStack Platform 17.1 keystone, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, com.redhat.component=openstack-keystone-container, architecture=x86_64, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, build-date=2026-01-12T22:33:53Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, distribution-scope=public, container_name=keystone_cron, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-keystone, url=https://www.redhat.com, vendor=Red Hat, Inc., config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:16:50 np0005604725 podman[132515]: 2026-02-02 08:16:50.358614739 +0000 UTC m=+0.105647742 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, com.redhat.component=openstack-keystone-container, vcs-type=git, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, build-date=2026-01-12T22:33:53Z, io.openshift.expose-services=, architecture=x86_64, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.5, container_name=keystone_cron, config_id=tripleo_step3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-keystone, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:33:53Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., release=1766032510, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:16:50 np0005604725 podman[132516]: 2026-02-02 08:16:50.389065236 +0000 UTC m=+0.135454699 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, name=rhosp-rhel9/openstack-iscsid, batch=17.1_20260112.1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, tcib_managed=true, container_name=iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, build-date=2026-01-12T22:34:43Z, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, distribution-scope=public, com.redhat.component=openstack-iscsid-container, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, vendor=Red Hat, Inc., io.openshift.expose-services=, io.buildah.version=1.41.5, vcs-ref=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, maintainer=OpenStack TripleO Team, version=17.1.13, description=Red Hat OpenStack Platform 17.1 iscsid) Feb 2 08:16:50 np0005604725 podman[132514]: 2026-02-02 08:16:50.446078869 +0000 UTC m=+0.192483253 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-keystone-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, summary=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:33:53Z, vcs-type=git, version=17.1.13, container_name=keystone, io.openshift.expose-services=, build-date=2026-01-12T22:33:53Z, batch=17.1_20260112.1, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, name=rhosp-rhel9/openstack-keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone) Feb 2 08:16:50 np0005604725 podman[132516]: 2026-02-02 08:16:50.460490143 +0000 UTC m=+0.206879626 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, version=17.1.13, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, build-date=2026-01-12T22:34:43Z, io.openshift.expose-services=, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, container_name=iscsid, vendor=Red Hat, Inc., managed_by=tripleo_ansible, vcs-ref=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, com.redhat.component=openstack-iscsid-container, config_id=tripleo_step3, description=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, name=rhosp-rhel9/openstack-iscsid, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:34:43Z, url=https://www.redhat.com) Feb 2 08:16:50 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:16:50 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:16:50 np0005604725 podman[132514]: 2026-02-02 08:16:50.55174301 +0000 UTC m=+0.298147414 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, config_id=tripleo_step3, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, url=https://www.redhat.com, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, build-date=2026-01-12T22:33:53Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, release=1766032510, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, container_name=keystone, vendor=Red Hat, Inc., architecture=x86_64, name=rhosp-rhel9/openstack-keystone, com.redhat.component=openstack-keystone-container, batch=17.1_20260112.1, version=17.1.13, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:16:50 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:16:56 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:16:56 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:16:56 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:16:56 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:16:56 np0005604725 podman[132996]: 2026-02-02 08:16:56.358330881 +0000 UTC m=+0.093347452 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=healthy, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:58:47Z, tcib_managed=true, release=1766032510, io.buildah.version=1.41.5, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, com.redhat.component=openstack-cinder-scheduler-container, name=rhosp-rhel9/openstack-cinder-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, url=https://www.redhat.com, io.openshift.expose-services=, managed_by=tripleo_ansible, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, build-date=2026-01-12T22:58:47Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, container_name=cinder_scheduler) Feb 2 08:16:56 np0005604725 podman[132996]: 2026-02-02 08:16:56.38623502 +0000 UTC m=+0.121251581 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, container_name=cinder_scheduler, vendor=Red Hat, Inc., build-date=2026-01-12T22:58:47Z, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, name=rhosp-rhel9/openstack-cinder-scheduler, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:58:47Z, com.redhat.component=openstack-cinder-scheduler-container, architecture=x86_64, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, vcs-type=git, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, managed_by=tripleo_ansible, io.buildah.version=1.41.5, batch=17.1_20260112.1, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4) Feb 2 08:16:56 np0005604725 systemd[1]: tmp-crun.YivwEU.mount: Deactivated successfully. Feb 2 08:16:56 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:16:56 np0005604725 podman[132995]: 2026-02-02 08:16:56.414595102 +0000 UTC m=+0.153797311 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, architecture=x86_64, name=rhosp-rhel9/openstack-ceilometer-central, org.opencontainers.image.created=2026-01-12T23:07:24Z, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, release=1766032510, vendor=Red Hat, Inc., batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, version=17.1.13, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T23:07:24Z, url=https://www.redhat.com, com.redhat.component=openstack-ceilometer-central-container, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, managed_by=tripleo_ansible, tcib_managed=true, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, container_name=ceilometer_agent_central, distribution-scope=public) Feb 2 08:16:56 np0005604725 podman[132995]: 2026-02-02 08:16:56.46491033 +0000 UTC m=+0.204112529 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T23:07:24Z, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, architecture=x86_64, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vendor=Red Hat, Inc., url=https://www.redhat.com, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-ceilometer-central, managed_by=tripleo_ansible, tcib_managed=true, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, version=17.1.13, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, description=Red Hat OpenStack Platform 17.1 ceilometer-central, batch=17.1_20260112.1, build-date=2026-01-12T23:07:24Z, com.redhat.component=openstack-ceilometer-central-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, container_name=ceilometer_agent_central) Feb 2 08:16:56 np0005604725 podman[133003]: 2026-02-02 08:16:56.472245646 +0000 UTC m=+0.191826952 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, release=1766032510, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, managed_by=tripleo_ansible, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:58:44Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=cinder_api_cron, description=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, name=rhosp-rhel9/openstack-cinder-api, com.redhat.component=openstack-cinder-api-container, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.13, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:58:44Z, url=https://www.redhat.com, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:16:56 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:16:56 np0005604725 podman[133003]: 2026-02-02 08:16:56.481721457 +0000 UTC m=+0.201302763 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:58:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, build-date=2026-01-12T22:58:44Z, distribution-scope=public, batch=17.1_20260112.1, io.buildah.version=1.41.5, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, tcib_managed=true, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.13, architecture=x86_64, name=rhosp-rhel9/openstack-cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.component=openstack-cinder-api-container, vcs-type=git, config_id=tripleo_step4, container_name=cinder_api_cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cinder-api) Feb 2 08:16:56 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:16:56 np0005604725 podman[132997]: 2026-02-02 08:16:56.557760028 +0000 UTC m=+0.291895832 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:18Z, vcs-type=git, com.redhat.component=openstack-mariadb-container, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step2, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, io.buildah.version=1.41.5, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, tcib_managed=true, container_name=clustercheck, vendor=Red Hat, Inc., architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, distribution-scope=public, name=rhosp-rhel9/openstack-mariadb, io.openshift.expose-services=) Feb 2 08:16:56 np0005604725 podman[132997]: 2026-02-02 08:16:56.620107256 +0000 UTC m=+0.354243080 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:18Z, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, container_name=clustercheck, url=https://www.redhat.com, config_id=tripleo_step2, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, vcs-type=git, distribution-scope=public, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:18Z, managed_by=tripleo_ansible, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-mariadb-container, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, version=17.1.13, vendor=Red Hat, Inc., architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:16:56 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:16:57 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:16:57 np0005604725 podman[133125]: 2026-02-02 08:16:57.318537383 +0000 UTC m=+0.070100428 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, config_id=tripleo_step4, release=1766032510, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, com.redhat.component=openstack-ceilometer-notification-container, org.opencontainers.image.created=2026-01-12T23:07:25Z, build-date=2026-01-12T23:07:25Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.openshift.expose-services=, distribution-scope=public, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, tcib_managed=true, url=https://www.redhat.com, vendor=Red Hat, Inc., vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-ceilometer-notification, batch=17.1_20260112.1, container_name=ceilometer_agent_notification) Feb 2 08:16:57 np0005604725 podman[133125]: 2026-02-02 08:16:57.346984248 +0000 UTC m=+0.098547303 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, name=rhosp-rhel9/openstack-ceilometer-notification, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-ceilometer-notification-container, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T23:07:25Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, release=1766032510, url=https://www.redhat.com, architecture=x86_64, io.openshift.expose-services=, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, io.buildah.version=1.41.5, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, batch=17.1_20260112.1, container_name=ceilometer_agent_notification, org.opencontainers.image.created=2026-01-12T23:07:25Z) Feb 2 08:16:57 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:16:58 np0005604725 systemd[1]: session-14.scope: Deactivated successfully. Feb 2 08:16:58 np0005604725 systemd[1]: session-14.scope: Consumed 3.076s CPU time. Feb 2 08:16:58 np0005604725 systemd-logind[36465]: Session 14 logged out. Waiting for processes to exit. Feb 2 08:16:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:16:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:16:58 np0005604725 systemd-logind[36465]: Removed session 14. Feb 2 08:16:58 np0005604725 systemd[1]: tmp-crun.Cofnku.mount: Deactivated successfully. Feb 2 08:16:58 np0005604725 podman[133219]: 2026-02-02 08:16:58.326187984 +0000 UTC m=+0.116201526 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-engine, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=heat_engine, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, distribution-scope=public, name=rhosp-rhel9/openstack-heat-engine, io.openshift.expose-services=, vcs-type=git, vcs-ref=755001522886c265e88561b4997cab642504a845, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, tcib_managed=true, com.redhat.component=openstack-heat-engine-container, summary=Red Hat OpenStack Platform 17.1 heat-engine, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, config_id=tripleo_step4, architecture=x86_64, build-date=2026-01-12T22:53:38Z, io.buildah.version=1.41.5, release=1766032510, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:53:38Z) Feb 2 08:16:58 np0005604725 podman[133217]: 2026-02-02 08:16:58.380908507 +0000 UTC m=+0.172032113 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, version=17.1.13, config_id=tripleo_step4, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, architecture=x86_64, container_name=heat_api_cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, release=1766032510, tcib_managed=true, com.redhat.component=openstack-heat-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, io.buildah.version=1.41.5, vcs-type=git, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp-rhel9/openstack-heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, url=https://www.redhat.com, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:53:19Z, summary=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:53:19Z) Feb 2 08:16:58 np0005604725 podman[133219]: 2026-02-02 08:16:58.406309649 +0000 UTC m=+0.196323191 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 heat-engine, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:53:38Z, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, architecture=x86_64, url=https://www.redhat.com, tcib_managed=true, com.redhat.component=openstack-heat-engine-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-heat-engine, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, vcs-type=git, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 heat-engine, container_name=heat_engine, build-date=2026-01-12T22:53:38Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}) Feb 2 08:16:58 np0005604725 podman[133217]: 2026-02-02 08:16:58.413750338 +0000 UTC m=+0.204873954 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, description=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_step4, container_name=heat_api_cron, maintainer=OpenStack TripleO Team, version=17.1.13, managed_by=tripleo_ansible, batch=17.1_20260112.1, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:53:19Z, com.redhat.component=openstack-heat-api-container, name=rhosp-rhel9/openstack-heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, org.opencontainers.image.created=2026-01-12T22:53:19Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 heat-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, release=1766032510, url=https://www.redhat.com, tcib_managed=true, architecture=x86_64) Feb 2 08:16:58 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:16:58 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:16:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:16:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:16:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:16:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:16:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:16:59 np0005604725 podman[133279]: 2026-02-02 08:16:59.369077669 +0000 UTC m=+0.112362788 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, vcs-type=git, build-date=2026-01-12T22:58:44Z, tcib_managed=true, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 cinder-api, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:58:44Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, version=17.1.13, name=rhosp-rhel9/openstack-cinder-api, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, managed_by=tripleo_ansible, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, container_name=cinder_api, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api) Feb 2 08:16:59 np0005604725 systemd[1]: tmp-crun.n8ov7Q.mount: Deactivated successfully. Feb 2 08:16:59 np0005604725 podman[133281]: 2026-02-02 08:16:59.429610152 +0000 UTC m=+0.165817213 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, description=Red Hat OpenStack Platform 17.1 cron, url=https://www.redhat.com, tcib_managed=true, maintainer=OpenStack TripleO Team, architecture=x86_64, com.redhat.component=openstack-cron-container, version=17.1.13, batch=17.1_20260112.1, release=1766032510, name=rhosp-rhel9/openstack-cron, managed_by=tripleo_ansible, vcs-type=git, container_name=logrotate_crond, io.buildah.version=1.41.5, vendor=Red Hat, Inc., config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:15Z, summary=Red Hat OpenStack Platform 17.1 cron, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:15Z) Feb 2 08:16:59 np0005604725 podman[133297]: 2026-02-02 08:16:59.474809032 +0000 UTC m=+0.199541740 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, vendor=Red Hat, Inc., architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, batch=17.1_20260112.1, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-heat-api-cfn, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, com.redhat.component=openstack-heat-api-cfn-container, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, managed_by=tripleo_ansible, version=17.1.13, vcs-ref=755001522886c265e88561b4997cab642504a845, container_name=heat_api_cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, url=https://www.redhat.com, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, build-date=2026-01-12T22:54:02Z, io.openshift.expose-services=, vcs-type=git, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.created=2026-01-12T22:54:02Z, maintainer=OpenStack TripleO Team) Feb 2 08:16:59 np0005604725 podman[133281]: 2026-02-02 08:16:59.49328104 +0000 UTC m=+0.229488101 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:15Z, com.redhat.component=openstack-cron-container, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, distribution-scope=public, name=rhosp-rhel9/openstack-cron, description=Red Hat OpenStack Platform 17.1 cron, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 cron, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:10:15Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=logrotate_crond, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, managed_by=tripleo_ansible, architecture=x86_64, url=https://www.redhat.com, batch=17.1_20260112.1, tcib_managed=true, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git) Feb 2 08:16:59 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:16:59 np0005604725 podman[133279]: 2026-02-02 08:16:59.505976271 +0000 UTC m=+0.249261340 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, build-date=2026-01-12T22:58:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 cinder-api, url=https://www.redhat.com, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:58:44Z, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vcs-type=git, managed_by=tripleo_ansible, batch=17.1_20260112.1, io.openshift.expose-services=, container_name=cinder_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, tcib_managed=true, com.redhat.component=openstack-cinder-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, summary=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api) Feb 2 08:16:59 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:16:59 np0005604725 podman[133292]: 2026-02-02 08:16:59.576626234 +0000 UTC m=+0.304955023 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:52:22Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, architecture=x86_64, vendor=Red Hat, Inc., distribution-scope=public, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=manila_api_cron, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, vcs-type=git, managed_by=tripleo_ansible, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, url=https://www.redhat.com, com.redhat.component=openstack-manila-api-container, version=17.1.13, release=1766032510, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-manila-api, build-date=2026-01-12T22:52:22Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:16:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:16:59 np0005604725 podman[133297]: 2026-02-02 08:16:59.59987414 +0000 UTC m=+0.324606828 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, build-date=2026-01-12T22:54:02Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, managed_by=tripleo_ansible, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, release=1766032510, url=https://www.redhat.com, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:54:02Z, tcib_managed=true, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, container_name=heat_api_cfn, name=rhosp-rhel9/openstack-heat-api-cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, com.redhat.component=openstack-heat-api-cfn-container, vcs-ref=755001522886c265e88561b4997cab642504a845, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845) Feb 2 08:16:59 np0005604725 podman[133292]: 2026-02-02 08:16:59.614727927 +0000 UTC m=+0.343056726 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 manila-api, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=manila_api_cron, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, release=1766032510, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:52:22Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-manila-api-container, tcib_managed=true, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, url=https://www.redhat.com, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, distribution-scope=public, config_id=tripleo_step4, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, vendor=Red Hat, Inc., batch=17.1_20260112.1, build-date=2026-01-12T22:52:22Z, description=Red Hat OpenStack Platform 17.1 manila-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, name=rhosp-rhel9/openstack-manila-api, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:16:59 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:17:00 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:17:00 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:17:00 np0005604725 systemd[1]: tmp-crun.VDWgdY.mount: Deactivated successfully. Feb 2 08:17:00 np0005604725 podman[133383]: 2026-02-02 08:17:00.452827371 +0000 UTC m=+0.855715927 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=healthy, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 manila-scheduler, architecture=x86_64, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, name=rhosp-rhel9/openstack-manila-scheduler, config_id=tripleo_step4, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, container_name=manila_scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, org.opencontainers.image.created=2026-01-12T22:52:54Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, url=https://www.redhat.com, version=17.1.13, com.redhat.component=openstack-manila-scheduler-container, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, release=1766032510, distribution-scope=public, build-date=2026-01-12T22:52:54Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.buildah.version=1.41.5, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true) Feb 2 08:17:00 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:17:00 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:17:00 np0005604725 podman[133280]: 2026-02-02 08:17:00.493083979 +0000 UTC m=+1.234808929 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, version=17.1.13, release=1766032510, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, vcs-type=git, com.redhat.component=openstack-heat-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, build-date=2026-01-12T22:53:19Z, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, container_name=heat_api, name=rhosp-rhel9/openstack-heat-api, io.buildah.version=1.41.5, vendor=Red Hat, Inc., batch=17.1_20260112.1, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:53:19Z, summary=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, config_id=tripleo_step4) Feb 2 08:17:00 np0005604725 podman[133418]: 2026-02-02 08:17:00.516868491 +0000 UTC m=+0.103573967 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=healthy, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, batch=17.1_20260112.1, vendor=Red Hat, Inc., build-date=2026-01-12T22:57:35Z, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:57:35Z, summary=Red Hat OpenStack Platform 17.1 neutron-server, maintainer=OpenStack TripleO Team, release=1766032510, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, description=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, architecture=x86_64, container_name=neutron_api, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, io.openshift.expose-services=, vcs-type=git, name=rhosp-rhel9/openstack-neutron-server) Feb 2 08:17:00 np0005604725 podman[133412]: 2026-02-02 08:17:00.56656284 +0000 UTC m=+0.158565799 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-nova-conductor, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., io.openshift.expose-services=, com.redhat.component=openstack-nova-conductor-container, batch=17.1_20260112.1, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, architecture=x86_64, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-conductor, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, container_name=nova_conductor, org.opencontainers.image.created=2026-01-12T23:32:18Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, build-date=2026-01-12T23:32:18Z, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, release=1766032510, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, description=Red Hat OpenStack Platform 17.1 nova-conductor) Feb 2 08:17:00 np0005604725 podman[133280]: 2026-02-02 08:17:00.611887415 +0000 UTC m=+1.353612295 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, batch=17.1_20260112.1, architecture=x86_64, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:53:19Z, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 heat-api, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.expose-services=, tcib_managed=true, vcs-type=git, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:53:19Z, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, container_name=heat_api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=755001522886c265e88561b4997cab642504a845, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, url=https://www.redhat.com, com.redhat.component=openstack-heat-api-container, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-heat-api) Feb 2 08:17:00 np0005604725 podman[133443]: 2026-02-02 08:17:00.625325008 +0000 UTC m=+0.142430083 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=healthy, io.openshift.expose-services=, vcs-type=git, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, managed_by=tripleo_ansible, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-nova-scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 nova-scheduler, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, vendor=Red Hat, Inc., config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, org.opencontainers.image.created=2026-01-12T23:32:05Z, io.buildah.version=1.41.5, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, com.redhat.component=openstack-nova-scheduler-container, container_name=nova_scheduler, build-date=2026-01-12T23:32:05Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true) Feb 2 08:17:00 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:17:00 np0005604725 podman[133412]: 2026-02-02 08:17:00.645905101 +0000 UTC m=+0.237908040 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, managed_by=tripleo_ansible, tcib_managed=true, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, distribution-scope=public, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, description=Red Hat OpenStack Platform 17.1 nova-conductor, build-date=2026-01-12T23:32:18Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, release=1766032510, vcs-type=git, container_name=nova_conductor, org.opencontainers.image.created=2026-01-12T23:32:18Z, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, config_id=tripleo_step4, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, name=rhosp-rhel9/openstack-nova-conductor, maintainer=OpenStack TripleO Team, version=17.1.13, io.openshift.expose-services=, com.redhat.component=openstack-nova-conductor-container, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 nova-conductor, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:17:00 np0005604725 podman[133443]: 2026-02-02 08:17:00.656975552 +0000 UTC m=+0.174080677 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, description=Red Hat OpenStack Platform 17.1 nova-scheduler, com.redhat.component=openstack-nova-scheduler-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T23:32:05Z, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, io.openshift.expose-services=, build-date=2026-01-12T23:32:05Z, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, maintainer=OpenStack TripleO Team, version=17.1.13, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-nova-scheduler, architecture=x86_64, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, vendor=Red Hat, Inc., container_name=nova_scheduler, io.buildah.version=1.41.5, release=1766032510, url=https://www.redhat.com, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, distribution-scope=public) Feb 2 08:17:00 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:17:00 np0005604725 podman[133383]: 2026-02-02 08:17:00.669674022 +0000 UTC m=+1.072562588 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, distribution-scope=public, io.buildah.version=1.41.5, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, config_id=tripleo_step4, name=rhosp-rhel9/openstack-manila-scheduler, release=1766032510, vendor=Red Hat, Inc., container_name=manila_scheduler, com.redhat.component=openstack-manila-scheduler-container, build-date=2026-01-12T22:52:54Z, description=Red Hat OpenStack Platform 17.1 manila-scheduler, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:52:54Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, version=17.1.13) Feb 2 08:17:00 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:17:00 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:17:00 np0005604725 podman[133418]: 2026-02-02 08:17:00.726607224 +0000 UTC m=+0.313312770 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, maintainer=OpenStack TripleO Team, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, build-date=2026-01-12T22:57:35Z, vcs-type=git, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 neutron-server, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, tcib_managed=true, name=rhosp-rhel9/openstack-neutron-server, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:57:35Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, com.redhat.component=openstack-neutron-server-container, container_name=neutron_api, config_id=tripleo_step4, io.openshift.expose-services=, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, vendor=Red Hat, Inc., batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 neutron-server, release=1766032510, io.buildah.version=1.41.5) Feb 2 08:17:00 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:17:02 np0005604725 podman[133620]: 2026-02-02 08:17:02.446792666 +0000 UTC m=+0.091744924 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, name=rhosp-rhel9/openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.component=openstack-mariadb-container, build-date=2026-01-12T22:10:18Z, org.opencontainers.image.created=2026-01-12T22:10:18Z, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, io.openshift.expose-services=, architecture=x86_64, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, io.buildah.version=1.41.5, vcs-type=git) Feb 2 08:17:02 np0005604725 podman[133620]: 2026-02-02 08:17:02.478881863 +0000 UTC m=+0.123834141 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, version=17.1.13, release=1766032510, com.redhat.component=openstack-mariadb-container, build-date=2026-01-12T22:10:18Z, distribution-scope=public, name=rhosp-rhel9/openstack-mariadb, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:18Z, description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-type=git, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=) Feb 2 08:17:02 np0005604725 podman[133664]: 2026-02-02 08:17:02.850478846 +0000 UTC m=+0.060819203 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, org.opencontainers.image.created=2026-01-12T22:10:16Z, io.openshift.expose-services=, batch=17.1_20260112.1, url=https://www.redhat.com, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 redis, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, com.redhat.component=openstack-redis-container, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 redis, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, name=rhosp-rhel9/openstack-redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, release=1766032510, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:16Z, maintainer=OpenStack TripleO Team) Feb 2 08:17:02 np0005604725 podman[133664]: 2026-02-02 08:17:02.881751048 +0000 UTC m=+0.092091385 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., version=17.1.13, architecture=x86_64, build-date=2026-01-12T22:10:16Z, url=https://www.redhat.com, name=rhosp-rhel9/openstack-redis, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, com.redhat.component=openstack-redis-container, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:16Z, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 redis) Feb 2 08:17:03 np0005604725 podman[133705]: 2026-02-02 08:17:03.011034965 +0000 UTC m=+0.077949159 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, build-date=2026-01-12T22:10:12Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-haproxy-container, description=Red Hat OpenStack Platform 17.1 haproxy, name=rhosp-rhel9/openstack-haproxy, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 haproxy, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, vcs-type=git, architecture=x86_64, url=https://www.redhat.com, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.created=2026-01-12T22:10:12Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:17:03 np0005604725 podman[133705]: 2026-02-02 08:17:03.042016388 +0000 UTC m=+0.108930562 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 haproxy, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 haproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-haproxy-container, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:12Z, build-date=2026-01-12T22:10:12Z, io.openshift.expose-services=, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, release=1766032510, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, architecture=x86_64) Feb 2 08:17:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:17:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:17:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:17:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:17:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:17:03 np0005604725 podman[133739]: 2026-02-02 08:17:03.196521451 +0000 UTC m=+0.102654038 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, vcs-type=git, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:14Z, vendor=Red Hat, Inc., batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-rabbitmq, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, build-date=2026-01-12T22:10:14Z, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, release=1766032510, description=Red Hat OpenStack Platform 17.1 rabbitmq) Feb 2 08:17:03 np0005604725 podman[133750]: 2026-02-02 08:17:03.216741684 +0000 UTC m=+0.073715589 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=healthy, io.buildah.version=1.41.5, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:50:57Z, summary=Red Hat OpenStack Platform 17.1 swift-container, config_id=tripleo_step4, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-container-container, release=1766032510, batch=17.1_20260112.1, tcib_managed=true, name=rhosp-rhel9/openstack-swift-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=swift_container_server, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, distribution-scope=public, build-date=2026-01-12T22:50:57Z, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, description=Red Hat OpenStack Platform 17.1 swift-container, managed_by=tripleo_ansible, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container) Feb 2 08:17:03 np0005604725 podman[133766]: 2026-02-02 08:17:03.224292856 +0000 UTC m=+0.067989223 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=healthy, tcib_managed=true, vcs-type=git, container_name=swift_account_server, build-date=2026-01-12T22:50:44Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, vendor=Red Hat, Inc., architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:50:44Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, batch=17.1_20260112.1, io.buildah.version=1.41.5, distribution-scope=public, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, description=Red Hat OpenStack Platform 17.1 swift-account, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, name=rhosp-rhel9/openstack-swift-account, config_id=tripleo_step4, url=https://www.redhat.com, com.redhat.component=openstack-swift-account-container, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account) Feb 2 08:17:03 np0005604725 podman[133751]: 2026-02-02 08:17:03.283535618 +0000 UTC m=+0.138503291 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=healthy, name=rhosp-rhel9/openstack-swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, vendor=Red Hat, Inc., org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:57Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, url=https://www.redhat.com, container_name=swift_container_replicator, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, managed_by=tripleo_ansible, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, vcs-type=git, io.openshift.expose-services=, build-date=2026-01-12T22:50:57Z, tcib_managed=true, release=1766032510, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, version=17.1.13, com.redhat.component=openstack-swift-container-container, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, batch=17.1_20260112.1, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container) Feb 2 08:17:03 np0005604725 podman[133803]: 2026-02-02 08:17:03.330776402 +0000 UTC m=+0.127599146 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-type=git, com.redhat.component=openstack-rabbitmq-container, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, batch=17.1_20260112.1, distribution-scope=public, version=17.1.13, tcib_managed=true, build-date=2026-01-12T22:10:14Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., release=1766032510, summary=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5) Feb 2 08:17:03 np0005604725 podman[133739]: 2026-02-02 08:17:03.338150749 +0000 UTC m=+0.244283356 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, vcs-type=git, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, vendor=Red Hat, Inc., url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:14Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-rabbitmq-container, description=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp-rhel9/openstack-rabbitmq, io.buildah.version=1.41.5, release=1766032510, version=17.1.13, io.openshift.expose-services=, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:17:03 np0005604725 podman[133752]: 2026-02-02 08:17:03.385762934 +0000 UTC m=+0.236613961 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=healthy, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, container_name=swift_account_replicator, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:44Z, org.opencontainers.image.created=2026-01-12T22:50:44Z, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.component=openstack-swift-account-container, vendor=Red Hat, Inc., version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, batch=17.1_20260112.1, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, distribution-scope=public, release=1766032510, description=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true, vcs-type=git, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-account) Feb 2 08:17:03 np0005604725 podman[133764]: 2026-02-02 08:17:03.34241459 +0000 UTC m=+0.189771969 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=healthy, release=1766032510, name=rhosp-rhel9/openstack-nova-novncproxy, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, architecture=x86_64, container_name=nova_vnc_proxy, batch=17.1_20260112.1, build-date=2026-01-12T23:32:22Z, config_id=tripleo_step4, managed_by=tripleo_ansible, distribution-scope=public, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-novncproxy-container, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, tcib_managed=true, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5) Feb 2 08:17:03 np0005604725 podman[133766]: 2026-02-02 08:17:03.393720679 +0000 UTC m=+0.237417046 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-swift-account-container, architecture=x86_64, build-date=2026-01-12T22:50:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, batch=17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, name=rhosp-rhel9/openstack-swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, vcs-type=git, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, tcib_managed=true, container_name=swift_account_server, description=Red Hat OpenStack Platform 17.1 swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, config_id=tripleo_step4, url=https://www.redhat.com) Feb 2 08:17:03 np0005604725 podman[133751]: 2026-02-02 08:17:03.401777167 +0000 UTC m=+0.256744830 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, batch=17.1_20260112.1, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-swift-container-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, build-date=2026-01-12T22:50:57Z, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.buildah.version=1.41.5, tcib_managed=true, container_name=swift_container_replicator, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-container, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 swift-container, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:50:57Z, distribution-scope=public, release=1766032510) Feb 2 08:17:03 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Deactivated successfully. Feb 2 08:17:03 np0005604725 systemd[1]: tmp-crun.Fo8ObK.mount: Deactivated successfully. Feb 2 08:17:03 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Deactivated successfully. Feb 2 08:17:03 np0005604725 podman[133752]: 2026-02-02 08:17:03.46297375 +0000 UTC m=+0.313824827 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, version=17.1.13, container_name=swift_account_replicator, description=Red Hat OpenStack Platform 17.1 swift-account, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.buildah.version=1.41.5, tcib_managed=true, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:50:44Z, architecture=x86_64, name=rhosp-rhel9/openstack-swift-account, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, com.redhat.component=openstack-swift-account-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:44Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, maintainer=OpenStack TripleO Team, distribution-scope=public, url=https://www.redhat.com, config_id=tripleo_step4) Feb 2 08:17:03 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:17:03 np0005604725 podman[133750]: 2026-02-02 08:17:03.500808773 +0000 UTC m=+0.357782678 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, summary=Red Hat OpenStack Platform 17.1 swift-container, version=17.1.13, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, container_name=swift_container_server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, io.buildah.version=1.41.5, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, release=1766032510, vcs-type=git, batch=17.1_20260112.1, url=https://www.redhat.com, distribution-scope=public, com.redhat.component=openstack-swift-container-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:57Z, build-date=2026-01-12T22:50:57Z, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, name=rhosp-rhel9/openstack-swift-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 swift-container, managed_by=tripleo_ansible) Feb 2 08:17:03 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Deactivated successfully. Feb 2 08:17:03 np0005604725 podman[133764]: 2026-02-02 08:17:03.676834219 +0000 UTC m=+0.524191568 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, batch=17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, version=17.1.13, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.openshift.expose-services=, name=rhosp-rhel9/openstack-nova-novncproxy, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=nova_vnc_proxy, tcib_managed=true, build-date=2026-01-12T23:32:22Z, maintainer=OpenStack TripleO Team, architecture=x86_64, org.opencontainers.image.created=2026-01-12T23:32:22Z, release=1766032510, com.redhat.component=openstack-nova-novncproxy-container, managed_by=tripleo_ansible) Feb 2 08:17:03 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Deactivated successfully. Feb 2 08:17:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:17:04 np0005604725 systemd[1]: tmp-crun.wvzo1m.mount: Deactivated successfully. Feb 2 08:17:04 np0005604725 podman[133929]: 2026-02-02 08:17:04.360212683 +0000 UTC m=+0.100753881 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=healthy, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, config_id=tripleo_step4, tcib_managed=true, maintainer=OpenStack TripleO Team, architecture=x86_64, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:50:56Z, build-date=2026-01-12T22:50:56Z, release=1766032510, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-object-container, description=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, version=17.1.13, container_name=swift_object_replicator, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.openshift.expose-services=, io.buildah.version=1.41.5, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, name=rhosp-rhel9/openstack-swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:17:04 np0005604725 podman[133929]: 2026-02-02 08:17:04.474335584 +0000 UTC m=+0.214876812 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:50:56Z, release=1766032510, vendor=Red Hat, Inc., tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, managed_by=tripleo_ansible, distribution-scope=public, name=rhosp-rhel9/openstack-swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, container_name=swift_object_replicator, config_id=tripleo_step4, version=17.1.13, com.redhat.component=openstack-swift-object-container, io.buildah.version=1.41.5) Feb 2 08:17:04 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Deactivated successfully. Feb 2 08:17:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:17:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:17:05 np0005604725 podman[133984]: 2026-02-02 08:17:05.35182452 +0000 UTC m=+0.101345939 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=healthy, batch=17.1_20260112.1, io.buildah.version=1.41.5, version=17.1.13, com.redhat.component=openstack-swift-object-container, description=Red Hat OpenStack Platform 17.1 swift-object, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, build-date=2026-01-12T22:50:56Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:56Z, url=https://www.redhat.com, vendor=Red Hat, Inc., distribution-scope=public, container_name=swift_object_server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, architecture=x86_64, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, tcib_managed=true, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, config_id=tripleo_step4) Feb 2 08:17:05 np0005604725 podman[133985]: 2026-02-02 08:17:05.40643053 +0000 UTC m=+0.153260956 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-ovn-northd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, summary=Red Hat OpenStack Platform 17.1 ovn-northd, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 ovn-northd, tcib_managed=true, com.redhat.component=openstack-ovn-northd-container, distribution-scope=public, build-date=2026-01-12T22:34:06Z, io.openshift.expose-services=, io.buildah.version=1.41.5, batch=17.1_20260112.1, container_name=ovn_cluster_northd, release=1766032510, config_id=ovn_cluster_northd, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, url=https://www.redhat.com, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, org.opencontainers.image.created=2026-01-12T22:34:06Z) Feb 2 08:17:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:17:05 np0005604725 podman[133985]: 2026-02-02 08:17:05.444981056 +0000 UTC m=+0.191811482 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, org.opencontainers.image.created=2026-01-12T22:34:06Z, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:06Z, version=17.1.13, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=ovn_cluster_northd, summary=Red Hat OpenStack Platform 17.1 ovn-northd, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, name=rhosp-rhel9/openstack-ovn-northd, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-ovn-northd-container, tcib_managed=true, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, vendor=Red Hat, Inc., io.openshift.expose-services=, managed_by=tripleo_ansible, config_id=ovn_cluster_northd, vcs-type=git, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 ovn-northd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd) Feb 2 08:17:05 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:17:05 np0005604725 podman[134035]: 2026-02-02 08:17:05.521413847 +0000 UTC m=+0.077240477 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=healthy, build-date=2026-01-12T22:36:40Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, name=rhosp-rhel9/openstack-ovn-controller, io.openshift.expose-services=, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, io.buildah.version=1.41.5, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, url=https://www.redhat.com, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vendor=Red Hat, Inc., architecture=x86_64, container_name=ovn_controller, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 ovn-controller, org.opencontainers.image.created=2026-01-12T22:36:40Z, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, release=1766032510, maintainer=OpenStack TripleO Team, version=17.1.13, distribution-scope=public, batch=17.1_20260112.1, com.redhat.component=openstack-ovn-controller-container, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:17:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:17:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:17:05 np0005604725 podman[134035]: 2026-02-02 08:17:05.579981989 +0000 UTC m=+0.135808509 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, org.opencontainers.image.created=2026-01-12T22:36:40Z, vendor=Red Hat, Inc., managed_by=tripleo_ansible, distribution-scope=public, com.redhat.component=openstack-ovn-controller-container, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=ovn_controller, io.openshift.expose-services=, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, release=1766032510, name=rhosp-rhel9/openstack-ovn-controller, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 ovn-controller, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, build-date=2026-01-12T22:36:40Z, url=https://www.redhat.com, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, architecture=x86_64, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, batch=17.1_20260112.1) Feb 2 08:17:05 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Deactivated successfully. Feb 2 08:17:05 np0005604725 podman[134099]: 2026-02-02 08:17:05.602536653 +0000 UTC m=+0.067198268 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:12:26Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, batch=17.1_20260112.1, release=1766032510, tcib_managed=true, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:12:26Z, container_name=memcached, name=rhosp-rhel9/openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, architecture=x86_64) Feb 2 08:17:05 np0005604725 podman[134102]: 2026-02-02 08:17:05.639438218 +0000 UTC m=+0.101232375 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=healthy, container_name=placement_api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 placement-api, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-placement-api, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, maintainer=OpenStack TripleO Team, distribution-scope=public, tcib_managed=true, version=17.1.13, architecture=x86_64, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:35Z, url=https://www.redhat.com, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:34:35Z, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.expose-services=, io.buildah.version=1.41.5, com.redhat.component=openstack-placement-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}) Feb 2 08:17:05 np0005604725 podman[134099]: 2026-02-02 08:17:05.667892954 +0000 UTC m=+0.132554549 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, com.redhat.component=openstack-memcached-container, vcs-type=git, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, architecture=x86_64, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, container_name=memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, summary=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, build-date=2026-01-12T22:12:26Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, name=rhosp-rhel9/openstack-memcached, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.41.5, io.openshift.expose-services=) Feb 2 08:17:05 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:17:05 np0005604725 podman[133984]: 2026-02-02 08:17:05.719051608 +0000 UTC m=+0.468572957 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, summary=Red Hat OpenStack Platform 17.1 swift-object, maintainer=OpenStack TripleO Team, version=17.1.13, url=https://www.redhat.com, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-object-container, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:50:56Z, distribution-scope=public, batch=17.1_20260112.1, release=1766032510, config_id=tripleo_step4, build-date=2026-01-12T22:50:56Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_object_server, description=Red Hat OpenStack Platform 17.1 swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:17:05 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Deactivated successfully. Feb 2 08:17:05 np0005604725 podman[134102]: 2026-02-02 08:17:05.771772 +0000 UTC m=+0.233566197 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, release=1766032510, distribution-scope=public, name=rhosp-rhel9/openstack-placement-api, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, architecture=x86_64, com.redhat.component=openstack-placement-api-container, description=Red Hat OpenStack Platform 17.1 placement-api, build-date=2026-01-12T22:34:35Z, container_name=placement_api, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:34:35Z, config_id=tripleo_step4, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:17:05 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:17:06 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:17:06 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:17:06 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:17:06 np0005604725 podman[134215]: 2026-02-02 08:17:06.340745085 +0000 UTC m=+0.084197592 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:34:42Z, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, tcib_managed=true, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-glance-api-container, architecture=x86_64, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, container_name=glance_api_cron, distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 glance-api, build-date=2026-01-12T22:34:42Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4) Feb 2 08:17:06 np0005604725 systemd[1]: tmp-crun.ok05GT.mount: Deactivated successfully. Feb 2 08:17:06 np0005604725 podman[134216]: 2026-02-02 08:17:06.389728921 +0000 UTC m=+0.133144957 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, org.opencontainers.image.created=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., io.openshift.expose-services=, build-date=2026-01-12T22:10:14Z, container_name=metrics_qdr, managed_by=tripleo_ansible, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, com.redhat.component=openstack-qdrouterd-container, architecture=x86_64, config_id=tripleo_step1, io.buildah.version=1.41.5, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, name=rhosp-rhel9/openstack-qdrouterd) Feb 2 08:17:06 np0005604725 systemd[1]: tmp-crun.kYlUwr.mount: Deactivated successfully. Feb 2 08:17:06 np0005604725 podman[134217]: 2026-02-02 08:17:06.4088633 +0000 UTC m=+0.144733544 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=healthy, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, io.openshift.expose-services=, release=1766032510, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-object-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-swift-object, version=17.1.13, description=Red Hat OpenStack Platform 17.1 swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, tcib_managed=true, config_id=tripleo_step4, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:56Z, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, architecture=x86_64, io.buildah.version=1.41.5, vendor=Red Hat, Inc., container_name=swift_rsync) Feb 2 08:17:06 np0005604725 podman[134215]: 2026-02-02 08:17:06.426551194 +0000 UTC m=+0.170003741 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, com.redhat.component=openstack-glance-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, container_name=glance_api_cron, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, config_id=tripleo_step4, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-glance-api, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, architecture=x86_64, build-date=2026-01-12T22:34:42Z, version=17.1.13) Feb 2 08:17:06 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:17:06 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:17:06 np0005604725 podman[134216]: 2026-02-02 08:17:06.635000297 +0000 UTC m=+0.378416323 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, managed_by=tripleo_ansible, config_id=tripleo_step1, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, container_name=metrics_qdr, distribution-scope=public, vcs-type=git, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, tcib_managed=true, name=rhosp-rhel9/openstack-qdrouterd, build-date=2026-01-12T22:10:14Z, org.opencontainers.image.created=2026-01-12T22:10:14Z, com.redhat.component=openstack-qdrouterd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, release=1766032510, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:17:06 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:17:06 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:17:06 np0005604725 podman[134310]: 2026-02-02 08:17:06.726688448 +0000 UTC m=+0.096938063 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=healthy, config_id=tripleo_step4, build-date=2026-01-12T22:34:42Z, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:42Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp-rhel9/openstack-glance-api, vcs-type=git, distribution-scope=public, io.buildah.version=1.41.5, io.openshift.expose-services=, batch=17.1_20260112.1, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, release=1766032510, com.redhat.component=openstack-glance-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, managed_by=tripleo_ansible, tcib_managed=true, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 glance-api, container_name=glance_api_internal, version=17.1.13) Feb 2 08:17:06 np0005604725 podman[134319]: 2026-02-02 08:17:06.741673799 +0000 UTC m=+0.070123528 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=healthy, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., version=17.1.13, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step4, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, name=rhosp-rhel9/openstack-glance-api, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, build-date=2026-01-12T22:34:42Z, container_name=glance_api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:34:42Z, com.redhat.component=openstack-glance-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, tcib_managed=true, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com) Feb 2 08:17:06 np0005604725 podman[134217]: 2026-02-02 08:17:06.791934875 +0000 UTC m=+0.527805109 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., build-date=2026-01-12T22:50:56Z, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, version=17.1.13, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, summary=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, com.redhat.component=openstack-swift-object-container, org.opencontainers.image.created=2026-01-12T22:50:56Z, container_name=swift_rsync, distribution-scope=public, io.openshift.expose-services=, name=rhosp-rhel9/openstack-swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:17:06 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:17:06 np0005604725 podman[134310]: 2026-02-02 08:17:06.922788482 +0000 UTC m=+0.293038137 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20260112.1, build-date=2026-01-12T22:34:42Z, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_step4, managed_by=tripleo_ansible, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, name=rhosp-rhel9/openstack-glance-api, com.redhat.component=openstack-glance-api-container, container_name=glance_api_internal, org.opencontainers.image.created=2026-01-12T22:34:42Z, vcs-type=git, architecture=x86_64, version=17.1.13, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public) Feb 2 08:17:06 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Deactivated successfully. Feb 2 08:17:06 np0005604725 podman[134319]: 2026-02-02 08:17:06.943599551 +0000 UTC m=+0.272049280 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, build-date=2026-01-12T22:34:42Z, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, release=1766032510, version=17.1.13, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, description=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, distribution-scope=public, name=rhosp-rhel9/openstack-glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, container_name=glance_api, tcib_managed=true, io.buildah.version=1.41.5, architecture=x86_64, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.openshift.expose-services=, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z) Feb 2 08:17:06 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Deactivated successfully. Feb 2 08:17:08 np0005604725 systemd[1]: Stopping User Manager for UID 1000... Feb 2 08:17:08 np0005604725 systemd[4179]: Activating special unit Exit the Session... Feb 2 08:17:08 np0005604725 systemd[4179]: Stopping podman-pause-09c57424.scope... Feb 2 08:17:08 np0005604725 systemd[4179]: Removed slice User Background Tasks Slice. Feb 2 08:17:08 np0005604725 systemd[4179]: Stopped target Main User Target. Feb 2 08:17:08 np0005604725 systemd[4179]: Stopped target Basic System. Feb 2 08:17:08 np0005604725 systemd[4179]: Stopped target Paths. Feb 2 08:17:08 np0005604725 systemd[4179]: Stopped target Sockets. Feb 2 08:17:08 np0005604725 systemd[4179]: Stopped target Timers. Feb 2 08:17:08 np0005604725 systemd[4179]: Stopped Mark boot as successful after the user session has run 2 minutes. Feb 2 08:17:08 np0005604725 systemd[4179]: Stopped Daily Cleanup of User's Temporary Directories. Feb 2 08:17:08 np0005604725 dbus-broker[18414]: Dispatched 7994 messages @ 1(±9)μs / message. Feb 2 08:17:08 np0005604725 systemd[4179]: Stopping D-Bus User Message Bus... Feb 2 08:17:08 np0005604725 systemd[4179]: Stopped Create User's Volatile Files and Directories. Feb 2 08:17:08 np0005604725 systemd[4179]: Stopped podman-pause-09c57424.scope. Feb 2 08:17:08 np0005604725 systemd[4179]: Removed slice Slice /user. Feb 2 08:17:08 np0005604725 systemd[4179]: Stopped D-Bus User Message Bus. Feb 2 08:17:08 np0005604725 systemd[4179]: Closed D-Bus User Message Bus Socket. Feb 2 08:17:08 np0005604725 systemd[4179]: Removed slice User Application Slice. Feb 2 08:17:08 np0005604725 systemd[4179]: Reached target Shutdown. Feb 2 08:17:08 np0005604725 systemd[4179]: Finished Exit the Session. Feb 2 08:17:08 np0005604725 systemd[4179]: Reached target Exit the Session. Feb 2 08:17:08 np0005604725 systemd[1]: user@1000.service: Deactivated successfully. Feb 2 08:17:08 np0005604725 systemd[1]: Stopped User Manager for UID 1000. Feb 2 08:17:08 np0005604725 systemd[1]: user@1000.service: Consumed 4.594s CPU time, read 12.0K from disk, written 4.0K to disk. Feb 2 08:17:10 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:17:10 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:17:10 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:17:10 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:17:10 np0005604725 podman[134608]: 2026-02-02 08:17:10.348685476 +0000 UTC m=+0.089347496 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=healthy, com.redhat.component=openstack-nova-api-container, description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, url=https://www.redhat.com, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, managed_by=tripleo_ansible, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step4, io.buildah.version=1.41.5, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=nova_metadata, maintainer=OpenStack TripleO Team, tcib_managed=true, org.opencontainers.image.created=2026-01-12T23:31:50Z, release=1766032510, build-date=2026-01-12T23:31:50Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-nova-api, io.openshift.expose-services=) Feb 2 08:17:10 np0005604725 podman[134609]: 2026-02-02 08:17:10.406567755 +0000 UTC m=+0.139334353 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, version=17.1.13, batch=17.1_20260112.1, distribution-scope=public, com.redhat.component=openstack-nova-api-container, container_name=nova_api, name=rhosp-rhel9/openstack-nova-api, io.openshift.expose-services=, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, vendor=Red Hat, Inc., io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T23:31:50Z, description=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, tcib_managed=true) Feb 2 08:17:10 np0005604725 podman[134612]: 2026-02-02 08:17:10.375550892 +0000 UTC m=+0.102363136 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=healthy, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, tcib_managed=true, maintainer=OpenStack TripleO Team, container_name=swift_proxy, url=https://www.redhat.com, build-date=2026-01-12T22:50:51Z, release=1766032510, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.created=2026-01-12T22:50:51Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, vendor=Red Hat, Inc., managed_by=tripleo_ansible, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-proxy-server-container, io.openshift.expose-services=, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-swift-proxy-server, version=17.1.13, io.buildah.version=1.41.5) Feb 2 08:17:10 np0005604725 podman[134608]: 2026-02-02 08:17:10.44187329 +0000 UTC m=+0.182535390 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, release=1766032510, description=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, org.opencontainers.image.created=2026-01-12T23:31:50Z, version=17.1.13, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, url=https://www.redhat.com, com.redhat.component=openstack-nova-api-container, io.openshift.expose-services=, container_name=nova_metadata, config_id=tripleo_step4, name=rhosp-rhel9/openstack-nova-api, vcs-type=git, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, build-date=2026-01-12T23:31:50Z, batch=17.1_20260112.1, tcib_managed=true, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:17:10 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:17:10 np0005604725 podman[134609]: 2026-02-02 08:17:10.505884528 +0000 UTC m=+0.238651146 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, release=1766032510, com.redhat.component=openstack-nova-api-container, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_api, name=rhosp-rhel9/openstack-nova-api, io.buildah.version=1.41.5, build-date=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1, config_id=tripleo_step4, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, distribution-scope=public, vcs-type=git, version=17.1.13, org.opencontainers.image.created=2026-01-12T23:31:50Z, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, tcib_managed=true, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}) Feb 2 08:17:10 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:17:10 np0005604725 podman[134607]: 2026-02-02 08:17:10.509071985 +0000 UTC m=+0.248660822 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=healthy, distribution-scope=public, container_name=nova_api_cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.13, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1, tcib_managed=true, vendor=Red Hat, Inc., architecture=x86_64, org.opencontainers.image.created=2026-01-12T23:31:50Z, com.redhat.component=openstack-nova-api-container, summary=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, release=1766032510, url=https://www.redhat.com, config_id=tripleo_step4) Feb 2 08:17:10 np0005604725 podman[134612]: 2026-02-02 08:17:10.591793097 +0000 UTC m=+0.318605351 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-proxy-server-container, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, container_name=swift_proxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, version=17.1.13, config_id=tripleo_step4, architecture=x86_64, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:50:51Z, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, tcib_managed=true, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, distribution-scope=public, release=1766032510, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp-rhel9/openstack-swift-proxy-server, io.openshift.expose-services=, build-date=2026-01-12T22:50:51Z) Feb 2 08:17:10 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Deactivated successfully. Feb 2 08:17:10 np0005604725 podman[134607]: 2026-02-02 08:17:10.642068412 +0000 UTC m=+0.381657209 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, io.openshift.expose-services=, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, io.buildah.version=1.41.5, com.redhat.component=openstack-nova-api-container, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.13, build-date=2026-01-12T23:31:50Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, config_id=tripleo_step4, distribution-scope=public, container_name=nova_api_cron, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.created=2026-01-12T23:31:50Z, release=1766032510, tcib_managed=true) Feb 2 08:17:10 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:17:12 np0005604725 python3[134869]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/config_step.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:17:13 np0005604725 python3[134914]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/config_step.json force=True mode=0600 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020232.536775-147116-170982319295744/source _original_basename=tmprqrncfm9 follow=False checksum=039e0b234f00fbd1242930f0d5dc67e8b4c067fe backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:17:14 np0005604725 python3[134976]: ansible-ansible.legacy.command Invoked with _raw_params=pcs resource config "openstack-cinder-backup"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:15 np0005604725 python3[135010]: ansible-ansible.legacy.command Invoked with _raw_params=puppet apply --detailed-exitcodes --summarize --color=false --modulepath '/etc/puppet/modules:/opt/stack/puppet-modules:/usr/share/openstack-puppet/modules' --tags 'pacemaker::resource::bundle,pacemaker::property,pacemaker::resource::ip,pacemaker::resource::ocf,pacemaker::constraint::order,pacemaker::constraint::colocation' -e 'include ::tripleo::profile::base::pacemaker; include ::tripleo::profile::pacemaker::cinder::backup_bundle'#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:17 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:17:17 np0005604725 podman[135120]: 2026-02-02 08:17:17.364586591 +0000 UTC m=+0.101470629 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, container_name=collectd, name=rhosp-rhel9/openstack-collectd, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 collectd, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, batch=17.1_20260112.1, com.redhat.component=openstack-collectd-container, distribution-scope=public, build-date=2026-01-12T22:10:15Z, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, io.buildah.version=1.41.5, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 collectd, config_id=tripleo_step3, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:15Z) Feb 2 08:17:17 np0005604725 podman[135120]: 2026-02-02 08:17:17.382999296 +0000 UTC m=+0.119883334 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, vcs-type=git, tcib_managed=true, io.buildah.version=1.41.5, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:15Z, release=1766032510, io.openshift.expose-services=, managed_by=tripleo_ansible, build-date=2026-01-12T22:10:15Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, vendor=Red Hat, Inc., batch=17.1_20260112.1, name=rhosp-rhel9/openstack-collectd, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, com.redhat.component=openstack-collectd-container, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, config_id=tripleo_step3, url=https://www.redhat.com, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=collectd, summary=Red Hat OpenStack Platform 17.1 collectd) Feb 2 08:17:17 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:17:18 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:17:18 np0005604725 podman[135234]: 2026-02-02 08:17:18.379119937 +0000 UTC m=+0.087708126 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, build-date=2026-01-12T22:34:41Z, batch=17.1_20260112.1, tcib_managed=true, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 horizon, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, distribution-scope=public, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:34:41Z, summary=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, name=rhosp-rhel9/openstack-horizon, config_id=tripleo_step3, managed_by=tripleo_ansible, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-horizon-container, container_name=horizon, version=17.1.13, url=https://www.redhat.com, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:17:18 np0005604725 podman[135234]: 2026-02-02 08:17:18.440982277 +0000 UTC m=+0.149570396 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, distribution-scope=public, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.component=openstack-horizon-container, vcs-ref=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:34:41Z, summary=Red Hat OpenStack Platform 17.1 horizon, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, container_name=horizon, url=https://www.redhat.com, build-date=2026-01-12T22:34:41Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, vcs-type=git, architecture=x86_64, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-horizon, description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:17:18 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:17:21 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:17:21 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:17:21 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:17:21 np0005604725 podman[135410]: 2026-02-02 08:17:21.264239905 +0000 UTC m=+0.088159351 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vendor=Red Hat, Inc., release=1766032510, io.buildah.version=1.41.5, build-date=2026-01-12T22:33:53Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-keystone, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, com.redhat.component=openstack-keystone-container, summary=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vcs-type=git, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:33:53Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, container_name=keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:17:21 np0005604725 podman[135412]: 2026-02-02 08:17:21.323782894 +0000 UTC m=+0.141770177 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 iscsid, batch=17.1_20260112.1, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:43Z, tcib_managed=true, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, distribution-scope=public, vendor=Red Hat, Inc., config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, vcs-ref=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, version=17.1.13, container_name=iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, com.redhat.component=openstack-iscsid-container, summary=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}) Feb 2 08:17:21 np0005604725 podman[135412]: 2026-02-02 08:17:21.337527117 +0000 UTC m=+0.155514450 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, build-date=2026-01-12T22:34:43Z, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.component=openstack-iscsid-container, summary=Red Hat OpenStack Platform 17.1 iscsid, container_name=iscsid, vcs-type=git, batch=17.1_20260112.1, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, vendor=Red Hat, Inc., config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:34:43Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, name=rhosp-rhel9/openstack-iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, managed_by=tripleo_ansible, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, url=https://www.redhat.com, io.openshift.expose-services=, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:17:21 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:17:21 np0005604725 podman[135410]: 2026-02-02 08:17:21.361873625 +0000 UTC m=+0.185793051 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, vendor=Red Hat, Inc., version=17.1.13, summary=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-keystone, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T22:33:53Z, architecture=x86_64, build-date=2026-01-12T22:33:53Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, managed_by=tripleo_ansible, com.redhat.component=openstack-keystone-container, container_name=keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, release=1766032510) Feb 2 08:17:21 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:17:21 np0005604725 systemd[1]: tmp-crun.5R2SOI.mount: Deactivated successfully. Feb 2 08:17:21 np0005604725 podman[135411]: 2026-02-02 08:17:21.427655506 +0000 UTC m=+0.249506838 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, container_name=keystone_cron, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, managed_by=tripleo_ansible, vendor=Red Hat, Inc., distribution-scope=public, name=rhosp-rhel9/openstack-keystone, version=17.1.13, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, build-date=2026-01-12T22:33:53Z, batch=17.1_20260112.1, io.openshift.expose-services=, vcs-type=git, com.redhat.component=openstack-keystone-container, config_id=tripleo_step3, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team) Feb 2 08:17:21 np0005604725 podman[135411]: 2026-02-02 08:17:21.436771497 +0000 UTC m=+0.258622809 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, managed_by=tripleo_ansible, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, batch=17.1_20260112.1, container_name=keystone_cron, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, tcib_managed=true, io.buildah.version=1.41.5, com.redhat.component=openstack-keystone-container, name=rhosp-rhel9/openstack-keystone, build-date=2026-01-12T22:33:53Z, io.openshift.expose-services=, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:17:21 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:17:24 np0005604725 python3[135879]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/cinder.md5sum follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:17:24 np0005604725 python3[135945]: ansible-tripleo_diff_exec Invoked with command=/var/lib/container-config-scripts/pacemaker_restart_bundle.sh cinder_backup openstack-cinder-backup openstack-cinder-backup _ Started state_file=/var/lib/config-data/puppet-generated/cinder.md5sum state_file_suffix=.cinder_backup_previous_run environment={'TRIPLEO_MINOR_UPDATE': '', 'TRIPLEO_HA_WRAPPER_RESOURCE_EXISTS': 'False'} return_codes=[0] Feb 2 08:17:25 np0005604725 python3[135981]: ansible-stat Invoked with path=/tmp/tripleo_ha_image_openstack-cinder-backup follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:17:26 np0005604725 python3[136046]: ansible-ansible.legacy.command Invoked with _raw_params=pcs resource config "openstack-cinder-volume"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:26 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:17:26 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:17:26 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:17:26 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:17:26 np0005604725 podman[136090]: 2026-02-02 08:17:26.948743036 +0000 UTC m=+0.097858649 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=healthy, url=https://www.redhat.com, name=rhosp-rhel9/openstack-cinder-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, tcib_managed=true, managed_by=tripleo_ansible, build-date=2026-01-12T22:58:47Z, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, container_name=cinder_scheduler, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, com.redhat.component=openstack-cinder-scheduler-container, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, distribution-scope=public, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:58:47Z) Feb 2 08:17:26 np0005604725 podman[136092]: 2026-02-02 08:17:26.996658478 +0000 UTC m=+0.139085415 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, io.openshift.expose-services=, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, vendor=Red Hat, Inc., vcs-type=git, container_name=cinder_api_cron, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:58:44Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, name=rhosp-rhel9/openstack-cinder-api, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 cinder-api, batch=17.1_20260112.1, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, release=1766032510, build-date=2026-01-12T22:58:44Z, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:17:27 np0005604725 python3[136088]: ansible-ansible.legacy.command Invoked with _raw_params=puppet apply --detailed-exitcodes --summarize --color=false --modulepath '/etc/puppet/modules:/opt/stack/puppet-modules:/usr/share/openstack-puppet/modules' --tags 'pacemaker::resource::bundle,pacemaker::property,pacemaker::resource::ip,pacemaker::resource::ocf,pacemaker::constraint::order,pacemaker::constraint::colocation' -e 'include ::tripleo::profile::base::pacemaker; include ::tripleo::profile::pacemaker::cinder::volume_bundle'#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:27 np0005604725 podman[136092]: 2026-02-02 08:17:27.01040113 +0000 UTC m=+0.152828057 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.expose-services=, build-date=2026-01-12T22:58:44Z, container_name=cinder_api_cron, org.opencontainers.image.created=2026-01-12T22:58:44Z, architecture=x86_64, distribution-scope=public, url=https://www.redhat.com, tcib_managed=true, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, managed_by=tripleo_ansible, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, version=17.1.13, com.redhat.component=openstack-cinder-api-container, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 cinder-api, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-api, io.buildah.version=1.41.5) Feb 2 08:17:27 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:17:27 np0005604725 podman[136089]: 2026-02-02 08:17:27.058952002 +0000 UTC m=+0.209098256 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, managed_by=tripleo_ansible, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, distribution-scope=public, com.redhat.component=openstack-ceilometer-central-container, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 ceilometer-central, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, container_name=ceilometer_agent_central, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, name=rhosp-rhel9/openstack-ceilometer-central, org.opencontainers.image.created=2026-01-12T23:07:24Z, architecture=x86_64, url=https://www.redhat.com, io.openshift.expose-services=, build-date=2026-01-12T23:07:24Z, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, tcib_managed=true, vcs-type=git, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc.) Feb 2 08:17:27 np0005604725 podman[136089]: 2026-02-02 08:17:27.087020774 +0000 UTC m=+0.237167018 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, container_name=ceilometer_agent_central, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T23:07:24Z, com.redhat.component=openstack-ceilometer-central-container, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, vendor=Red Hat, Inc., io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T23:07:24Z, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vcs-type=git, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, description=Red Hat OpenStack Platform 17.1 ceilometer-central, name=rhosp-rhel9/openstack-ceilometer-central, tcib_managed=true, managed_by=tripleo_ansible, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, distribution-scope=public, release=1766032510) Feb 2 08:17:27 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:17:27 np0005604725 podman[136091]: 2026-02-02 08:17:27.102467689 +0000 UTC m=+0.249528128 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, vendor=Red Hat, Inc., container_name=clustercheck, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, config_id=tripleo_step2, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, io.openshift.expose-services=, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-mariadb-container, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git) Feb 2 08:17:27 np0005604725 podman[136090]: 2026-02-02 08:17:27.127000284 +0000 UTC m=+0.276115897 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, com.redhat.component=openstack-cinder-scheduler-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:58:47Z, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, version=17.1.13, io.openshift.expose-services=, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-scheduler, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., url=https://www.redhat.com, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, org.opencontainers.image.created=2026-01-12T22:58:47Z, vcs-type=git, container_name=cinder_scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, managed_by=tripleo_ansible, config_id=tripleo_step4, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.buildah.version=1.41.5) Feb 2 08:17:27 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:17:27 np0005604725 podman[136091]: 2026-02-02 08:17:27.163843636 +0000 UTC m=+0.310904075 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb, container_name=clustercheck, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:18Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step2, tcib_managed=true, url=https://www.redhat.com, architecture=x86_64, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, version=17.1.13, build-date=2026-01-12T22:10:18Z, name=rhosp-rhel9/openstack-mariadb, managed_by=tripleo_ansible, vendor=Red Hat, Inc.) Feb 2 08:17:27 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:17:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:17:28 np0005604725 podman[136292]: 2026-02-02 08:17:28.390804059 +0000 UTC m=+0.140420146 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=healthy, batch=17.1_20260112.1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, build-date=2026-01-12T23:07:25Z, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, release=1766032510, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, tcib_managed=true, org.opencontainers.image.created=2026-01-12T23:07:25Z, io.openshift.expose-services=, container_name=ceilometer_agent_notification, config_id=tripleo_step4, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, version=17.1.13, vendor=Red Hat, Inc., architecture=x86_64, com.redhat.component=openstack-ceilometer-notification-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, name=rhosp-rhel9/openstack-ceilometer-notification, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, url=https://www.redhat.com, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:17:28 np0005604725 podman[136292]: 2026-02-02 08:17:28.418843091 +0000 UTC m=+0.168459178 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, container_name=ceilometer_agent_notification, batch=17.1_20260112.1, io.openshift.expose-services=, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, name=rhosp-rhel9/openstack-ceilometer-notification, distribution-scope=public, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T23:07:25Z, com.redhat.component=openstack-ceilometer-notification-container, maintainer=OpenStack TripleO Team, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, url=https://www.redhat.com, tcib_managed=true, build-date=2026-01-12T23:07:25Z) Feb 2 08:17:28 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:17:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:17:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:17:28 np0005604725 podman[136318]: 2026-02-02 08:17:28.562545197 +0000 UTC m=+0.097615841 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, tcib_managed=true, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, com.redhat.component=openstack-heat-api-container, description=Red Hat OpenStack Platform 17.1 heat-api, container_name=heat_api_cron, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:53:19Z, maintainer=OpenStack TripleO Team, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, release=1766032510, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible, vcs-type=git, build-date=2026-01-12T22:53:19Z, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, config_id=tripleo_step4, url=https://www.redhat.com, vcs-ref=755001522886c265e88561b4997cab642504a845, name=rhosp-rhel9/openstack-heat-api, version=17.1.13) Feb 2 08:17:28 np0005604725 podman[136318]: 2026-02-02 08:17:28.601104502 +0000 UTC m=+0.136175136 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, container_name=heat_api_cron, name=rhosp-rhel9/openstack-heat-api, release=1766032510, io.buildah.version=1.41.5, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-type=git, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, com.redhat.component=openstack-heat-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., version=17.1.13, distribution-scope=public, build-date=2026-01-12T22:53:19Z, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:53:19Z, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, tcib_managed=true, managed_by=tripleo_ansible) Feb 2 08:17:28 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:17:28 np0005604725 podman[136319]: 2026-02-02 08:17:28.611422099 +0000 UTC m=+0.142156380 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=healthy, io.openshift.expose-services=, version=17.1.13, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 heat-engine, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, vendor=Red Hat, Inc., container_name=heat_engine, config_id=tripleo_step4, com.redhat.component=openstack-heat-engine-container, description=Red Hat OpenStack Platform 17.1 heat-engine, build-date=2026-01-12T22:53:38Z, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, vcs-ref=755001522886c265e88561b4997cab642504a845, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, batch=17.1_20260112.1, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, name=rhosp-rhel9/openstack-heat-engine, org.opencontainers.image.created=2026-01-12T22:53:38Z, io.buildah.version=1.41.5) Feb 2 08:17:28 np0005604725 podman[136319]: 2026-02-02 08:17:28.693960545 +0000 UTC m=+0.224694846 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, url=https://www.redhat.com, vendor=Red Hat, Inc., architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-heat-engine-container, managed_by=tripleo_ansible, release=1766032510, description=Red Hat OpenStack Platform 17.1 heat-engine, org.opencontainers.image.created=2026-01-12T22:53:38Z, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 heat-engine, build-date=2026-01-12T22:53:38Z, io.openshift.expose-services=, batch=17.1_20260112.1, distribution-scope=public, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, vcs-ref=755001522886c265e88561b4997cab642504a845, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-heat-engine, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, container_name=heat_engine) Feb 2 08:17:28 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:17:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:17:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:17:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:17:30 np0005604725 podman[136456]: 2026-02-02 08:17:30.331333681 +0000 UTC m=+0.078873926 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, name=rhosp-rhel9/openstack-heat-api-cfn, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-ref=755001522886c265e88561b4997cab642504a845, tcib_managed=true, io.buildah.version=1.41.5, batch=17.1_20260112.1, build-date=2026-01-12T22:54:02Z, io.openshift.expose-services=, release=1766032510, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, version=17.1.13, vcs-type=git, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-heat-api-cfn-container, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:54:02Z, managed_by=tripleo_ansible, container_name=heat_api_cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, url=https://www.redhat.com, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:17:30 np0005604725 podman[136454]: 2026-02-02 08:17:30.384530306 +0000 UTC m=+0.135933649 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:58:44Z, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, maintainer=OpenStack TripleO Team, version=17.1.13, release=1766032510, tcib_managed=true, io.openshift.expose-services=, name=rhosp-rhel9/openstack-cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, url=https://www.redhat.com, container_name=cinder_api, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.buildah.version=1.41.5, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:58:44Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, com.redhat.component=openstack-cinder-api-container, batch=17.1_20260112.1, distribution-scope=public, vcs-type=git) Feb 2 08:17:30 np0005604725 podman[136456]: 2026-02-02 08:17:30.391171169 +0000 UTC m=+0.138711294 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, config_id=tripleo_step4, architecture=x86_64, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-heat-api-cfn, vendor=Red Hat, Inc., build-date=2026-01-12T22:54:02Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, vcs-ref=755001522886c265e88561b4997cab642504a845, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.created=2026-01-12T22:54:02Z, container_name=heat_api_cfn, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, version=17.1.13, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, com.redhat.component=openstack-heat-api-cfn-container, batch=17.1_20260112.1, managed_by=tripleo_ansible) Feb 2 08:17:30 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:17:30 np0005604725 podman[136454]: 2026-02-02 08:17:30.452710491 +0000 UTC m=+0.204113814 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.expose-services=, name=rhosp-rhel9/openstack-cinder-api, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, tcib_managed=true, version=17.1.13, distribution-scope=public, io.buildah.version=1.41.5, vendor=Red Hat, Inc., architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, com.redhat.component=openstack-cinder-api-container, managed_by=tripleo_ansible, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=cinder_api, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:58:44Z, build-date=2026-01-12T22:58:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e) Feb 2 08:17:30 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:17:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:17:30 np0005604725 systemd[1]: tmp-crun.3ZSfVL.mount: Deactivated successfully. Feb 2 08:17:30 np0005604725 podman[136455]: 2026-02-02 08:17:30.548636108 +0000 UTC m=+0.299413152 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 cron, com.redhat.component=openstack-cron-container, url=https://www.redhat.com, name=rhosp-rhel9/openstack-cron, build-date=2026-01-12T22:10:15Z, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, tcib_managed=true, batch=17.1_20260112.1, managed_by=tripleo_ansible, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=logrotate_crond, release=1766032510, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, config_id=tripleo_step4, io.buildah.version=1.41.5, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:15Z, distribution-scope=public, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 cron) Feb 2 08:17:30 np0005604725 podman[136455]: 2026-02-02 08:17:30.584930433 +0000 UTC m=+0.335707477 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, com.redhat.component=openstack-cron-container, build-date=2026-01-12T22:10:15Z, vcs-type=git, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, name=rhosp-rhel9/openstack-cron, release=1766032510, container_name=logrotate_crond, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, vendor=Red Hat, Inc., url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 cron, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, architecture=x86_64, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:15Z, summary=Red Hat OpenStack Platform 17.1 cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1) Feb 2 08:17:30 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:17:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:17:30 np0005604725 podman[136522]: 2026-02-02 08:17:30.689118805 +0000 UTC m=+0.142270202 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:52:22Z, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, io.buildah.version=1.41.5, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=manila_api_cron, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, build-date=2026-01-12T22:52:22Z, name=rhosp-rhel9/openstack-manila-api, com.redhat.component=openstack-manila-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, vcs-type=git, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api) Feb 2 08:17:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:17:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:17:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:17:30 np0005604725 podman[136522]: 2026-02-02 08:17:30.727802424 +0000 UTC m=+0.180953811 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-manila-api, com.redhat.component=openstack-manila-api-container, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:52:22Z, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, description=Red Hat OpenStack Platform 17.1 manila-api, build-date=2026-01-12T22:52:22Z, summary=Red Hat OpenStack Platform 17.1 manila-api, config_id=tripleo_step4, architecture=x86_64, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, tcib_managed=true, distribution-scope=public, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, container_name=manila_api_cron, vcs-type=git, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, release=1766032510) Feb 2 08:17:30 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:17:30 np0005604725 podman[136565]: 2026-02-02 08:17:30.782143543 +0000 UTC m=+0.067891817 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=healthy, com.redhat.component=openstack-nova-scheduler-container, architecture=x86_64, tcib_managed=true, vcs-type=git, batch=17.1_20260112.1, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, io.buildah.version=1.41.5, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, version=17.1.13, org.opencontainers.image.created=2026-01-12T23:32:05Z, container_name=nova_scheduler, name=rhosp-rhel9/openstack-nova-scheduler, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, config_id=tripleo_step4, managed_by=tripleo_ansible, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T23:32:05Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler) Feb 2 08:17:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:17:30 np0005604725 podman[136565]: 2026-02-02 08:17:30.810872297 +0000 UTC m=+0.096620631 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, build-date=2026-01-12T23:32:05Z, version=17.1.13, io.openshift.expose-services=, name=rhosp-rhel9/openstack-nova-scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 nova-scheduler, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:32:05Z, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, tcib_managed=true, vcs-type=git, release=1766032510, url=https://www.redhat.com, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, container_name=nova_scheduler, distribution-scope=public, com.redhat.component=openstack-nova-scheduler-container, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:17:30 np0005604725 podman[136564]: 2026-02-02 08:17:30.822329539 +0000 UTC m=+0.115047787 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=healthy, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:52:54Z, org.opencontainers.image.created=2026-01-12T22:52:54Z, com.redhat.component=openstack-manila-scheduler-container, release=1766032510, architecture=x86_64, io.openshift.expose-services=, container_name=manila_scheduler, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, url=https://www.redhat.com, distribution-scope=public, io.buildah.version=1.41.5, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, description=Red Hat OpenStack Platform 17.1 manila-scheduler, name=rhosp-rhel9/openstack-manila-scheduler, version=17.1.13) Feb 2 08:17:30 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:17:30 np0005604725 podman[136564]: 2026-02-02 08:17:30.845770279 +0000 UTC m=+0.138488507 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:52:54Z, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, architecture=x86_64, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-manila-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, maintainer=OpenStack TripleO Team, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=manila_scheduler, version=17.1.13, config_id=tripleo_step4, io.buildah.version=1.41.5, release=1766032510, build-date=2026-01-12T22:52:54Z, com.redhat.component=openstack-manila-scheduler-container, vcs-type=git, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, url=https://www.redhat.com, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 manila-scheduler, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb) Feb 2 08:17:30 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:17:30 np0005604725 podman[136608]: 2026-02-02 08:17:30.855961102 +0000 UTC m=+0.050626796 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=healthy, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, name=rhosp-rhel9/openstack-neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z, description=Red Hat OpenStack Platform 17.1 neutron-server, container_name=neutron_api, summary=Red Hat OpenStack Platform 17.1 neutron-server, batch=17.1_20260112.1, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, tcib_managed=true, vendor=Red Hat, Inc., org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.expose-services=, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, url=https://www.redhat.com, build-date=2026-01-12T22:57:35Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-neutron-server-container, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f) Feb 2 08:17:30 np0005604725 podman[136549]: 2026-02-02 08:17:30.763016976 +0000 UTC m=+0.069857357 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=healthy, build-date=2026-01-12T23:32:18Z, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, summary=Red Hat OpenStack Platform 17.1 nova-conductor, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, vcs-type=git, container_name=nova_conductor, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T23:32:18Z, managed_by=tripleo_ansible, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, config_id=tripleo_step4, version=17.1.13, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 nova-conductor, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, name=rhosp-rhel9/openstack-nova-conductor, com.redhat.component=openstack-nova-conductor-container, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64) Feb 2 08:17:30 np0005604725 podman[136549]: 2026-02-02 08:17:30.895678523 +0000 UTC m=+0.202518964 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, tcib_managed=true, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, description=Red Hat OpenStack Platform 17.1 nova-conductor, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, org.opencontainers.image.created=2026-01-12T23:32:18Z, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, build-date=2026-01-12T23:32:18Z, url=https://www.redhat.com, managed_by=tripleo_ansible, container_name=nova_conductor, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-nova-conductor, com.redhat.component=openstack-nova-conductor-container, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.expose-services=, config_id=tripleo_step4, vcs-type=git, vendor=Red Hat, Inc., release=1766032510) Feb 2 08:17:30 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:17:30 np0005604725 podman[136552]: 2026-02-02 08:17:30.968542452 +0000 UTC m=+0.272234437 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, com.redhat.component=openstack-heat-api-container, vcs-ref=755001522886c265e88561b4997cab642504a845, config_id=tripleo_step4, build-date=2026-01-12T22:53:19Z, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, container_name=heat_api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:53:19Z, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, name=rhosp-rhel9/openstack-heat-api, architecture=x86_64, batch=17.1_20260112.1, version=17.1.13, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, vendor=Red Hat, Inc.) Feb 2 08:17:31 np0005604725 podman[136608]: 2026-02-02 08:17:31.015293469 +0000 UTC m=+0.209959173 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:57:35Z, release=1766032510, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, container_name=neutron_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, name=rhosp-rhel9/openstack-neutron-server, vcs-type=git, io.openshift.expose-services=, build-date=2026-01-12T22:57:35Z, summary=Red Hat OpenStack Platform 17.1 neutron-server, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, description=Red Hat OpenStack Platform 17.1 neutron-server, tcib_managed=true, url=https://www.redhat.com, distribution-scope=public, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1) Feb 2 08:17:31 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:17:31 np0005604725 podman[136552]: 2026-02-02 08:17:31.069258527 +0000 UTC m=+0.372950512 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, managed_by=tripleo_ansible, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, build-date=2026-01-12T22:53:19Z, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-heat-api-container, description=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, architecture=x86_64, release=1766032510, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, name=rhosp-rhel9/openstack-heat-api, config_id=tripleo_step4, container_name=heat_api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:53:19Z, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, vcs-type=git) Feb 2 08:17:31 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:17:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:17:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:17:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:17:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:17:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:17:34 np0005604725 podman[136885]: 2026-02-02 08:17:34.365735635 +0000 UTC m=+0.097445565 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=healthy, version=17.1.13, managed_by=tripleo_ansible, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, com.redhat.component=openstack-nova-novncproxy-container, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, name=rhosp-rhel9/openstack-nova-novncproxy, distribution-scope=public, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, tcib_managed=true, container_name=nova_vnc_proxy, url=https://www.redhat.com, batch=17.1_20260112.1, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T23:32:22Z, io.openshift.expose-services=, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, config_id=tripleo_step4, io.buildah.version=1.41.5) Feb 2 08:17:34 np0005604725 systemd[1]: tmp-crun.Qev30k.mount: Deactivated successfully. Feb 2 08:17:34 np0005604725 podman[136880]: 2026-02-02 08:17:34.401109982 +0000 UTC m=+0.135363091 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=healthy, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, config_id=tripleo_step4, name=rhosp-rhel9/openstack-swift-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:50:57Z, vcs-type=git, architecture=x86_64, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.component=openstack-swift-container-container, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, version=17.1.13, batch=17.1_20260112.1, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, container_name=swift_container_server, managed_by=tripleo_ansible, build-date=2026-01-12T22:50:57Z) Feb 2 08:17:34 np0005604725 podman[136883]: 2026-02-02 08:17:34.418881908 +0000 UTC m=+0.153344993 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=healthy, release=1766032510, architecture=x86_64, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, version=17.1.13, distribution-scope=public, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., config_id=tripleo_step4, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, tcib_managed=true, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.created=2026-01-12T22:50:57Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, container_name=swift_container_replicator, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, build-date=2026-01-12T22:50:57Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.component=openstack-swift-container-container) Feb 2 08:17:34 np0005604725 podman[136886]: 2026-02-02 08:17:34.472374312 +0000 UTC m=+0.198344716 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=healthy, org.opencontainers.image.created=2026-01-12T22:50:44Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, container_name=swift_account_server, com.redhat.component=openstack-swift-account-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-account, url=https://www.redhat.com, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, release=1766032510, version=17.1.13, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-account, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-account, build-date=2026-01-12T22:50:44Z) Feb 2 08:17:34 np0005604725 podman[136883]: 2026-02-02 08:17:34.52276422 +0000 UTC m=+0.257227275 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, summary=Red Hat OpenStack Platform 17.1 swift-container, build-date=2026-01-12T22:50:57Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=swift_container_replicator, io.buildah.version=1.41.5, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, url=https://www.redhat.com, managed_by=tripleo_ansible, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-container-container, description=Red Hat OpenStack Platform 17.1 swift-container, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.expose-services=, batch=17.1_20260112.1, config_id=tripleo_step4, name=rhosp-rhel9/openstack-swift-container, vcs-type=git, distribution-scope=public) Feb 2 08:17:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:17:34 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Deactivated successfully. Feb 2 08:17:34 np0005604725 podman[136884]: 2026-02-02 08:17:34.524954818 +0000 UTC m=+0.258795614 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-account, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, architecture=x86_64, config_id=tripleo_step4, io.buildah.version=1.41.5, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, batch=17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, name=rhosp-rhel9/openstack-swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_account_replicator, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, vcs-type=git, version=17.1.13, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:50:44Z, summary=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true, distribution-scope=public, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:50:44Z, com.redhat.component=openstack-swift-account-container, release=1766032510) Feb 2 08:17:34 np0005604725 podman[136884]: 2026-02-02 08:17:34.609707092 +0000 UTC m=+0.343547878 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, io.openshift.expose-services=, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, container_name=swift_account_replicator, org.opencontainers.image.created=2026-01-12T22:50:44Z, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.component=openstack-swift-account-container, release=1766032510, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, name=rhosp-rhel9/openstack-swift-account, managed_by=tripleo_ansible, batch=17.1_20260112.1, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-account, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, vendor=Red Hat, Inc., build-date=2026-01-12T22:50:44Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account) Feb 2 08:17:34 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:17:34 np0005604725 podman[136880]: 2026-02-02 08:17:34.648778543 +0000 UTC m=+0.383031622 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, vcs-type=git, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, tcib_managed=true, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, config_id=tripleo_step4, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, io.openshift.expose-services=, com.redhat.component=openstack-swift-container-container, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:57Z, name=rhosp-rhel9/openstack-swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, container_name=swift_container_server, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:17:34 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Deactivated successfully. Feb 2 08:17:34 np0005604725 podman[137045]: 2026-02-02 08:17:34.658529132 +0000 UTC m=+0.109859027 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=healthy, batch=17.1_20260112.1, com.redhat.component=openstack-swift-object-container, org.opencontainers.image.created=2026-01-12T22:50:56Z, name=rhosp-rhel9/openstack-swift-object, container_name=swift_object_replicator, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, config_id=tripleo_step4, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:56Z, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, version=17.1.13, tcib_managed=true, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., release=1766032510, url=https://www.redhat.com) Feb 2 08:17:34 np0005604725 podman[136886]: 2026-02-02 08:17:34.663792604 +0000 UTC m=+0.389763038 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, vendor=Red Hat, Inc., batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_account_server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, release=1766032510, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-account, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, build-date=2026-01-12T22:50:44Z, summary=Red Hat OpenStack Platform 17.1 swift-account, url=https://www.redhat.com, vcs-type=git, distribution-scope=public, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:50:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-swift-account, com.redhat.component=openstack-swift-account-container) Feb 2 08:17:34 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Deactivated successfully. Feb 2 08:17:34 np0005604725 podman[136885]: 2026-02-02 08:17:34.737485348 +0000 UTC m=+0.469195278 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, release=1766032510, config_id=tripleo_step4, url=https://www.redhat.com, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, com.redhat.component=openstack-nova-novncproxy-container, vcs-type=git, org.opencontainers.image.created=2026-01-12T23:32:22Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, batch=17.1_20260112.1, build-date=2026-01-12T23:32:22Z, tcib_managed=true, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, managed_by=tripleo_ansible, container_name=nova_vnc_proxy, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-nova-novncproxy) Feb 2 08:17:34 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Deactivated successfully. Feb 2 08:17:34 np0005604725 podman[137045]: 2026-02-02 08:17:34.76876128 +0000 UTC m=+0.220091155 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.created=2026-01-12T22:50:56Z, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:50:56Z, container_name=swift_object_replicator, release=1766032510, name=rhosp-rhel9/openstack-swift-object, com.redhat.component=openstack-swift-object-container, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, vcs-type=git, version=17.1.13, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:17:34 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Deactivated successfully. Feb 2 08:17:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:17:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:17:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:17:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:17:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:17:35 np0005604725 podman[137229]: 2026-02-02 08:17:35.929804898 +0000 UTC m=+0.099155518 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=healthy, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 ovn-controller, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 ovn-controller, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, container_name=ovn_controller, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, architecture=x86_64, vcs-type=git, com.redhat.component=openstack-ovn-controller-container, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-ovn-controller, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, url=https://www.redhat.com, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:36:40Z, build-date=2026-01-12T22:36:40Z, config_id=tripleo_step4, distribution-scope=public, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, vendor=Red Hat, Inc., vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller) Feb 2 08:17:35 np0005604725 python3[137228]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/cinder.md5sum follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:17:35 np0005604725 podman[137229]: 2026-02-02 08:17:35.95100545 +0000 UTC m=+0.120356110 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, version=17.1.13, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, vendor=Red Hat, Inc., url=https://www.redhat.com, vcs-type=git, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=ovn_controller, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, batch=17.1_20260112.1, io.openshift.expose-services=, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 ovn-controller, distribution-scope=public, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, name=rhosp-rhel9/openstack-ovn-controller, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 ovn-controller, org.opencontainers.image.created=2026-01-12T22:36:40Z, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, tcib_managed=true, build-date=2026-01-12T22:36:40Z, com.redhat.component=openstack-ovn-controller-container, io.buildah.version=1.41.5, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:17:35 np0005604725 systemd[1]: tmp-crun.yrzWWa.mount: Deactivated successfully. Feb 2 08:17:35 np0005604725 podman[137257]: 2026-02-02 08:17:35.990788062 +0000 UTC m=+0.152372254 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, config_id=ovn_cluster_northd, io.buildah.version=1.41.5, build-date=2026-01-12T22:34:06Z, distribution-scope=public, io.openshift.expose-services=, com.redhat.component=openstack-ovn-northd-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, name=rhosp-rhel9/openstack-ovn-northd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, version=17.1.13, vcs-type=git, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 ovn-northd, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, tcib_managed=true, container_name=ovn_cluster_northd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, description=Red Hat OpenStack Platform 17.1 ovn-northd, org.opencontainers.image.created=2026-01-12T22:34:06Z, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, release=1766032510) Feb 2 08:17:36 np0005604725 podman[137257]: 2026-02-02 08:17:36.034063741 +0000 UTC m=+0.195647953 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=ovn_cluster_northd, description=Red Hat OpenStack Platform 17.1 ovn-northd, org.opencontainers.image.created=2026-01-12T22:34:06Z, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, distribution-scope=public, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, tcib_managed=true, url=https://www.redhat.com, version=17.1.13, architecture=x86_64, build-date=2026-01-12T22:34:06Z, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-ovn-northd-container, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vendor=Red Hat, Inc., release=1766032510, io.openshift.expose-services=, name=rhosp-rhel9/openstack-ovn-northd, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 ovn-northd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, container_name=ovn_cluster_northd, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}) Feb 2 08:17:36 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:17:36 np0005604725 podman[137268]: 2026-02-02 08:17:36.048091052 +0000 UTC m=+0.201769851 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=healthy, io.buildah.version=1.41.5, build-date=2026-01-12T22:34:35Z, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 placement-api, tcib_managed=true, vcs-type=git, container_name=placement_api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 placement-api, name=rhosp-rhel9/openstack-placement-api, version=17.1.13, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:34:35Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, com.redhat.component=openstack-placement-api-container, distribution-scope=public, release=1766032510, vendor=Red Hat, Inc., batch=17.1_20260112.1) Feb 2 08:17:36 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Deactivated successfully. Feb 2 08:17:36 np0005604725 podman[137268]: 2026-02-02 08:17:36.101997349 +0000 UTC m=+0.255676168 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, vendor=Red Hat, Inc., org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-placement-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 placement-api, vcs-type=git, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:34:35Z, io.buildah.version=1.41.5, tcib_managed=true, managed_by=tripleo_ansible, io.openshift.expose-services=, url=https://www.redhat.com, container_name=placement_api, summary=Red Hat OpenStack Platform 17.1 placement-api, build-date=2026-01-12T22:34:35Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-placement-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, release=1766032510, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:17:36 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:17:36 np0005604725 podman[137240]: 2026-02-02 08:17:36.104552517 +0000 UTC m=+0.265894022 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:50:56Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-object-container, batch=17.1_20260112.1, managed_by=tripleo_ansible, url=https://www.redhat.com, release=1766032510, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.openshift.expose-services=, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_object_server, summary=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, name=rhosp-rhel9/openstack-swift-object, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:17:36 np0005604725 podman[137238]: 2026-02-02 08:17:36.246781538 +0000 UTC m=+0.405861363 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, container_name=memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:12:26Z, architecture=x86_64, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, com.redhat.component=openstack-memcached-container, name=rhosp-rhel9/openstack-memcached, summary=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vcs-type=git, description=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step1, build-date=2026-01-12T22:12:26Z, vendor=Red Hat, Inc., version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, batch=17.1_20260112.1) Feb 2 08:17:36 np0005604725 podman[137238]: 2026-02-02 08:17:36.26442881 +0000 UTC m=+0.423508605 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, config_id=tripleo_step1, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public, architecture=x86_64, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-memcached, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vcs-type=git, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, com.redhat.component=openstack-memcached-container, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:12:26Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510) Feb 2 08:17:36 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:17:36 np0005604725 podman[137240]: 2026-02-02 08:17:36.303028146 +0000 UTC m=+0.464369671 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, summary=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:50:56Z, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, build-date=2026-01-12T22:50:56Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=swift_object_server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, architecture=x86_64, batch=17.1_20260112.1, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true) Feb 2 08:17:36 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Deactivated successfully. Feb 2 08:17:36 np0005604725 python3[137375]: ansible-tripleo_diff_exec Invoked with command=/var/lib/container-config-scripts/pacemaker_restart_bundle.sh cinder_volume openstack-cinder-volume openstack-cinder-volume _ Started state_file=/var/lib/config-data/puppet-generated/cinder.md5sum state_file_suffix=.cinder_volume_previous_run environment={'TRIPLEO_MINOR_UPDATE': '', 'TRIPLEO_HA_WRAPPER_RESOURCE_EXISTS': 'False'} return_codes=[0] Feb 2 08:17:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:17:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:17:36 np0005604725 podman[137438]: 2026-02-02 08:17:36.821021934 +0000 UTC m=+0.072892651 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, build-date=2026-01-12T22:10:14Z, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, com.redhat.component=openstack-qdrouterd-container, container_name=metrics_qdr, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp-rhel9/openstack-qdrouterd, tcib_managed=true, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:14Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, architecture=x86_64, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13) Feb 2 08:17:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:17:36 np0005604725 python3[137432]: ansible-stat Invoked with path=/tmp/tripleo_ha_image_openstack-cinder-volume follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:17:36 np0005604725 podman[137433]: 2026-02-02 08:17:36.871707412 +0000 UTC m=+0.123050413 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=healthy, release=1766032510, com.redhat.component=openstack-glance-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, url=https://www.redhat.com, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 glance-api, container_name=glance_api_cron, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, architecture=x86_64, vcs-type=git, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_step4, build-date=2026-01-12T22:34:42Z, version=17.1.13, description=Red Hat OpenStack Platform 17.1 glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, org.opencontainers.image.created=2026-01-12T22:34:42Z) Feb 2 08:17:36 np0005604725 podman[137470]: 2026-02-02 08:17:36.907689937 +0000 UTC m=+0.068701941 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=healthy, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, managed_by=tripleo_ansible, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, url=https://www.redhat.com, distribution-scope=public, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:50:56Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, batch=17.1_20260112.1, container_name=swift_rsync, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:56Z, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-swift-object, vendor=Red Hat, Inc., config_id=tripleo_step4, io.openshift.expose-services=, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:17:36 np0005604725 podman[137433]: 2026-02-02 08:17:36.934737929 +0000 UTC m=+0.186080930 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, com.redhat.component=openstack-glance-api-container, vendor=Red Hat, Inc., io.buildah.version=1.41.5, container_name=glance_api_cron, org.opencontainers.image.created=2026-01-12T22:34:42Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, description=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, build-date=2026-01-12T22:34:42Z) Feb 2 08:17:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:17:36 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:17:37 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:17:37 np0005604725 podman[137438]: 2026-02-02 08:17:37.028059266 +0000 UTC m=+0.279930003 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, io.openshift.expose-services=, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:14Z, tcib_managed=true, config_id=tripleo_step1, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, build-date=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, release=1766032510, container_name=metrics_qdr, name=rhosp-rhel9/openstack-qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, managed_by=tripleo_ansible, com.redhat.component=openstack-qdrouterd-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1) Feb 2 08:17:37 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:17:37 np0005604725 podman[137579]: 2026-02-02 08:17:37.100314147 +0000 UTC m=+0.067921498 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.buildah.version=1.41.5, managed_by=tripleo_ansible, build-date=2026-01-12T22:34:42Z, com.redhat.component=openstack-glance-api-container, name=rhosp-rhel9/openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, batch=17.1_20260112.1, container_name=glance_api, version=17.1.13, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:42Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, vcs-type=git, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, summary=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:17:37 np0005604725 podman[137563]: 2026-02-02 08:17:37.032045838 +0000 UTC m=+0.069302399 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=healthy, config_id=tripleo_step4, build-date=2026-01-12T22:34:42Z, release=1766032510, managed_by=tripleo_ansible, container_name=glance_api_internal, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, io.openshift.expose-services=, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:34:42Z, batch=17.1_20260112.1, com.redhat.component=openstack-glance-api-container, architecture=x86_64, name=rhosp-rhel9/openstack-glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, vcs-type=git) Feb 2 08:17:37 np0005604725 podman[137563]: 2026-02-02 08:17:37.234741948 +0000 UTC m=+0.271998509 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, release=1766032510, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, build-date=2026-01-12T22:34:42Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, config_id=tripleo_step4, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:34:42Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=glance_api_internal, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, name=rhosp-rhel9/openstack-glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, com.redhat.component=openstack-glance-api-container) Feb 2 08:17:37 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Deactivated successfully. Feb 2 08:17:37 np0005604725 podman[137470]: 2026-02-02 08:17:37.297178646 +0000 UTC m=+0.458190630 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, name=rhosp-rhel9/openstack-swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, url=https://www.redhat.com, config_id=tripleo_step4, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-object, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, architecture=x86_64, build-date=2026-01-12T22:50:56Z, org.opencontainers.image.created=2026-01-12T22:50:56Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, container_name=swift_rsync, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, com.redhat.component=openstack-swift-object-container, release=1766032510, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, version=17.1.13, vendor=Red Hat, Inc.) Feb 2 08:17:37 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:17:37 np0005604725 podman[137579]: 2026-02-02 08:17:37.310536477 +0000 UTC m=+0.278143898 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, batch=17.1_20260112.1, io.openshift.expose-services=, container_name=glance_api, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:34:42Z, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, release=1766032510, architecture=x86_64, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-glance-api-container, description=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, build-date=2026-01-12T22:34:42Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:17:37 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Deactivated successfully. Feb 2 08:17:37 np0005604725 python3[137651]: ansible-ansible.legacy.command Invoked with _raw_params=pcs resource config "openstack-manila-share"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:38 np0005604725 python3[137739]: ansible-ansible.legacy.command Invoked with _raw_params=puppet apply --detailed-exitcodes --summarize --color=false --modulepath '/etc/puppet/modules:/opt/stack/puppet-modules:/usr/share/openstack-puppet/modules' --tags 'pacemaker::resource::bundle,pacemaker::property,pacemaker::resource::ip,pacemaker::resource::ocf,pacemaker::constraint::order,pacemaker::constraint::colocation' -e 'include ::tripleo::profile::base::pacemaker; include ::tripleo::profile::pacemaker::manila::share_bundle'#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:41 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:17:41 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:17:41 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:17:41 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:17:41 np0005604725 podman[137881]: 2026-02-02 08:17:41.323317297 +0000 UTC m=+0.067416503 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=healthy, io.openshift.expose-services=, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T23:31:50Z, description=Red Hat OpenStack Platform 17.1 nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, release=1766032510, name=rhosp-rhel9/openstack-nova-api, tcib_managed=true, vcs-type=git, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, container_name=nova_api_cron, distribution-scope=public, vendor=Red Hat, Inc., batch=17.1_20260112.1, url=https://www.redhat.com, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:31:50Z) Feb 2 08:17:41 np0005604725 podman[137881]: 2026-02-02 08:17:41.36407699 +0000 UTC m=+0.108176216 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, url=https://www.redhat.com, container_name=nova_api_cron, release=1766032510, tcib_managed=true, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:31:50Z, config_id=tripleo_step4, distribution-scope=public, build-date=2026-01-12T23:31:50Z, version=17.1.13, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, vcs-type=git, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, name=rhosp-rhel9/openstack-nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5) Feb 2 08:17:41 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:17:41 np0005604725 podman[137890]: 2026-02-02 08:17:41.366550026 +0000 UTC m=+0.097286321 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=healthy, vcs-type=git, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, batch=17.1_20260112.1, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.13, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:50:51Z, io.openshift.expose-services=, release=1766032510, container_name=swift_proxy, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:50:51Z, name=rhosp-rhel9/openstack-swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-swift-proxy-server-container, io.buildah.version=1.41.5, vendor=Red Hat, Inc., url=https://www.redhat.com, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}) Feb 2 08:17:41 np0005604725 podman[137883]: 2026-02-02 08:17:41.427691475 +0000 UTC m=+0.162203096 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=healthy, com.redhat.component=openstack-nova-api-container, io.buildah.version=1.41.5, tcib_managed=true, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, vcs-type=git, version=17.1.13, architecture=x86_64, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T23:31:50Z, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1, build-date=2026-01-12T23:31:50Z, container_name=nova_api, release=1766032510, summary=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:17:41 np0005604725 podman[137882]: 2026-02-02 08:17:41.440164248 +0000 UTC m=+0.179688743 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=healthy, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, build-date=2026-01-12T23:31:50Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, version=17.1.13, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, managed_by=tripleo_ansible, container_name=nova_metadata, com.redhat.component=openstack-nova-api-container, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp-rhel9/openstack-nova-api, distribution-scope=public, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, architecture=x86_64, vendor=Red Hat, Inc., url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, vcs-type=git, io.buildah.version=1.41.5) Feb 2 08:17:41 np0005604725 podman[137883]: 2026-02-02 08:17:41.523913771 +0000 UTC m=+0.258425382 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, name=rhosp-rhel9/openstack-nova-api, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.buildah.version=1.41.5, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, com.redhat.component=openstack-nova-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.13, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, managed_by=tripleo_ansible, batch=17.1_20260112.1, build-date=2026-01-12T23:31:50Z, vendor=Red Hat, Inc., architecture=x86_64, container_name=nova_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_step4) Feb 2 08:17:41 np0005604725 podman[137882]: 2026-02-02 08:17:41.531822965 +0000 UTC m=+0.271347450 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, build-date=2026-01-12T23:31:50Z, release=1766032510, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, version=17.1.13, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, vendor=Red Hat, Inc., io.openshift.expose-services=, distribution-scope=public, architecture=x86_64, name=rhosp-rhel9/openstack-nova-api, batch=17.1_20260112.1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.created=2026-01-12T23:31:50Z, container_name=nova_metadata, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-nova-api-container) Feb 2 08:17:41 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:17:41 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:17:41 np0005604725 podman[137890]: 2026-02-02 08:17:41.579813009 +0000 UTC m=+0.310549304 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, com.redhat.component=openstack-swift-proxy-server-container, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, name=rhosp-rhel9/openstack-swift-proxy-server, org.opencontainers.image.created=2026-01-12T22:50:51Z, version=17.1.13, build-date=2026-01-12T22:50:51Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.buildah.version=1.41.5, container_name=swift_proxy, managed_by=tripleo_ansible, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, distribution-scope=public, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, architecture=x86_64, io.openshift.expose-services=) Feb 2 08:17:41 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Deactivated successfully. Feb 2 08:17:43 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for openstack-cinder-backup-podman-0 on np0005604725 Feb 2 08:17:43 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for openstack-cinder-backup-podman-0 on np0005604725: not running Feb 2 08:17:47 np0005604725 python3[138332]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/manila.md5sum follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:17:47 np0005604725 python3[138358]: ansible-tripleo_diff_exec Invoked with command=/var/lib/container-config-scripts/pacemaker_restart_bundle.sh manila_share openstack-manila-share openstack-manila-share _ Started state_file=/var/lib/config-data/puppet-generated/manila.md5sum state_file_suffix=.previous_run environment={'TRIPLEO_MINOR_UPDATE': '', 'TRIPLEO_HA_WRAPPER_RESOURCE_EXISTS': 'False'} return_codes=[0] Feb 2 08:17:47 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:17:48 np0005604725 podman[138437]: 2026-02-02 08:17:48.00954375 +0000 UTC m=+0.059215491 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, batch=17.1_20260112.1, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:15Z, distribution-scope=public, tcib_managed=true, name=rhosp-rhel9/openstack-collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step3, com.redhat.component=openstack-collectd-container, summary=Red Hat OpenStack Platform 17.1 collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, architecture=x86_64, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, description=Red Hat OpenStack Platform 17.1 collectd, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:15Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, io.buildah.version=1.41.5, container_name=collectd, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}) Feb 2 08:17:48 np0005604725 podman[138437]: 2026-02-02 08:17:48.020890278 +0000 UTC m=+0.070562019 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 collectd, vendor=Red Hat, Inc., vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, container_name=collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, summary=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, config_id=tripleo_step3, org.opencontainers.image.created=2026-01-12T22:10:15Z, com.redhat.component=openstack-collectd-container, io.openshift.expose-services=, release=1766032510, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, build-date=2026-01-12T22:10:15Z, io.buildah.version=1.41.5, tcib_managed=true, name=rhosp-rhel9/openstack-collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, version=17.1.13, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:17:48 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:17:48 np0005604725 python3[138436]: ansible-stat Invoked with path=/tmp/tripleo_ha_image_openstack-manila-share follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:17:48 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:17:48 np0005604725 podman[138512]: 2026-02-02 08:17:48.848889462 +0000 UTC m=+0.098551839 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, build-date=2026-01-12T22:34:41Z, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, container_name=horizon, managed_by=tripleo_ansible, distribution-scope=public, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 horizon, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T22:34:41Z, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vcs-type=git, config_id=tripleo_step3, name=rhosp-rhel9/openstack-horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, com.redhat.component=openstack-horizon-container, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 horizon, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:17:48 np0005604725 podman[138512]: 2026-02-02 08:17:48.883877377 +0000 UTC m=+0.133539704 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, com.redhat.component=openstack-horizon-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:34:41Z, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-horizon, maintainer=OpenStack TripleO Team, vcs-type=git, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:34:41Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., config_id=tripleo_step3, distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, container_name=horizon, managed_by=tripleo_ansible, batch=17.1_20260112.1, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, architecture=x86_64, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 horizon, release=1766032510, tcib_managed=true, url=https://www.redhat.com, io.openshift.expose-services=) Feb 2 08:17:48 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:17:48 np0005604725 python3[138513]: ansible-ansible.legacy.command Invoked with _raw_params=podman exec -u root swift_proxy /usr/local/bin/kolla_set_configs _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:49 np0005604725 podman[138570]: 2026-02-02 08:17:49.062449715 +0000 UTC m=+0.133790813 container exec 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:50:51Z, container_name=swift_proxy, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, architecture=x86_64, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, name=rhosp-rhel9/openstack-swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, config_id=tripleo_step4, url=https://www.redhat.com, build-date=2026-01-12T22:50:51Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, vcs-type=git, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-swift-proxy-server-container) Feb 2 08:17:49 np0005604725 podman[138570]: 2026-02-02 08:17:49.153582185 +0000 UTC m=+0.224923243 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, release=1766032510, build-date=2026-01-12T22:50:51Z, container_name=swift_proxy, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, vcs-type=git, com.redhat.component=openstack-swift-proxy-server-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:50:51Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, name=rhosp-rhel9/openstack-swift-proxy-server, io.openshift.expose-services=, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, distribution-scope=public, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:17:49 np0005604725 python3[138622]: ansible-ansible.legacy.command Invoked with _raw_params=podman exec -u root swift_account_auditor /usr/local/bin/kolla_set_configs _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:49 np0005604725 podman[138637]: 2026-02-02 08:17:49.742998278 +0000 UTC m=+0.106405241 container exec 2c87629132aa73f54c0a8a353849f76f5fd258d15e18008ca9ca3e9739ca899a (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_auditor, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-account, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, managed_by=tripleo_ansible, vendor=Red Hat, Inc., vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, name=rhosp-rhel9/openstack-swift-account, release=1766032510, url=https://www.redhat.com, container_name=swift_account_auditor, io.openshift.expose-services=, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift:z', '/var/log/containers/swift:/var/log/swift:z']}, io.buildah.version=1.41.5, batch=17.1_20260112.1, com.redhat.component=openstack-swift-account-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, build-date=2026-01-12T22:50:44Z, distribution-scope=public, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:17:49 np0005604725 podman[138637]: 2026-02-02 08:17:49.842696001 +0000 UTC m=+0.206102954 container exec_died 2c87629132aa73f54c0a8a353849f76f5fd258d15e18008ca9ca3e9739ca899a (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_auditor, com.redhat.component=openstack-swift-account-container, distribution-scope=public, io.openshift.expose-services=, build-date=2026-01-12T22:50:44Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, architecture=x86_64, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:44Z, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, name=rhosp-rhel9/openstack-swift-account, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, vcs-type=git, io.buildah.version=1.41.5, container_name=swift_account_auditor, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift:z', '/var/log/containers/swift:/var/log/swift:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 swift-account, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 swift-account) Feb 2 08:17:50 np0005604725 python3[138692]: ansible-ansible.legacy.command Invoked with _raw_params=podman exec -u root swift_account_reaper /usr/local/bin/kolla_set_configs _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:50 np0005604725 podman[138710]: 2026-02-02 08:17:50.228694603 +0000 UTC m=+0.062533913 container exec 5d08d60a78e92453e9a65eb55c8e95fccbeca0c99386444b664011390ab6ee6c (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_reaper, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-account, build-date=2026-01-12T22:50:44Z, config_id=tripleo_step4, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-account, managed_by=tripleo_ansible, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, architecture=x86_64, container_name=swift_account_reaper, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, com.redhat.component=openstack-swift-account-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_reaper.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift:z', '/var/log/containers/swift:/var/log/swift:z']}, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-swift-account, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:17:50 np0005604725 podman[138710]: 2026-02-02 08:17:50.318142942 +0000 UTC m=+0.151982312 container exec_died 5d08d60a78e92453e9a65eb55c8e95fccbeca0c99386444b664011390ab6ee6c (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_reaper, org.opencontainers.image.created=2026-01-12T22:50:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, name=rhosp-rhel9/openstack-swift-account, managed_by=tripleo_ansible, architecture=x86_64, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, vendor=Red Hat, Inc., version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.openshift.expose-services=, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_reaper.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift:z', '/var/log/containers/swift:/var/log/swift:z']}, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, build-date=2026-01-12T22:50:44Z, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, container_name=swift_account_reaper, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, url=https://www.redhat.com, com.redhat.component=openstack-swift-account-container, summary=Red Hat OpenStack Platform 17.1 swift-account, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-account) Feb 2 08:17:50 np0005604725 python3[138801]: ansible-ansible.legacy.command Invoked with _raw_params=podman exec -u root swift_account_replicator /usr/local/bin/kolla_set_configs _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:50 np0005604725 podman[138810]: 2026-02-02 08:17:50.723210449 +0000 UTC m=+0.086540700 container exec 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, build-date=2026-01-12T22:50:44Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, url=https://www.redhat.com, vcs-type=git, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_account_replicator, com.redhat.component=openstack-swift-account-container, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-swift-account, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, release=1766032510, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:50:44Z, description=Red Hat OpenStack Platform 17.1 swift-account, vendor=Red Hat, Inc., version=17.1.13, config_id=tripleo_step4, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:17:50 np0005604725 podman[138810]: 2026-02-02 08:17:50.787081362 +0000 UTC m=+0.150411573 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, maintainer=OpenStack TripleO Team, tcib_managed=true, io.buildah.version=1.41.5, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, managed_by=tripleo_ansible, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:50:44Z, description=Red Hat OpenStack Platform 17.1 swift-account, build-date=2026-01-12T22:50:44Z, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-swift-account-container, name=rhosp-rhel9/openstack-swift-account, container_name=swift_account_replicator, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, architecture=x86_64) Feb 2 08:17:51 np0005604725 python3[138869]: ansible-ansible.legacy.command Invoked with _raw_params=podman exec -u root swift_account_server /usr/local/bin/kolla_set_configs _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:51 np0005604725 podman[138872]: 2026-02-02 08:17:51.207633736 +0000 UTC m=+0.112667654 container exec e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, tcib_managed=true, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, vendor=Red Hat, Inc., version=17.1.13, description=Red Hat OpenStack Platform 17.1 swift-account, container_name=swift_account_server, vcs-type=git, architecture=x86_64, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-account, build-date=2026-01-12T22:50:44Z, name=rhosp-rhel9/openstack-swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-account-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account) Feb 2 08:17:51 np0005604725 podman[138872]: 2026-02-02 08:17:51.267394852 +0000 UTC m=+0.172428790 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 swift-account, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-account, build-date=2026-01-12T22:50:44Z, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, architecture=x86_64, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, release=1766032510, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, distribution-scope=public, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:50:44Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=swift_account_server, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, name=rhosp-rhel9/openstack-swift-account, com.redhat.component=openstack-swift-account-container, url=https://www.redhat.com, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true) Feb 2 08:17:51 np0005604725 sshd[138922]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:17:51 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:17:51 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:17:51 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:17:51 np0005604725 podman[138936]: 2026-02-02 08:17:51.59276893 +0000 UTC m=+0.087044966 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, release=1766032510, summary=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, distribution-scope=public, io.buildah.version=1.41.5, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-keystone-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-keystone, build-date=2026-01-12T22:33:53Z, vcs-type=git, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, config_id=tripleo_step3) Feb 2 08:17:51 np0005604725 systemd[1]: tmp-crun.0aT42D.mount: Deactivated successfully. Feb 2 08:17:51 np0005604725 podman[138940]: 2026-02-02 08:17:51.639682602 +0000 UTC m=+0.134320509 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, architecture=x86_64, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vcs-type=git, description=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., com.redhat.component=openstack-keystone-container, config_id=tripleo_step3, container_name=keystone_cron, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-keystone, build-date=2026-01-12T22:33:53Z, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.created=2026-01-12T22:33:53Z, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, url=https://www.redhat.com, distribution-scope=public, release=1766032510, io.openshift.expose-services=) Feb 2 08:17:51 np0005604725 podman[138943]: 2026-02-02 08:17:51.662223085 +0000 UTC m=+0.153620362 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, container_name=iscsid, tcib_managed=true, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, description=Red Hat OpenStack Platform 17.1 iscsid, architecture=x86_64, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, distribution-scope=public, vcs-type=git, build-date=2026-01-12T22:34:43Z, batch=17.1_20260112.1, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-iscsid-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.expose-services=, name=rhosp-rhel9/openstack-iscsid, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 iscsid, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:17:51 np0005604725 podman[138940]: 2026-02-02 08:17:51.675828593 +0000 UTC m=+0.170466490 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:33:53Z, distribution-scope=public, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 keystone, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step3, managed_by=tripleo_ansible, io.buildah.version=1.41.5, tcib_managed=true, architecture=x86_64, com.redhat.component=openstack-keystone-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone_cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:33:53Z, url=https://www.redhat.com, vcs-type=git) Feb 2 08:17:51 np0005604725 python3[138937]: ansible-ansible.legacy.command Invoked with _raw_params=podman exec -u root swift_container_auditor /usr/local/bin/kolla_set_configs _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:51 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:17:51 np0005604725 podman[138936]: 2026-02-02 08:17:51.692192496 +0000 UTC m=+0.186468572 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, summary=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, distribution-scope=public, build-date=2026-01-12T22:33:53Z, config_id=tripleo_step3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, architecture=x86_64, tcib_managed=true, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., release=1766032510, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, description=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, com.redhat.component=openstack-keystone-container, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:33:53Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:17:51 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:17:51 np0005604725 podman[138943]: 2026-02-02 08:17:51.748884348 +0000 UTC m=+0.240281605 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, name=rhosp-rhel9/openstack-iscsid, version=17.1.13, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, io.openshift.expose-services=, distribution-scope=public, com.redhat.component=openstack-iscsid-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 iscsid, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 iscsid, io.buildah.version=1.41.5, architecture=x86_64, url=https://www.redhat.com, container_name=iscsid, config_id=tripleo_step3, managed_by=tripleo_ansible, release=1766032510, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:43Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, batch=17.1_20260112.1) Feb 2 08:17:51 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:17:51 np0005604725 podman[139056]: 2026-02-02 08:17:51.76654096 +0000 UTC m=+0.069120844 container exec e0ae162e678e8058f20ec88f15a01f67593c22e20a0d9a652448da6732e0d4be (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_auditor, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-container, container_name=swift_container_auditor, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, config_id=tripleo_step4, build-date=2026-01-12T22:50:57Z, managed_by=tripleo_ansible, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, release=1766032510, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:50:57Z, batch=17.1_20260112.1, version=17.1.13, io.buildah.version=1.41.5, vcs-type=git, architecture=x86_64, name=rhosp-rhel9/openstack-swift-container, com.redhat.component=openstack-swift-container-container, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}) Feb 2 08:17:51 np0005604725 podman[139056]: 2026-02-02 08:17:51.847963082 +0000 UTC m=+0.150542966 container exec_died e0ae162e678e8058f20ec88f15a01f67593c22e20a0d9a652448da6732e0d4be (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_auditor, name=rhosp-rhel9/openstack-swift-container, architecture=x86_64, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, build-date=2026-01-12T22:50:57Z, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, vendor=Red Hat, Inc., url=https://www.redhat.com, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, distribution-scope=public, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:57Z, com.redhat.component=openstack-swift-container-container, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=swift_container_auditor, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, tcib_managed=true) Feb 2 08:17:52 np0005604725 python3[139103]: ansible-ansible.legacy.command Invoked with _raw_params=podman exec -u root swift_container_replicator /usr/local/bin/kolla_set_configs _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:52 np0005604725 podman[139110]: 2026-02-02 08:17:52.235605665 +0000 UTC m=+0.073810870 container exec 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, vcs-type=git, architecture=x86_64, vendor=Red Hat, Inc., io.buildah.version=1.41.5, url=https://www.redhat.com, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:57Z, description=Red Hat OpenStack Platform 17.1 swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, io.openshift.expose-services=, build-date=2026-01-12T22:50:57Z, version=17.1.13, batch=17.1_20260112.1, container_name=swift_container_replicator, config_id=tripleo_step4, managed_by=tripleo_ansible, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-container-container, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, name=rhosp-rhel9/openstack-swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container) Feb 2 08:17:52 np0005604725 podman[139110]: 2026-02-02 08:17:52.289792359 +0000 UTC m=+0.127997574 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, io.buildah.version=1.41.5, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, name=rhosp-rhel9/openstack-swift-container, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 swift-container, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-swift-container-container, build-date=2026-01-12T22:50:57Z, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., config_id=tripleo_step4, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, io.openshift.expose-services=, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 swift-container, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.created=2026-01-12T22:50:57Z, batch=17.1_20260112.1, container_name=swift_container_replicator, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:17:52 np0005604725 systemd[1]: tmp-crun.9P3CtJ.mount: Deactivated successfully. Feb 2 08:17:52 np0005604725 python3[139188]: ansible-ansible.legacy.command Invoked with _raw_params=podman exec -u root swift_container_server /usr/local/bin/kolla_set_configs _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:52 np0005604725 podman[139216]: 2026-02-02 08:17:52.761455993 +0000 UTC m=+0.112044154 container exec 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, tcib_managed=true, vendor=Red Hat, Inc., io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, build-date=2026-01-12T22:50:57Z, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, com.redhat.component=openstack-swift-container-container, container_name=swift_container_server, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:50:57Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-container, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, config_id=tripleo_step4, name=rhosp-rhel9/openstack-swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, url=https://www.redhat.com, release=1766032510) Feb 2 08:17:52 np0005604725 podman[139216]: 2026-02-02 08:17:52.820239679 +0000 UTC m=+0.170827910 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, com.redhat.component=openstack-swift-container-container, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 swift-container, tcib_managed=true, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, version=17.1.13, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, release=1766032510, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-container, name=rhosp-rhel9/openstack-swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, container_name=swift_container_server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:57Z) Feb 2 08:17:53 np0005604725 python3[139277]: ansible-ansible.legacy.command Invoked with _raw_params=podman exec -u root swift_container_updater /usr/local/bin/kolla_set_configs _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:53 np0005604725 podman[139278]: 2026-02-02 08:17:53.308753832 +0000 UTC m=+0.133527885 container exec 38cd6aa9ef38130620a1c205bdf80b0294929b858dcb1e10e5fdedaa9a1a34c0 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_updater, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-swift-container-container, distribution-scope=public, maintainer=OpenStack TripleO Team, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 swift-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_updater.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, name=rhosp-rhel9/openstack-swift-container, build-date=2026-01-12T22:50:57Z, container_name=swift_container_updater, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, io.openshift.expose-services=, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, config_id=tripleo_step4, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:50:57Z) Feb 2 08:17:53 np0005604725 podman[139278]: 2026-02-02 08:17:53.36698534 +0000 UTC m=+0.191759403 container exec_died 38cd6aa9ef38130620a1c205bdf80b0294929b858dcb1e10e5fdedaa9a1a34c0 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_updater, description=Red Hat OpenStack Platform 17.1 swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, managed_by=tripleo_ansible, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_container_updater, config_id=tripleo_step4, name=rhosp-rhel9/openstack-swift-container, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_updater.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.component=openstack-swift-container-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:50:57Z, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, url=https://www.redhat.com, vendor=Red Hat, Inc., build-date=2026-01-12T22:50:57Z, version=17.1.13, release=1766032510) Feb 2 08:17:53 np0005604725 python3[139331]: ansible-ansible.legacy.command Invoked with _raw_params=podman exec -u root swift_object_auditor /usr/local/bin/kolla_set_configs _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:53 np0005604725 podman[139339]: 2026-02-02 08:17:53.807326213 +0000 UTC m=+0.093900567 container exec c45b2e87342537702fedfecfd85221ac3cd0f17a15eebef60f9ebc7217e6ad00 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_auditor, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:50:56Z, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 swift-object, managed_by=tripleo_ansible, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:56Z, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, version=17.1.13, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, architecture=x86_64, vcs-type=git, io.openshift.expose-services=, com.redhat.component=openstack-swift-object-container, name=rhosp-rhel9/openstack-swift-object, vendor=Red Hat, Inc., org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_object_auditor) Feb 2 08:17:53 np0005604725 podman[139339]: 2026-02-02 08:17:53.891787648 +0000 UTC m=+0.178361922 container exec_died c45b2e87342537702fedfecfd85221ac3cd0f17a15eebef60f9ebc7217e6ad00 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_auditor, io.buildah.version=1.41.5, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:56Z, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-swift-object, distribution-scope=public, architecture=x86_64, build-date=2026-01-12T22:50:56Z, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_object_auditor, vcs-type=git, tcib_managed=true, version=17.1.13, batch=17.1_20260112.1, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, vendor=Red Hat, Inc., config_id=tripleo_step4, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_auditor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, summary=Red Hat OpenStack Platform 17.1 swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-swift-object-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, managed_by=tripleo_ansible, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team) Feb 2 08:17:54 np0005604725 python3[139394]: ansible-ansible.legacy.command Invoked with _raw_params=podman exec -u root swift_object_expirer /usr/local/bin/kolla_set_configs _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:54 np0005604725 podman[139403]: 2026-02-02 08:17:54.362432661 +0000 UTC m=+0.102462600 container exec 7b861517ba844e990aed3655789e67eb67fa37a3bbafb47199a553218e14bcbc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_object_expirer, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, release=1766032510, org.opencontainers.image.created=2026-01-12T22:50:51Z, architecture=x86_64, vcs-type=git, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-proxy-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.buildah.version=1.41.5, batch=17.1_20260112.1, com.redhat.component=openstack-swift-proxy-server-container, container_name=swift_object_expirer, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_expirer.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:51Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, managed_by=tripleo_ansible, vendor=Red Hat, Inc., vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13) Feb 2 08:17:54 np0005604725 podman[139403]: 2026-02-02 08:17:54.470229163 +0000 UTC m=+0.210259102 container exec_died 7b861517ba844e990aed3655789e67eb67fa37a3bbafb47199a553218e14bcbc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_object_expirer, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_expirer.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, url=https://www.redhat.com, vendor=Red Hat, Inc., io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:50:51Z, tcib_managed=true, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, build-date=2026-01-12T22:50:51Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, distribution-scope=public, container_name=swift_object_expirer, batch=17.1_20260112.1, architecture=x86_64) Feb 2 08:17:54 np0005604725 python3[139449]: ansible-ansible.legacy.command Invoked with _raw_params=podman exec -u root swift_object_replicator /usr/local/bin/kolla_set_configs _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:54 np0005604725 podman[139466]: 2026-02-02 08:17:54.952456711 +0000 UTC m=+0.086450007 container exec bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, io.openshift.expose-services=, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, summary=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, config_id=tripleo_step4, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, io.buildah.version=1.41.5, managed_by=tripleo_ansible, vendor=Red Hat, Inc., architecture=x86_64, com.redhat.component=openstack-swift-object-container, org.opencontainers.image.created=2026-01-12T22:50:56Z, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-object, vcs-type=git, container_name=swift_object_replicator, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:17:55 np0005604725 podman[139466]: 2026-02-02 08:17:55.018997596 +0000 UTC m=+0.152990892 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, com.redhat.component=openstack-swift-object-container, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 swift-object, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, batch=17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_object_replicator, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:50:56Z, url=https://www.redhat.com, release=1766032510, vcs-type=git, tcib_managed=true, architecture=x86_64, build-date=2026-01-12T22:50:56Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:17:55 np0005604725 python3[139515]: ansible-ansible.legacy.command Invoked with _raw_params=podman exec -u root swift_object_server /usr/local/bin/kolla_set_configs _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:55 np0005604725 podman[139521]: 2026-02-02 08:17:55.509015844 +0000 UTC m=+0.103771160 container exec 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, vendor=Red Hat, Inc., tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 swift-object, version=17.1.13, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:50:56Z, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, vcs-type=git, distribution-scope=public, maintainer=OpenStack TripleO Team, release=1766032510, summary=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_object_server, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:50:56Z, io.openshift.expose-services=, name=rhosp-rhel9/openstack-swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, com.redhat.component=openstack-swift-object-container, io.buildah.version=1.41.5) Feb 2 08:17:55 np0005604725 podman[139521]: 2026-02-02 08:17:55.601110914 +0000 UTC m=+0.195866230 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, name=rhosp-rhel9/openstack-swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_object_server, managed_by=tripleo_ansible, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, architecture=x86_64, io.openshift.expose-services=, com.redhat.component=openstack-swift-object-container, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.buildah.version=1.41.5, vendor=Red Hat, Inc., version=17.1.13, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, build-date=2026-01-12T22:50:56Z) Feb 2 08:17:55 np0005604725 python3[139617]: ansible-ansible.legacy.command Invoked with _raw_params=podman exec -u root swift_object_updater /usr/local/bin/kolla_set_configs _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:17:55 np0005604725 podman[139626]: 2026-02-02 08:17:55.996552736 +0000 UTC m=+0.086873591 container exec 9d7154e5919ebd84d337dbff6b39a92fbc8c73b5be29c2bf33334d4702c11918 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_updater, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-swift-object-container, build-date=2026-01-12T22:50:56Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, tcib_managed=true, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:56Z, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_updater.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, managed_by=tripleo_ansible, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_object_updater, name=rhosp-rhel9/openstack-swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., io.openshift.expose-services=, url=https://www.redhat.com) Feb 2 08:17:56 np0005604725 podman[139626]: 2026-02-02 08:17:56.093028001 +0000 UTC m=+0.183348896 container exec_died 9d7154e5919ebd84d337dbff6b39a92fbc8c73b5be29c2bf33334d4702c11918 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_updater, vendor=Red Hat, Inc., io.openshift.expose-services=, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_object_updater, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, release=1766032510, com.redhat.component=openstack-swift-object-container, url=https://www.redhat.com, version=17.1.13, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_updater.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, distribution-scope=public, name=rhosp-rhel9/openstack-swift-object, managed_by=tripleo_ansible, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5) Feb 2 08:17:56 np0005604725 python3[139680]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_5 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:17:57 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:17:57 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:17:57 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:17:57 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:17:57 np0005604725 podman[139744]: 2026-02-02 08:17:57.207625131 +0000 UTC m=+0.114174809 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vendor=Red Hat, Inc., architecture=x86_64, url=https://www.redhat.com, vcs-type=git, name=rhosp-rhel9/openstack-cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.13, tcib_managed=true, distribution-scope=public, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:58:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:58:44Z, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, config_id=tripleo_step4, com.redhat.component=openstack-cinder-api-container, managed_by=tripleo_ansible, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 cinder-api, container_name=cinder_api_cron, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}) Feb 2 08:17:57 np0005604725 podman[139744]: 2026-02-02 08:17:57.242914226 +0000 UTC m=+0.149463844 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, vcs-type=git, description=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-cinder-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, release=1766032510, tcib_managed=true, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, config_id=tripleo_step4, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, architecture=x86_64, io.buildah.version=1.41.5, build-date=2026-01-12T22:58:44Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, name=rhosp-rhel9/openstack-cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, batch=17.1_20260112.1, container_name=cinder_api_cron, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api) Feb 2 08:17:57 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:17:57 np0005604725 podman[139762]: 2026-02-02 08:17:57.291903492 +0000 UTC m=+0.080495115 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=healthy, batch=17.1_20260112.1, architecture=x86_64, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.expose-services=, container_name=ceilometer_agent_central, description=Red Hat OpenStack Platform 17.1 ceilometer-central, version=17.1.13, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-ceilometer-central-container, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, name=rhosp-rhel9/openstack-ceilometer-central, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-type=git, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T23:07:24Z, url=https://www.redhat.com, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, config_id=tripleo_step4, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, release=1766032510, build-date=2026-01-12T23:07:24Z) Feb 2 08:17:57 np0005604725 podman[139764]: 2026-02-02 08:17:57.349705717 +0000 UTC m=+0.137710402 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=healthy, config_id=tripleo_step4, io.openshift.expose-services=, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.buildah.version=1.41.5, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, tcib_managed=true, version=17.1.13, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:58:47Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:58:47Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-cinder-scheduler-container, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-cinder-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, container_name=cinder_scheduler, managed_by=tripleo_ansible) Feb 2 08:17:57 np0005604725 podman[139762]: 2026-02-02 08:17:57.356874508 +0000 UTC m=+0.145466131 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, release=1766032510, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, distribution-scope=public, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 ceilometer-central, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 ceilometer-central, container_name=ceilometer_agent_central, version=17.1.13, name=rhosp-rhel9/openstack-ceilometer-central, com.redhat.component=openstack-ceilometer-central-container, tcib_managed=true, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.openshift.expose-services=, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vcs-type=git, build-date=2026-01-12T23:07:24Z, org.opencontainers.image.created=2026-01-12T23:07:24Z, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:17:57 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:17:57 np0005604725 podman[139764]: 2026-02-02 08:17:57.370549718 +0000 UTC m=+0.158554433 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, distribution-scope=public, version=17.1.13, container_name=cinder_scheduler, io.buildah.version=1.41.5, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, build-date=2026-01-12T22:58:47Z, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, maintainer=OpenStack TripleO Team, architecture=x86_64, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-cinder-scheduler, org.opencontainers.image.created=2026-01-12T22:58:47Z, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, com.redhat.component=openstack-cinder-scheduler-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, release=1766032510, vendor=Red Hat, Inc., vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e) Feb 2 08:17:57 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:17:57 np0005604725 podman[139766]: 2026-02-02 08:17:57.455042185 +0000 UTC m=+0.239241924 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:18Z, com.redhat.component=openstack-mariadb-container, architecture=x86_64, config_id=tripleo_step2, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=clustercheck, url=https://www.redhat.com, version=17.1.13, distribution-scope=public, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, io.openshift.expose-services=, name=rhosp-rhel9/openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, managed_by=tripleo_ansible, build-date=2026-01-12T22:10:18Z) Feb 2 08:17:57 np0005604725 podman[139766]: 2026-02-02 08:17:57.507031292 +0000 UTC m=+0.291230941 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.component=openstack-mariadb-container, container_name=clustercheck, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, name=rhosp-rhel9/openstack-mariadb, vcs-type=git, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:18Z, release=1766032510, config_id=tripleo_step2, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, build-date=2026-01-12T22:10:18Z, batch=17.1_20260112.1, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64) Feb 2 08:17:57 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:17:58 np0005604725 ansible-async_wrapper.py[140038]: Invoked with 286403086575 3600 /home/tripleo-admin/.ansible/tmp/ansible-tmp-1770020277.7450502-149095-176335702785159/AnsiballZ_command.py _ Feb 2 08:17:58 np0005604725 ansible-async_wrapper.py[140042]: Starting module and watcher Feb 2 08:17:58 np0005604725 ansible-async_wrapper.py[140042]: Start watching 140043 (3600) Feb 2 08:17:58 np0005604725 ansible-async_wrapper.py[140043]: Start module (140043) Feb 2 08:17:58 np0005604725 ansible-async_wrapper.py[140038]: Return async_wrapper task started. Feb 2 08:17:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:17:58 np0005604725 podman[140069]: 2026-02-02 08:17:58.591215778 +0000 UTC m=+0.066984090 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, vendor=Red Hat, Inc., build-date=2026-01-12T23:07:25Z, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, distribution-scope=public, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, org.opencontainers.image.created=2026-01-12T23:07:25Z, com.redhat.component=openstack-ceilometer-notification-container, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=ceilometer_agent_notification, architecture=x86_64, tcib_managed=true, vcs-type=git, managed_by=tripleo_ansible, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, name=rhosp-rhel9/openstack-ceilometer-notification, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:17:58 np0005604725 podman[140069]: 2026-02-02 08:17:58.610506671 +0000 UTC m=+0.086274963 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, org.opencontainers.image.created=2026-01-12T23:07:25Z, container_name=ceilometer_agent_notification, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, batch=17.1_20260112.1, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, build-date=2026-01-12T23:07:25Z, io.openshift.expose-services=, release=1766032510, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, name=rhosp-rhel9/openstack-ceilometer-notification, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-ceilometer-notification-container, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, managed_by=tripleo_ansible, version=17.1.13, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, tcib_managed=true, config_id=tripleo_step4) Feb 2 08:17:58 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:17:58 np0005604725 python3[140068]: ansible-ansible.legacy.async_status Invoked with jid=286403086575.140038 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:17:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:17:58 np0005604725 podman[140099]: 2026-02-02 08:17:58.701356273 +0000 UTC m=+0.054837067 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, io.buildah.version=1.41.5, tcib_managed=true, architecture=x86_64, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, vcs-type=git, description=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:53:19Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, com.redhat.component=openstack-heat-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-heat-api, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, vendor=Red Hat, Inc., build-date=2026-01-12T22:53:19Z, config_id=tripleo_step4, vcs-ref=755001522886c265e88561b4997cab642504a845, managed_by=tripleo_ansible, container_name=heat_api_cron, maintainer=OpenStack TripleO Team, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:17:58 np0005604725 podman[140099]: 2026-02-02 08:17:58.709824053 +0000 UTC m=+0.063304857 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, tcib_managed=true, managed_by=tripleo_ansible, vendor=Red Hat, Inc., container_name=heat_api_cron, vcs-ref=755001522886c265e88561b4997cab642504a845, org.opencontainers.image.created=2026-01-12T22:53:19Z, version=17.1.13, com.redhat.component=openstack-heat-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, build-date=2026-01-12T22:53:19Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, io.buildah.version=1.41.5, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, architecture=x86_64, name=rhosp-rhel9/openstack-heat-api, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:17:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:17:58 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:17:58 np0005604725 systemd[1]: tmp-crun.sKKNjb.mount: Deactivated successfully. Feb 2 08:17:58 np0005604725 podman[140118]: 2026-02-02 08:17:58.795607039 +0000 UTC m=+0.060201861 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=healthy, url=https://www.redhat.com, name=rhosp-rhel9/openstack-heat-engine, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, distribution-scope=public, config_id=tripleo_step4, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 heat-engine, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.expose-services=, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, org.opencontainers.image.created=2026-01-12T22:53:38Z, build-date=2026-01-12T22:53:38Z, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 heat-engine, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, batch=17.1_20260112.1, container_name=heat_engine, com.redhat.component=openstack-heat-engine-container, architecture=x86_64, vcs-ref=755001522886c265e88561b4997cab642504a845, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, vcs-type=git, maintainer=OpenStack TripleO Team) Feb 2 08:17:58 np0005604725 podman[140118]: 2026-02-02 08:17:58.8177645 +0000 UTC m=+0.082359342 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 heat-engine, vcs-ref=755001522886c265e88561b4997cab642504a845, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:53:38Z, summary=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.expose-services=, com.redhat.component=openstack-heat-engine-container, vcs-type=git, tcib_managed=true, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:53:38Z, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, container_name=heat_engine, config_id=tripleo_step4, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, name=rhosp-rhel9/openstack-heat-engine, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public) Feb 2 08:17:58 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:18:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:18:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:18:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:18:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:18:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:18:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:18:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:18:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:18:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:18:01 np0005604725 systemd[1]: tmp-crun.dNxvV0.mount: Deactivated successfully. Feb 2 08:18:01 np0005604725 podman[140257]: 2026-02-02 08:18:01.349617292 +0000 UTC m=+0.084167157 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, io.openshift.expose-services=, name=rhosp-rhel9/openstack-heat-api, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, version=17.1.13, vcs-type=git, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., tcib_managed=true, com.redhat.component=openstack-heat-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=755001522886c265e88561b4997cab642504a845, managed_by=tripleo_ansible, container_name=heat_api, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, build-date=2026-01-12T22:53:19Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.created=2026-01-12T22:53:19Z, distribution-scope=public, io.buildah.version=1.41.5) Feb 2 08:18:01 np0005604725 podman[140290]: 2026-02-02 08:18:01.399810825 +0000 UTC m=+0.113217470 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=healthy, version=17.1.13, com.redhat.component=openstack-neutron-server-container, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:57:35Z, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 neutron-server, container_name=neutron_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, release=1766032510, io.openshift.expose-services=, name=rhosp-rhel9/openstack-neutron-server, config_id=tripleo_step4, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 neutron-server, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, url=https://www.redhat.com, tcib_managed=true, architecture=x86_64, build-date=2026-01-12T22:57:35Z) Feb 2 08:18:01 np0005604725 podman[140280]: 2026-02-02 08:18:01.382273176 +0000 UTC m=+0.102148581 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, tcib_managed=true, managed_by=tripleo_ansible, io.buildah.version=1.41.5, release=1766032510, distribution-scope=public, io.openshift.expose-services=, build-date=2026-01-12T22:52:22Z, description=Red Hat OpenStack Platform 17.1 manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, vcs-type=git, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:52:22Z, config_id=tripleo_step4, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, container_name=manila_api_cron, name=rhosp-rhel9/openstack-manila-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, vendor=Red Hat, Inc., url=https://www.redhat.com, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, com.redhat.component=openstack-manila-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:18:01 np0005604725 podman[140257]: 2026-02-02 08:18:01.438920966 +0000 UTC m=+0.173470841 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:53:19Z, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=heat_api, vcs-type=git, vcs-ref=755001522886c265e88561b4997cab642504a845, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-heat-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, batch=17.1_20260112.1, version=17.1.13, tcib_managed=true, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, com.redhat.component=openstack-heat-api-container, build-date=2026-01-12T22:53:19Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, architecture=x86_64) Feb 2 08:18:01 np0005604725 podman[140291]: 2026-02-02 08:18:01.440533775 +0000 UTC m=+0.132293396 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=healthy, container_name=manila_scheduler, description=Red Hat OpenStack Platform 17.1 manila-scheduler, config_id=tripleo_step4, distribution-scope=public, name=rhosp-rhel9/openstack-manila-scheduler, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:52:54Z, managed_by=tripleo_ansible, com.redhat.component=openstack-manila-scheduler-container, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, vcs-type=git, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:52:54Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, release=1766032510, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, vendor=Red Hat, Inc., architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:18:01 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:18:01 np0005604725 podman[140280]: 2026-02-02 08:18:01.517336006 +0000 UTC m=+0.237211431 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, container_name=manila_api_cron, org.opencontainers.image.created=2026-01-12T22:52:22Z, maintainer=OpenStack TripleO Team, tcib_managed=true, com.redhat.component=openstack-manila-api-container, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, url=https://www.redhat.com, version=17.1.13, vendor=Red Hat, Inc., build-date=2026-01-12T22:52:22Z, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-manila-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, io.openshift.expose-services=, batch=17.1_20260112.1, release=1766032510, architecture=x86_64, distribution-scope=public, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, managed_by=tripleo_ansible) Feb 2 08:18:01 np0005604725 podman[140283]: 2026-02-02 08:18:01.474909952 +0000 UTC m=+0.188119221 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:54:02Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, name=rhosp-rhel9/openstack-heat-api-cfn, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, distribution-scope=public, managed_by=tripleo_ansible, build-date=2026-01-12T22:54:02Z, io.buildah.version=1.41.5, io.openshift.expose-services=, release=1766032510, vcs-ref=755001522886c265e88561b4997cab642504a845, com.redhat.component=openstack-heat-api-cfn-container, version=17.1.13, tcib_managed=true, container_name=heat_api_cfn, architecture=x86_64, vendor=Red Hat, Inc., org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, url=https://www.redhat.com, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:18:01 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:18:01 np0005604725 podman[140307]: 2026-02-02 08:18:01.498419595 +0000 UTC m=+0.201210365 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=healthy, description=Red Hat OpenStack Platform 17.1 nova-scheduler, version=17.1.13, container_name=nova_scheduler, architecture=x86_64, distribution-scope=public, tcib_managed=true, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, vcs-type=git, org.opencontainers.image.created=2026-01-12T23:32:05Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, url=https://www.redhat.com, config_id=tripleo_step4, com.redhat.component=openstack-nova-scheduler-container, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-nova-scheduler, io.openshift.expose-services=, io.buildah.version=1.41.5, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T23:32:05Z, managed_by=tripleo_ansible) Feb 2 08:18:01 np0005604725 podman[140255]: 2026-02-02 08:18:01.517649486 +0000 UTC m=+0.255166913 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, io.buildah.version=1.41.5, io.openshift.expose-services=, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, build-date=2026-01-12T22:58:44Z, url=https://www.redhat.com, name=rhosp-rhel9/openstack-cinder-api, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-cinder-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:58:44Z, config_id=tripleo_step4, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, version=17.1.13, container_name=cinder_api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e) Feb 2 08:18:01 np0005604725 podman[140255]: 2026-02-02 08:18:01.575518064 +0000 UTC m=+0.313035491 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, batch=17.1_20260112.1, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, build-date=2026-01-12T22:58:44Z, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-cinder-api, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.expose-services=, vendor=Red Hat, Inc., url=https://www.redhat.com, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=cinder_api, org.opencontainers.image.created=2026-01-12T22:58:44Z, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5) Feb 2 08:18:01 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:18:01 np0005604725 podman[140290]: 2026-02-02 08:18:01.589881415 +0000 UTC m=+0.303288080 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, com.redhat.component=openstack-neutron-server-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, maintainer=OpenStack TripleO Team, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, container_name=neutron_api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, vendor=Red Hat, Inc., vcs-type=git, name=rhosp-rhel9/openstack-neutron-server, build-date=2026-01-12T22:57:35Z, config_id=tripleo_step4, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, managed_by=tripleo_ansible, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 neutron-server, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, io.openshift.expose-services=, version=17.1.13, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 neutron-server, release=1766032510, org.opencontainers.image.created=2026-01-12T22:57:35Z, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:18:01 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:18:01 np0005604725 podman[140283]: 2026-02-02 08:18:01.601781891 +0000 UTC m=+0.314991170 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, batch=17.1_20260112.1, container_name=heat_api_cfn, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-type=git, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, name=rhosp-rhel9/openstack-heat-api-cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.created=2026-01-12T22:54:02Z, distribution-scope=public, io.openshift.expose-services=, url=https://www.redhat.com, config_id=tripleo_step4, version=17.1.13, release=1766032510, vcs-ref=755001522886c265e88561b4997cab642504a845, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, com.redhat.component=openstack-heat-api-cfn-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:54:02Z, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, architecture=x86_64, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 heat-api-cfn) Feb 2 08:18:01 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:18:01 np0005604725 podman[140307]: 2026-02-02 08:18:01.628062278 +0000 UTC m=+0.330853068 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, build-date=2026-01-12T23:32:05Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, tcib_managed=true, config_id=tripleo_step4, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, version=17.1.13, architecture=x86_64, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, org.opencontainers.image.created=2026-01-12T23:32:05Z, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-nova-scheduler-container, container_name=nova_scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 nova-scheduler, name=rhosp-rhel9/openstack-nova-scheduler, batch=17.1_20260112.1) Feb 2 08:18:01 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:18:01 np0005604725 podman[140256]: 2026-02-02 08:18:01.670185822 +0000 UTC m=+0.408615366 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 nova-conductor, config_id=tripleo_step4, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, io.buildah.version=1.41.5, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 nova-conductor, container_name=nova_conductor, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, managed_by=tripleo_ansible, io.openshift.expose-services=, vcs-type=git, name=rhosp-rhel9/openstack-nova-conductor, batch=17.1_20260112.1, com.redhat.component=openstack-nova-conductor-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T23:32:18Z, org.opencontainers.image.created=2026-01-12T23:32:18Z, version=17.1.13, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, release=1766032510) Feb 2 08:18:01 np0005604725 podman[140291]: 2026-02-02 08:18:01.674841296 +0000 UTC m=+0.366600907 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, container_name=manila_scheduler, release=1766032510, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, io.buildah.version=1.41.5, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, name=rhosp-rhel9/openstack-manila-scheduler, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, managed_by=tripleo_ansible, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, config_id=tripleo_step4, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:52:54Z, build-date=2026-01-12T22:52:54Z, vendor=Red Hat, Inc., architecture=x86_64, description=Red Hat OpenStack Platform 17.1 manila-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, com.redhat.component=openstack-manila-scheduler-container, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, batch=17.1_20260112.1) Feb 2 08:18:01 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:18:01 np0005604725 podman[140256]: 2026-02-02 08:18:01.701863637 +0000 UTC m=+0.440293201 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, summary=Red Hat OpenStack Platform 17.1 nova-conductor, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, vcs-type=git, com.redhat.component=openstack-nova-conductor-container, build-date=2026-01-12T23:32:18Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, description=Red Hat OpenStack Platform 17.1 nova-conductor, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-nova-conductor, architecture=x86_64, url=https://www.redhat.com, release=1766032510, org.opencontainers.image.created=2026-01-12T23:32:18Z, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=nova_conductor, config_id=tripleo_step4, distribution-scope=public, maintainer=OpenStack TripleO Team, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.buildah.version=1.41.5, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:18:01 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:18:01 np0005604725 podman[140269]: 2026-02-02 08:18:01.718915961 +0000 UTC m=+0.447399030 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, build-date=2026-01-12T22:10:15Z, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, vendor=Red Hat, Inc., io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, maintainer=OpenStack TripleO Team, vcs-type=git, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:10:15Z, release=1766032510, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 cron, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-cron-container, url=https://www.redhat.com, architecture=x86_64, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, summary=Red Hat OpenStack Platform 17.1 cron, container_name=logrotate_crond, tcib_managed=true, name=rhosp-rhel9/openstack-cron) Feb 2 08:18:01 np0005604725 podman[140269]: 2026-02-02 08:18:01.730994471 +0000 UTC m=+0.459477550 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, vcs-type=git, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, release=1766032510, name=rhosp-rhel9/openstack-cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, build-date=2026-01-12T22:10:15Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, distribution-scope=public, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-cron-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, vendor=Red Hat, Inc., container_name=logrotate_crond, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 cron, tcib_managed=true, version=17.1.13, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 cron, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:15Z) Feb 2 08:18:01 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:18:02 np0005604725 podman[140497]: 2026-02-02 08:18:02.59524449 +0000 UTC m=+0.082194488 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, build-date=2026-01-12T22:10:18Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, summary=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, batch=17.1_20260112.1, distribution-scope=public, maintainer=OpenStack TripleO Team, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:18Z, com.redhat.component=openstack-mariadb-container, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, tcib_managed=true, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb) Feb 2 08:18:02 np0005604725 podman[140497]: 2026-02-02 08:18:02.628696648 +0000 UTC m=+0.115646706 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:18Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:18Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, com.redhat.component=openstack-mariadb-container, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, vcs-type=git, url=https://www.redhat.com, name=rhosp-rhel9/openstack-mariadb, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., io.buildah.version=1.41.5, distribution-scope=public, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:18:02 np0005604725 systemd[1]: tmp-crun.Ovjusk.mount: Deactivated successfully. Feb 2 08:18:02 np0005604725 podman[140597]: 2026-02-02 08:18:02.987184544 +0000 UTC m=+0.076513433 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-redis, description=Red Hat OpenStack Platform 17.1 redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, batch=17.1_20260112.1, url=https://www.redhat.com, vendor=Red Hat, Inc., release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, build-date=2026-01-12T22:10:16Z, com.redhat.component=openstack-redis-container, org.opencontainers.image.created=2026-01-12T22:10:16Z, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, vcs-type=git, io.buildah.version=1.41.5, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=) Feb 2 08:18:03 np0005604725 podman[140597]: 2026-02-02 08:18:03.021933841 +0000 UTC m=+0.111262750 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, version=17.1.13, com.redhat.component=openstack-redis-container, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:16Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, build-date=2026-01-12T22:10:16Z, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 redis, summary=Red Hat OpenStack Platform 17.1 redis, vendor=Red Hat, Inc., architecture=x86_64, name=rhosp-rhel9/openstack-redis, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, tcib_managed=true, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis) Feb 2 08:18:03 np0005604725 podman[140638]: 2026-02-02 08:18:03.130651642 +0000 UTC m=+0.062396268 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, architecture=x86_64, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-haproxy, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 haproxy, version=17.1.13, io.buildah.version=1.41.5, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:12Z, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, description=Red Hat OpenStack Platform 17.1 haproxy) Feb 2 08:18:03 np0005604725 podman[140638]: 2026-02-02 08:18:03.163270074 +0000 UTC m=+0.095014720 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, version=17.1.13, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-haproxy-container, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, release=1766032510, name=rhosp-rhel9/openstack-haproxy, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 haproxy, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, vcs-type=git, build-date=2026-01-12T22:10:12Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:12Z) Feb 2 08:18:03 np0005604725 ansible-async_wrapper.py[140042]: 140043 still running (3600) Feb 2 08:18:03 np0005604725 systemd[1]: tmp-crun.slfInC.mount: Deactivated successfully. Feb 2 08:18:03 np0005604725 podman[140722]: 2026-02-02 08:18:03.516650984 +0000 UTC m=+0.138360953 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, vcs-type=git, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:14Z, release=1766032510, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp-rhel9/openstack-rabbitmq, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:14Z, com.redhat.component=openstack-rabbitmq-container, version=17.1.13, io.buildah.version=1.41.5, io.openshift.expose-services=) Feb 2 08:18:03 np0005604725 podman[140722]: 2026-02-02 08:18:03.548942226 +0000 UTC m=+0.170652255 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, com.redhat.component=openstack-rabbitmq-container, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-rabbitmq, distribution-scope=public, version=17.1.13, description=Red Hat OpenStack Platform 17.1 rabbitmq, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2026-01-12T22:10:14Z, io.buildah.version=1.41.5, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:18:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:18:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:18:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:18:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:18:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:18:05 np0005604725 puppet-user[140072]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Feb 2 08:18:05 np0005604725 puppet-user[140072]: (file: /etc/puppet/hiera.yaml) Feb 2 08:18:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:18:05 np0005604725 puppet-user[140072]: Warning: Undefined variable '::deploy_config_name'; Feb 2 08:18:05 np0005604725 puppet-user[140072]: (file & line not available) Feb 2 08:18:05 np0005604725 puppet-user[140072]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Feb 2 08:18:05 np0005604725 puppet-user[140072]: (file & line not available) Feb 2 08:18:05 np0005604725 puppet-user[140072]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/database/mysql/client.pp, line: 89, column: 8) Feb 2 08:18:05 np0005604725 podman[140943]: 2026-02-02 08:18:05.341292434 +0000 UTC m=+0.073855390 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=healthy, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, com.redhat.component=openstack-swift-account-container, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:50:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, release=1766032510, build-date=2026-01-12T22:50:44Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, tcib_managed=true, url=https://www.redhat.com, config_id=tripleo_step4, container_name=swift_account_server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, distribution-scope=public, name=rhosp-rhel9/openstack-swift-account) Feb 2 08:18:05 np0005604725 podman[140939]: 2026-02-02 08:18:05.391784065 +0000 UTC m=+0.129069517 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=healthy, config_id=tripleo_step4, vcs-type=git, name=rhosp-rhel9/openstack-swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, managed_by=tripleo_ansible, batch=17.1_20260112.1, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, release=1766032510, tcib_managed=true, version=17.1.13, container_name=swift_container_replicator, architecture=x86_64, build-date=2026-01-12T22:50:57Z, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:57Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-container-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}) Feb 2 08:18:05 np0005604725 podman[140941]: 2026-02-02 08:18:05.466696028 +0000 UTC m=+0.193373744 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=healthy, org.opencontainers.image.created=2026-01-12T23:32:22Z, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-nova-novncproxy, io.buildah.version=1.41.5, io.openshift.expose-services=, build-date=2026-01-12T23:32:22Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, com.redhat.component=openstack-nova-novncproxy-container, version=17.1.13, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, maintainer=OpenStack TripleO Team, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, container_name=nova_vnc_proxy, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, url=https://www.redhat.com, vcs-type=git, config_id=tripleo_step4, batch=17.1_20260112.1) Feb 2 08:18:05 np0005604725 podman[140940]: 2026-02-02 08:18:05.448814318 +0000 UTC m=+0.182736087 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=healthy, container_name=swift_account_replicator, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-account, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, maintainer=OpenStack TripleO Team, tcib_managed=true, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, release=1766032510, distribution-scope=public, build-date=2026-01-12T22:50:44Z, com.redhat.component=openstack-swift-account-container, org.opencontainers.image.created=2026-01-12T22:50:44Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 swift-account, name=rhosp-rhel9/openstack-swift-account, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13) Feb 2 08:18:05 np0005604725 podman[140942]: 2026-02-02 08:18:05.514660421 +0000 UTC m=+0.250964953 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=healthy, maintainer=OpenStack TripleO Team, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:50:56Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, vendor=Red Hat, Inc., managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=swift_object_replicator, version=17.1.13, distribution-scope=public, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, batch=17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-object, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64, build-date=2026-01-12T22:50:56Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:18:05 np0005604725 podman[140943]: 2026-02-02 08:18:05.536903125 +0000 UTC m=+0.269466091 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, container_name=swift_account_server, com.redhat.component=openstack-swift-account-container, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, url=https://www.redhat.com, version=17.1.13, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, build-date=2026-01-12T22:50:44Z, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 swift-account, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, tcib_managed=true, architecture=x86_64, name=rhosp-rhel9/openstack-swift-account, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-account, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, io.buildah.version=1.41.5) Feb 2 08:18:05 np0005604725 podman[140938]: 2026-02-02 08:18:05.544810428 +0000 UTC m=+0.278822069 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=healthy, org.opencontainers.image.created=2026-01-12T22:50:57Z, com.redhat.component=openstack-swift-container-container, name=rhosp-rhel9/openstack-swift-container, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, io.openshift.expose-services=, distribution-scope=public, batch=17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, build-date=2026-01-12T22:50:57Z, tcib_managed=true, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, container_name=swift_container_server, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com) Feb 2 08:18:05 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Deactivated successfully. Feb 2 08:18:05 np0005604725 podman[140940]: 2026-02-02 08:18:05.575671857 +0000 UTC m=+0.309593626 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, release=1766032510, io.buildah.version=1.41.5, com.redhat.component=openstack-swift-account-container, config_id=tripleo_step4, version=17.1.13, vcs-type=git, name=rhosp-rhel9/openstack-swift-account, build-date=2026-01-12T22:50:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, container_name=swift_account_replicator, description=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, url=https://www.redhat.com) Feb 2 08:18:05 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:18:05 np0005604725 podman[140939]: 2026-02-02 08:18:05.587950413 +0000 UTC m=+0.325235835 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, io.openshift.expose-services=, config_id=tripleo_step4, distribution-scope=public, name=rhosp-rhel9/openstack-swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=swift_container_replicator, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-container-container, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:57Z, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 swift-container, version=17.1.13, managed_by=tripleo_ansible, build-date=2026-01-12T22:50:57Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, batch=17.1_20260112.1, url=https://www.redhat.com, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 swift-container) Feb 2 08:18:05 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Deactivated successfully. Feb 2 08:18:05 np0005604725 podman[140942]: 2026-02-02 08:18:05.630825151 +0000 UTC m=+0.367129623 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, com.redhat.component=openstack-swift-object-container, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 swift-object, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, distribution-scope=public, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, container_name=swift_object_replicator, release=1766032510, architecture=x86_64, build-date=2026-01-12T22:50:56Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-object, vendor=Red Hat, Inc., version=17.1.13, io.openshift.expose-services=, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:50:56Z, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4) Feb 2 08:18:05 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Deactivated successfully. Feb 2 08:18:05 np0005604725 podman[140938]: 2026-02-02 08:18:05.714738199 +0000 UTC m=+0.448749810 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 swift-container, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, release=1766032510, io.buildah.version=1.41.5, container_name=swift_container_server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:57Z, vcs-type=git, com.redhat.component=openstack-swift-container-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, name=rhosp-rhel9/openstack-swift-container, config_id=tripleo_step4, tcib_managed=true, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, build-date=2026-01-12T22:50:57Z, io.openshift.expose-services=, batch=17.1_20260112.1) Feb 2 08:18:05 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Deactivated successfully. Feb 2 08:18:05 np0005604725 puppet-user[140072]: Warning: This method is deprecated, please use match expressions with Stdlib::Compat::String instead. They are described at https://docs.puppet.com/puppet/latest/reference/lang_data_type.html#match-expressions. at ["/etc/puppet/modules/snmp/manifests/params.pp", 310]:["/var/lib/tripleo-config/puppet_step_config.pp", 7] Feb 2 08:18:05 np0005604725 puppet-user[140072]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Feb 2 08:18:05 np0005604725 puppet-user[140072]: Warning: This method is deprecated, please use the stdlib validate_legacy function, Feb 2 08:18:05 np0005604725 puppet-user[140072]: with Stdlib::Compat::Bool. There is further documentation for validate_legacy function in the README. at ["/etc/puppet/modules/snmp/manifests/init.pp", 358]:["/var/lib/tripleo-config/puppet_step_config.pp", 7] Feb 2 08:18:05 np0005604725 puppet-user[140072]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Feb 2 08:18:05 np0005604725 puppet-user[140072]: Warning: This method is deprecated, please use the stdlib validate_legacy function, Feb 2 08:18:05 np0005604725 puppet-user[140072]: with Stdlib::Compat::Array. There is further documentation for validate_legacy function in the README. at ["/etc/puppet/modules/snmp/manifests/init.pp", 367]:["/var/lib/tripleo-config/puppet_step_config.pp", 7] Feb 2 08:18:05 np0005604725 puppet-user[140072]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Feb 2 08:18:05 np0005604725 puppet-user[140072]: Warning: This method is deprecated, please use the stdlib validate_legacy function, Feb 2 08:18:05 np0005604725 puppet-user[140072]: with Stdlib::Compat::String. There is further documentation for validate_legacy function in the README. at ["/etc/puppet/modules/snmp/manifests/init.pp", 382]:["/var/lib/tripleo-config/puppet_step_config.pp", 7] Feb 2 08:18:05 np0005604725 puppet-user[140072]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Feb 2 08:18:05 np0005604725 puppet-user[140072]: Warning: This method is deprecated, please use the stdlib validate_legacy function, Feb 2 08:18:05 np0005604725 puppet-user[140072]: with Stdlib::Compat::Numeric. There is further documentation for validate_legacy function in the README. at ["/etc/puppet/modules/snmp/manifests/init.pp", 388]:["/var/lib/tripleo-config/puppet_step_config.pp", 7] Feb 2 08:18:05 np0005604725 puppet-user[140072]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Feb 2 08:18:05 np0005604725 puppet-user[140072]: Warning: This method is deprecated, please use the stdlib validate_legacy function, Feb 2 08:18:05 np0005604725 puppet-user[140072]: with Pattern[]. There is further documentation for validate_legacy function in the README. at ["/etc/puppet/modules/snmp/manifests/init.pp", 393]:["/var/lib/tripleo-config/puppet_step_config.pp", 7] Feb 2 08:18:05 np0005604725 puppet-user[140072]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Feb 2 08:18:05 np0005604725 puppet-user[140072]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/packages.pp, line: 39, column: 69) Feb 2 08:18:05 np0005604725 puppet-user[140072]: Notice: Compiled catalog for np0005604725.ooo.test in environment production in 0.62 seconds Feb 2 08:18:05 np0005604725 podman[140941]: 2026-02-02 08:18:05.861946673 +0000 UTC m=+0.588624409 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, managed_by=tripleo_ansible, build-date=2026-01-12T23:32:22Z, org.opencontainers.image.created=2026-01-12T23:32:22Z, tcib_managed=true, name=rhosp-rhel9/openstack-nova-novncproxy, io.openshift.expose-services=, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-novncproxy-container, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, architecture=x86_64, vcs-type=git, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, container_name=nova_vnc_proxy) Feb 2 08:18:05 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Deactivated successfully. Feb 2 08:18:06 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:18:06 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:18:06 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:18:06 np0005604725 podman[141235]: 2026-02-02 08:18:06.240580168 +0000 UTC m=+0.062472130 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:34:06Z, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, description=Red Hat OpenStack Platform 17.1 ovn-northd, name=rhosp-rhel9/openstack-ovn-northd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, container_name=ovn_cluster_northd, config_id=ovn_cluster_northd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, release=1766032510, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, tcib_managed=true, url=https://www.redhat.com, managed_by=tripleo_ansible, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-ovn-northd-container, io.openshift.expose-services=, build-date=2026-01-12T22:34:06Z, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 ovn-northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, vcs-type=git) Feb 2 08:18:06 np0005604725 podman[141235]: 2026-02-02 08:18:06.252170254 +0000 UTC m=+0.074062216 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., architecture=x86_64, container_name=ovn_cluster_northd, description=Red Hat OpenStack Platform 17.1 ovn-northd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, org.opencontainers.image.created=2026-01-12T22:34:06Z, build-date=2026-01-12T22:34:06Z, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, name=rhosp-rhel9/openstack-ovn-northd, batch=17.1_20260112.1, config_id=ovn_cluster_northd, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, vcs-type=git, version=17.1.13, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 ovn-northd, com.redhat.component=openstack-ovn-northd-container, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, release=1766032510) Feb 2 08:18:06 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:18:06 np0005604725 podman[141233]: 2026-02-02 08:18:06.287058527 +0000 UTC m=+0.109000501 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=healthy, tcib_managed=true, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, com.redhat.component=openstack-ovn-controller-container, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:36:40Z, vcs-type=git, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, container_name=ovn_controller, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, version=17.1.13, description=Red Hat OpenStack Platform 17.1 ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:36:40Z, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, url=https://www.redhat.com, io.openshift.expose-services=, managed_by=tripleo_ansible, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 ovn-controller, distribution-scope=public, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, name=rhosp-rhel9/openstack-ovn-controller) Feb 2 08:18:06 np0005604725 podman[141233]: 2026-02-02 08:18:06.315386177 +0000 UTC m=+0.137328141 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.buildah.version=1.41.5, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 ovn-controller, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, com.redhat.component=openstack-ovn-controller-container, container_name=ovn_controller, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, url=https://www.redhat.com, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, org.opencontainers.image.created=2026-01-12T22:36:40Z, io.openshift.expose-services=, vendor=Red Hat, Inc., version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:36:40Z, architecture=x86_64, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, name=rhosp-rhel9/openstack-ovn-controller, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 ovn-controller, batch=17.1_20260112.1) Feb 2 08:18:06 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:18:06 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:18:06 np0005604725 systemd[1]: tmp-crun.EHYFma.mount: Deactivated successfully. Feb 2 08:18:06 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Deactivated successfully. Feb 2 08:18:06 np0005604725 systemd[1]: tmp-crun.07Z1Xa.mount: Deactivated successfully. Feb 2 08:18:06 np0005604725 podman[141236]: 2026-02-02 08:18:06.418405822 +0000 UTC m=+0.238360915 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=healthy, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 placement-api, release=1766032510, name=rhosp-rhel9/openstack-placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, version=17.1.13, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, com.redhat.component=openstack-placement-api-container, org.opencontainers.image.created=2026-01-12T22:34:35Z, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, tcib_managed=true, container_name=placement_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., vcs-ref=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:35Z, architecture=x86_64, vcs-type=git, distribution-scope=public, url=https://www.redhat.com, batch=17.1_20260112.1) Feb 2 08:18:06 np0005604725 podman[141294]: 2026-02-02 08:18:06.435146847 +0000 UTC m=+0.085989183 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=healthy, container_name=swift_object_server, vcs-type=git, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, config_id=tripleo_step4, architecture=x86_64, maintainer=OpenStack TripleO Team, version=17.1.13, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, summary=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:50:56Z, name=rhosp-rhel9/openstack-swift-object, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:56Z, release=1766032510, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, managed_by=tripleo_ansible, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:18:06 np0005604725 podman[141236]: 2026-02-02 08:18:06.497659208 +0000 UTC m=+0.317614371 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, vcs-type=git, name=rhosp-rhel9/openstack-placement-api, container_name=placement_api, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 placement-api, build-date=2026-01-12T22:34:35Z, managed_by=tripleo_ansible, com.redhat.component=openstack-placement-api-container, org.opencontainers.image.created=2026-01-12T22:34:35Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, release=1766032510, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, io.openshift.expose-services=, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step4, version=17.1.13, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1) Feb 2 08:18:06 np0005604725 podman[141293]: 2026-02-02 08:18:06.507749118 +0000 UTC m=+0.168514819 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, distribution-scope=public, io.buildah.version=1.41.5, vcs-type=git, container_name=memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:12:26Z, managed_by=tripleo_ansible, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-memcached, summary=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, config_id=tripleo_step1, com.redhat.component=openstack-memcached-container, description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, maintainer=OpenStack TripleO Team) Feb 2 08:18:06 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:18:06 np0005604725 podman[141293]: 2026-02-02 08:18:06.527988861 +0000 UTC m=+0.188754612 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, com.redhat.component=openstack-memcached-container, container_name=memcached, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, build-date=2026-01-12T22:12:26Z, distribution-scope=public, config_id=tripleo_step1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, name=rhosp-rhel9/openstack-memcached, architecture=x86_64, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible) Feb 2 08:18:06 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:18:06 np0005604725 podman[141294]: 2026-02-02 08:18:06.684131418 +0000 UTC m=+0.334973824 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, config_id=tripleo_step4, com.redhat.component=openstack-swift-object-container, vcs-type=git, url=https://www.redhat.com, distribution-scope=public, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, vendor=Red Hat, Inc., container_name=swift_object_server, maintainer=OpenStack TripleO Team, release=1766032510, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, batch=17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:56Z, build-date=2026-01-12T22:50:56Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true) Feb 2 08:18:06 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Deactivated successfully. Feb 2 08:18:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:18:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:18:07 np0005604725 podman[141390]: 2026-02-02 08:18:07.331368037 +0000 UTC m=+0.076991046 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=healthy, name=rhosp-rhel9/openstack-glance-api, com.redhat.component=openstack-glance-api-container, config_id=tripleo_step4, io.openshift.expose-services=, architecture=x86_64, build-date=2026-01-12T22:34:42Z, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, container_name=glance_api_cron, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:34:42Z, description=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, tcib_managed=true) Feb 2 08:18:07 np0005604725 podman[141390]: 2026-02-02 08:18:07.340086755 +0000 UTC m=+0.085709724 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, io.openshift.expose-services=, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, container_name=glance_api_cron, name=rhosp-rhel9/openstack-glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:34:42Z, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, distribution-scope=public, managed_by=tripleo_ansible, url=https://www.redhat.com, com.redhat.component=openstack-glance-api-container, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, build-date=2026-01-12T22:34:42Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:18:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:18:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:18:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:18:07 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:18:07 np0005604725 podman[141391]: 2026-02-02 08:18:07.380357973 +0000 UTC m=+0.126007053 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, com.redhat.component=openstack-qdrouterd-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step1, container_name=metrics_qdr, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., distribution-scope=public, vcs-type=git, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-qdrouterd, build-date=2026-01-12T22:10:14Z, architecture=x86_64, version=17.1.13, release=1766032510, url=https://www.redhat.com) Feb 2 08:18:07 np0005604725 podman[141422]: 2026-02-02 08:18:07.441670327 +0000 UTC m=+0.074978905 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=healthy, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, release=1766032510, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, name=rhosp-rhel9/openstack-glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-glance-api-container, container_name=glance_api_internal, build-date=2026-01-12T22:34:42Z, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:34:42Z, architecture=x86_64, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, version=17.1.13, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:18:07 np0005604725 podman[141423]: 2026-02-02 08:18:07.492821979 +0000 UTC m=+0.115033056 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=healthy, release=1766032510, build-date=2026-01-12T22:34:42Z, container_name=glance_api, name=rhosp-rhel9/openstack-glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:34:42Z, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., tcib_managed=true, com.redhat.component=openstack-glance-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, version=17.1.13, description=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, url=https://www.redhat.com, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:18:07 np0005604725 podman[141425]: 2026-02-02 08:18:07.561454908 +0000 UTC m=+0.185745999 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, com.redhat.component=openstack-swift-object-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:56Z, summary=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, tcib_managed=true, build-date=2026-01-12T22:50:56Z, io.openshift.expose-services=, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, vcs-type=git, architecture=x86_64, distribution-scope=public, io.buildah.version=1.41.5, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, container_name=swift_rsync, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, version=17.1.13) Feb 2 08:18:07 np0005604725 podman[141391]: 2026-02-02 08:18:07.595031569 +0000 UTC m=+0.340680679 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, description=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-qdrouterd-container, summary=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:14Z, version=17.1.13, config_id=tripleo_step1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, container_name=metrics_qdr, name=rhosp-rhel9/openstack-qdrouterd, build-date=2026-01-12T22:10:14Z, architecture=x86_64, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, release=1766032510, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:18:07 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:18:07 np0005604725 podman[141422]: 2026-02-02 08:18:07.614825078 +0000 UTC m=+0.248133666 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, architecture=x86_64, build-date=2026-01-12T22:34:42Z, distribution-scope=public, com.redhat.component=openstack-glance-api-container, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., tcib_managed=true, config_id=tripleo_step4, release=1766032510, summary=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:34:42Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, url=https://www.redhat.com, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, container_name=glance_api_internal, batch=17.1_20260112.1) Feb 2 08:18:07 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Deactivated successfully. Feb 2 08:18:07 np0005604725 puppet-user[140072]: Notice: Applied catalog in 1.73 seconds Feb 2 08:18:07 np0005604725 puppet-user[140072]: Application: Feb 2 08:18:07 np0005604725 puppet-user[140072]: Initial environment: production Feb 2 08:18:07 np0005604725 puppet-user[140072]: Converged environment: production Feb 2 08:18:07 np0005604725 puppet-user[140072]: Run mode: user Feb 2 08:18:07 np0005604725 puppet-user[140072]: Changes: Feb 2 08:18:07 np0005604725 puppet-user[140072]: Events: Feb 2 08:18:07 np0005604725 puppet-user[140072]: Resources: Feb 2 08:18:07 np0005604725 puppet-user[140072]: Total: 32 Feb 2 08:18:07 np0005604725 puppet-user[140072]: Time: Feb 2 08:18:07 np0005604725 puppet-user[140072]: Schedule: 0.00 Feb 2 08:18:07 np0005604725 puppet-user[140072]: File line: 0.00 Feb 2 08:18:07 np0005604725 puppet-user[140072]: Package: 0.00 Feb 2 08:18:07 np0005604725 puppet-user[140072]: Augeas: 0.01 Feb 2 08:18:07 np0005604725 puppet-user[140072]: User: 0.01 Feb 2 08:18:07 np0005604725 puppet-user[140072]: File: 0.06 Feb 2 08:18:07 np0005604725 puppet-user[140072]: Service: 0.16 Feb 2 08:18:07 np0005604725 puppet-user[140072]: Config retrieval: 0.72 Feb 2 08:18:07 np0005604725 puppet-user[140072]: Exec: 1.31 Feb 2 08:18:07 np0005604725 puppet-user[140072]: Transaction evaluation: 1.72 Feb 2 08:18:07 np0005604725 puppet-user[140072]: Catalog application: 1.73 Feb 2 08:18:07 np0005604725 puppet-user[140072]: Last run: 1770020287 Feb 2 08:18:07 np0005604725 puppet-user[140072]: Filebucket: 0.00 Feb 2 08:18:07 np0005604725 puppet-user[140072]: Total: 1.74 Feb 2 08:18:07 np0005604725 puppet-user[140072]: Version: Feb 2 08:18:07 np0005604725 puppet-user[140072]: Config: 1770020285 Feb 2 08:18:07 np0005604725 puppet-user[140072]: Puppet: 7.10.0 Feb 2 08:18:07 np0005604725 podman[141423]: 2026-02-02 08:18:07.732849915 +0000 UTC m=+0.355061022 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, tcib_managed=true, name=rhosp-rhel9/openstack-glance-api, release=1766032510, distribution-scope=public, vendor=Red Hat, Inc., architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, container_name=glance_api, batch=17.1_20260112.1, url=https://www.redhat.com, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, managed_by=tripleo_ansible, com.redhat.component=openstack-glance-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:34:42Z, vcs-type=git) Feb 2 08:18:07 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Deactivated successfully. Feb 2 08:18:07 np0005604725 ansible-async_wrapper.py[140043]: Module complete (140043) Feb 2 08:18:07 np0005604725 podman[141425]: 2026-02-02 08:18:07.911913248 +0000 UTC m=+0.536204389 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, release=1766032510, description=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_rsync, org.opencontainers.image.created=2026-01-12T22:50:56Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, io.buildah.version=1.41.5, architecture=x86_64, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:56Z, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-swift-object, config_id=tripleo_step4, com.redhat.component=openstack-swift-object-container, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-object, tcib_managed=true, distribution-scope=public, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, version=17.1.13, maintainer=OpenStack TripleO Team) Feb 2 08:18:07 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:18:08 np0005604725 ansible-async_wrapper.py[140042]: Done in kid B. Feb 2 08:18:08 np0005604725 python3[141615]: ansible-ansible.legacy.async_status Invoked with jid=286403086575.140038 mode=status _async_dir=/tmp/.ansible_async Feb 2 08:18:09 np0005604725 python3[141647]: ansible-file Invoked with path=/var/lib/container-puppet/puppetlabs state=directory setype=svirt_sandbox_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Feb 2 08:18:10 np0005604725 python3[141731]: ansible-stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:18:10 np0005604725 python3[141800]: ansible-ansible.legacy.stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:18:10 np0005604725 python3[141818]: ansible-ansible.legacy.file Invoked with setype=svirt_sandbox_file_t selevel=s0 dest=/var/lib/container-puppet/puppetlabs/facter.conf _original_basename=tmpgyokq_ea recurse=False state=file path=/var/lib/container-puppet/puppetlabs/facter.conf force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Feb 2 08:18:11 np0005604725 python3[141857]: ansible-file Invoked with path=/opt/puppetlabs/facter state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:18:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:18:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:18:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:18:11 np0005604725 systemd[1]: tmp-crun.OoC2qk.mount: Deactivated successfully. Feb 2 08:18:11 np0005604725 podman[141890]: 2026-02-02 08:18:11.646448907 +0000 UTC m=+0.093894017 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=healthy, build-date=2026-01-12T23:31:50Z, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, architecture=x86_64, vcs-type=git, config_id=tripleo_step4, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=nova_api_cron, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T23:31:50Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, release=1766032510, io.openshift.expose-services=, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, name=rhosp-rhel9/openstack-nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, vendor=Red Hat, Inc., tcib_managed=true) Feb 2 08:18:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:18:11 np0005604725 podman[141891]: 2026-02-02 08:18:11.701819428 +0000 UTC m=+0.142426037 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, release=1766032510, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step4, name=rhosp-rhel9/openstack-nova-api, com.redhat.component=openstack-nova-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, tcib_managed=true, io.openshift.expose-services=, build-date=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., container_name=nova_metadata, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:18:11 np0005604725 podman[141890]: 2026-02-02 08:18:11.754303961 +0000 UTC m=+0.201749051 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, distribution-scope=public, release=1766032510, config_id=tripleo_step4, name=rhosp-rhel9/openstack-nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, vcs-type=git, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, container_name=nova_api_cron, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, architecture=x86_64, build-date=2026-01-12T23:31:50Z) Feb 2 08:18:11 np0005604725 podman[141933]: 2026-02-02 08:18:11.762908025 +0000 UTC m=+0.085090095 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp-rhel9/openstack-swift-proxy-server, container_name=swift_proxy, io.buildah.version=1.41.5, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-proxy-server-container, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, tcib_managed=true, distribution-scope=public, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.created=2026-01-12T22:50:51Z, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, release=1766032510, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, architecture=x86_64, build-date=2026-01-12T22:50:51Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, managed_by=tripleo_ansible) Feb 2 08:18:11 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:18:11 np0005604725 podman[141891]: 2026-02-02 08:18:11.786839861 +0000 UTC m=+0.227446490 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, batch=17.1_20260112.1, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T23:31:50Z, url=https://www.redhat.com, version=17.1.13, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=nova_metadata, build-date=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, name=rhosp-rhel9/openstack-nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-nova-api-container, maintainer=OpenStack TripleO Team, config_id=tripleo_step4) Feb 2 08:18:11 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:18:11 np0005604725 podman[141897]: 2026-02-02 08:18:11.757668104 +0000 UTC m=+0.193548098 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=healthy, container_name=nova_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, name=rhosp-rhel9/openstack-nova-api, io.openshift.expose-services=, build-date=2026-01-12T23:31:50Z, url=https://www.redhat.com, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, release=1766032510, vcs-type=git, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, managed_by=tripleo_ansible, version=17.1.13, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T23:31:50Z, architecture=x86_64, distribution-scope=public, com.redhat.component=openstack-nova-api-container, description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:18:11 np0005604725 podman[141897]: 2026-02-02 08:18:11.839899492 +0000 UTC m=+0.275779446 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, tcib_managed=true, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.created=2026-01-12T23:31:50Z, managed_by=tripleo_ansible, batch=17.1_20260112.1, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:31:50Z, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, vendor=Red Hat, Inc., container_name=nova_api, io.buildah.version=1.41.5, release=1766032510, url=https://www.redhat.com, distribution-scope=public) Feb 2 08:18:11 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:18:12 np0005604725 podman[141933]: 2026-02-02 08:18:11.99928751 +0000 UTC m=+0.321469700 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.created=2026-01-12T22:50:51Z, com.redhat.component=openstack-swift-proxy-server-container, container_name=swift_proxy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, managed_by=tripleo_ansible, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_id=tripleo_step4, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, build-date=2026-01-12T22:50:51Z, release=1766032510, name=rhosp-rhel9/openstack-swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., url=https://www.redhat.com, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, distribution-scope=public, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true) Feb 2 08:18:12 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Deactivated successfully. Feb 2 08:18:12 np0005604725 python3[142102]: ansible-ansible.posix.synchronize Invoked with src=/opt/puppetlabs/ dest=/var/lib/container-puppet/puppetlabs/ _local_rsync_path=rsync _local_rsync_password=NOT_LOGGING_PARAMETER rsync_path=None delete=False _substitute_controller=False archive=True checksum=False compress=True existing_only=False dirs=False copy_links=False set_remote_user=True rsync_timeout=0 rsync_opts=[] ssh_connection_multiplexing=False partial=False verify_host=False mode=push dest_port=None private_key=None recursive=None links=None perms=None times=None owner=None group=None ssh_args=None link_dest=None Feb 2 08:18:13 np0005604725 python3[142186]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:18:14 np0005604725 python3[142242]: ansible-stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 2 08:18:14 np0005604725 python3[142309]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-container-shutdown follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:18:14 np0005604725 python3[142327]: ansible-ansible.legacy.file Invoked with mode=0700 owner=root group=root dest=/usr/libexec/tripleo-container-shutdown _original_basename=tripleo-container-shutdown recurse=False state=file path=/usr/libexec/tripleo-container-shutdown force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:18:15 np0005604725 python3[142405]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-start-podman-container follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:18:15 np0005604725 python3[142431]: ansible-ansible.legacy.file Invoked with mode=0700 owner=root group=root dest=/usr/libexec/tripleo-start-podman-container _original_basename=tripleo-start-podman-container recurse=False state=file path=/usr/libexec/tripleo-start-podman-container force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:18:16 np0005604725 python3[142542]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/tripleo-container-shutdown.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:18:16 np0005604725 python3[142576]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system/tripleo-container-shutdown.service _original_basename=tripleo-container-shutdown-service recurse=False state=file path=/usr/lib/systemd/system/tripleo-container-shutdown.service force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:18:17 np0005604725 python3[142646]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:18:17 np0005604725 python3[142672]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset _original_basename=91-tripleo-container-shutdown-preset recurse=False state=file path=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:18:18 np0005604725 python3[142759]: ansible-systemd Invoked with name=tripleo-container-shutdown state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:18:18 np0005604725 systemd[1]: Reloading. Feb 2 08:18:18 np0005604725 systemd-rc-local-generator[142842]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:18:18 np0005604725 systemd-sysv-generator[142845]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:18:18 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:18:18 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:18:18 np0005604725 podman[142868]: 2026-02-02 08:18:18.655556893 +0000 UTC m=+0.101360697 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, url=https://www.redhat.com, release=1766032510, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:15Z, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, tcib_managed=true, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, config_id=tripleo_step3, summary=Red Hat OpenStack Platform 17.1 collectd, container_name=collectd, description=Red Hat OpenStack Platform 17.1 collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, io.openshift.expose-services=, com.redhat.component=openstack-collectd-container, build-date=2026-01-12T22:10:15Z, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-collectd, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}) Feb 2 08:18:18 np0005604725 podman[142868]: 2026-02-02 08:18:18.697818541 +0000 UTC m=+0.143622355 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, name=rhosp-rhel9/openstack-collectd, url=https://www.redhat.com, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., release=1766032510, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, version=17.1.13, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, container_name=collectd, vcs-type=git, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 collectd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.created=2026-01-12T22:10:15Z, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step3, managed_by=tripleo_ansible, distribution-scope=public, batch=17.1_20260112.1, build-date=2026-01-12T22:10:15Z, com.redhat.component=openstack-collectd-container) Feb 2 08:18:18 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:18:18 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:18:19 np0005604725 podman[142998]: 2026-02-02 08:18:19.085789793 +0000 UTC m=+0.089521582 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, config_id=tripleo_step3, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, container_name=horizon, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:34:41Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:41Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, vendor=Red Hat, Inc., version=17.1.13, tcib_managed=true, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-horizon, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, distribution-scope=public, com.redhat.component=openstack-horizon-container) Feb 2 08:18:19 np0005604725 python3[142999]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/netns-placeholder.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:18:19 np0005604725 podman[142998]: 2026-02-02 08:18:19.140965459 +0000 UTC m=+0.144697248 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:34:41Z, com.redhat.component=openstack-horizon-container, vcs-ref=705339545363fec600102567c4e923938e0f43b3, release=1766032510, description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 horizon, name=rhosp-rhel9/openstack-horizon, container_name=horizon, architecture=x86_64, io.openshift.expose-services=, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, url=https://www.redhat.com, config_id=tripleo_step3, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:34:41Z, vendor=Red Hat, Inc., io.buildah.version=1.41.5, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:18:19 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:18:19 np0005604725 python3[143042]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system/netns-placeholder.service _original_basename=netns-placeholder-service recurse=False state=file path=/usr/lib/systemd/system/netns-placeholder.service force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:18:20 np0005604725 python3[143129]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-netns-placeholder.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 2 08:18:20 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for openstack-cinder-volume-podman-0 on np0005604725 Feb 2 08:18:20 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for openstack-cinder-volume-podman-0 on np0005604725: not running Feb 2 08:18:20 np0005604725 python3[143209]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/usr/lib/systemd/system-preset/91-netns-placeholder.preset _original_basename=91-netns-placeholder-preset recurse=False state=file path=/usr/lib/systemd/system-preset/91-netns-placeholder.preset force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:18:20 np0005604725 python3[143267]: ansible-systemd Invoked with name=netns-placeholder state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Feb 2 08:18:20 np0005604725 systemd[1]: Reloading. Feb 2 08:18:20 np0005604725 systemd-rc-local-generator[143304]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:18:21 np0005604725 systemd-sysv-generator[143308]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:18:21 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:18:21 np0005604725 systemd[1]: Starting Create netns directory... Feb 2 08:18:21 np0005604725 systemd[1]: run-netns-placeholder.mount: Deactivated successfully. Feb 2 08:18:21 np0005604725 systemd[1]: netns-placeholder.service: Deactivated successfully. Feb 2 08:18:21 np0005604725 systemd[1]: Finished Create netns directory. Feb 2 08:18:21 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:18:21 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:18:21 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:18:22 np0005604725 podman[143362]: 2026-02-02 08:18:22.035528596 +0000 UTC m=+0.080157493 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, url=https://www.redhat.com, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:34:43Z, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, distribution-scope=public, architecture=x86_64, release=1766032510, summary=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-iscsid-container, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 iscsid, build-date=2026-01-12T22:34:43Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=iscsid, name=rhosp-rhel9/openstack-iscsid, io.openshift.expose-services=, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, tcib_managed=true, vcs-type=git, version=17.1.13, io.buildah.version=1.41.5, vendor=Red Hat, Inc.) Feb 2 08:18:22 np0005604725 podman[143362]: 2026-02-02 08:18:22.047908687 +0000 UTC m=+0.092537594 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, container_name=iscsid, io.buildah.version=1.41.5, vendor=Red Hat, Inc., config_id=tripleo_step3, vcs-type=git, build-date=2026-01-12T22:34:43Z, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.13, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:43Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-iscsid-container, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.expose-services=, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, distribution-scope=public, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-iscsid, batch=17.1_20260112.1) Feb 2 08:18:22 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:18:22 np0005604725 python3[143360]: ansible-file Invoked with path=/var/lib/container-puppet/container-puppet-tasks5.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:18:22 np0005604725 podman[143359]: 2026-02-02 08:18:22.049362931 +0000 UTC m=+0.093817663 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, vcs-type=git, name=rhosp-rhel9/openstack-keystone, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:33:53Z, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.buildah.version=1.41.5, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, summary=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, container_name=keystone, com.redhat.component=openstack-keystone-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, version=17.1.13, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., vcs-ref=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, io.openshift.expose-services=, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step3) Feb 2 08:18:22 np0005604725 podman[143361]: 2026-02-02 08:18:22.106353882 +0000 UTC m=+0.150652769 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, name=rhosp-rhel9/openstack-keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, version=17.1.13, vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, container_name=keystone_cron, description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, architecture=x86_64, managed_by=tripleo_ansible, com.redhat.component=openstack-keystone-container, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, summary=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, build-date=2026-01-12T22:33:53Z, url=https://www.redhat.com, vendor=Red Hat, Inc., config_id=tripleo_step3, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5) Feb 2 08:18:22 np0005604725 podman[143361]: 2026-02-02 08:18:22.141910085 +0000 UTC m=+0.186208992 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, managed_by=tripleo_ansible, url=https://www.redhat.com, com.redhat.component=openstack-keystone-container, io.buildah.version=1.41.5, container_name=keystone_cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, build-date=2026-01-12T22:33:53Z, config_id=tripleo_step3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, name=rhosp-rhel9/openstack-keystone, architecture=x86_64, batch=17.1_20260112.1) Feb 2 08:18:22 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:18:22 np0005604725 podman[143359]: 2026-02-02 08:18:22.174727644 +0000 UTC m=+0.219182386 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, container_name=keystone, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, release=1766032510, architecture=x86_64, distribution-scope=public, name=rhosp-rhel9/openstack-keystone, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:33:53Z, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:33:53Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vendor=Red Hat, Inc., config_id=tripleo_step3, io.buildah.version=1.41.5, com.redhat.component=openstack-keystone-container) Feb 2 08:18:22 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:18:22 np0005604725 systemd[1]: tmp-crun.VsoelP.mount: Deactivated successfully. Feb 2 08:18:23 np0005604725 python3[143694]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=True puppet_config=/var/lib/container-puppet/container-puppet-tasks5.json short_hostname=np0005604725 step=5 update_config_hash_only=False Feb 2 08:18:24 np0005604725 python3[143726]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Feb 2 08:18:24 np0005604725 python3[143742]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_5 config_pattern=container-puppet-*.json config_overrides={} debug=True Feb 2 08:18:24 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of start operation for openstack-cinder-volume-podman-0 on np0005604725 Feb 2 08:18:25 np0005604725 podman(openstack-cinder-volume-podman-0)[143763]: INFO: running container openstack-cinder-volume-podman-0 for the first time Feb 2 08:18:25 np0005604725 podman[143820]: 2026-02-02 08:18:25.300854369 +0000 UTC m=+0.115317465 container create c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, distribution-scope=public, build-date=2026-01-12T22:58:35Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, summary=Red Hat OpenStack Platform 17.1 cinder-volume, tcib_managed=true, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-volume, vendor=Red Hat, Inc., url=https://www.redhat.com, name=rhosp-rhel9/openstack-cinder-volume, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-cinder-volume-container, org.opencontainers.image.created=2026-01-12T22:58:35Z, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, vcs-type=git, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, batch=17.1_20260112.1, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:18:25 np0005604725 podman[143820]: 2026-02-02 08:18:25.24590502 +0000 UTC m=+0.060368096 image pull cluster.common.tag/cinder-volume:pcmklatest Feb 2 08:18:25 np0005604725 systemd[1]: Started libcrun container. Feb 2 08:18:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/76b8f40d10159572038b62c5bb6b49f2a50fd8bea3c78676fccacb6612126600/merged/etc/target supports timestamps until 2038 (0x7fffffff) Feb 2 08:18:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/76b8f40d10159572038b62c5bb6b49f2a50fd8bea3c78676fccacb6612126600/merged/var/log/cinder supports timestamps until 2038 (0x7fffffff) Feb 2 08:18:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/76b8f40d10159572038b62c5bb6b49f2a50fd8bea3c78676fccacb6612126600/merged/var/lib/iscsi supports timestamps until 2038 (0x7fffffff) Feb 2 08:18:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/76b8f40d10159572038b62c5bb6b49f2a50fd8bea3c78676fccacb6612126600/merged/var/lib/cinder supports timestamps until 2038 (0x7fffffff) Feb 2 08:18:25 np0005604725 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/76b8f40d10159572038b62c5bb6b49f2a50fd8bea3c78676fccacb6612126600/merged/var/lib/kolla/config_files/src-ceph supports timestamps until 2038 (0x7fffffff) Feb 2 08:18:25 np0005604725 podman[143820]: 2026-02-02 08:18:25.372237522 +0000 UTC m=+0.186700618 container init c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., architecture=x86_64, version=17.1.13, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-volume, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, com.redhat.component=openstack-cinder-volume-container, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 cinder-volume, build-date=2026-01-12T22:58:35Z, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:58:35Z, description=Red Hat OpenStack Platform 17.1 cinder-volume, url=https://www.redhat.com) Feb 2 08:18:25 np0005604725 podman[143820]: 2026-02-02 08:18:25.382804277 +0000 UTC m=+0.197267323 container start c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, release=1766032510, org.opencontainers.image.created=2026-01-12T22:58:35Z, com.redhat.component=openstack-cinder-volume-container, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 cinder-volume, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, name=rhosp-rhel9/openstack-cinder-volume, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, version=17.1.13, architecture=x86_64, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-volume, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:58:35Z, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, vcs-type=git, vendor=Red Hat, Inc., distribution-scope=public, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:18:25 np0005604725 podman(openstack-cinder-volume-podman-0)[143763]: INFO: c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e Feb 2 08:18:25 np0005604725 systemd[1]: Created slice User Slice of UID 0. Feb 2 08:18:25 np0005604725 systemd[1]: Starting User Runtime Directory /run/user/0... Feb 2 08:18:25 np0005604725 systemd[1]: Finished User Runtime Directory /run/user/0. Feb 2 08:18:25 np0005604725 systemd[1]: Starting User Manager for UID 0... Feb 2 08:18:25 np0005604725 podman(openstack-cinder-volume-podman-0)[143763]: INFO: Creating drop-in dependency for "openstack-cinder-volume-podman-0" (c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e) Feb 2 08:18:25 np0005604725 systemd[1]: Reloading. Feb 2 08:18:25 np0005604725 systemd[143861]: Queued start job for default target Main User Target. Feb 2 08:18:25 np0005604725 systemd[143861]: Created slice User Application Slice. Feb 2 08:18:25 np0005604725 systemd[143861]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Feb 2 08:18:25 np0005604725 systemd[143861]: Started Daily Cleanup of User's Temporary Directories. Feb 2 08:18:25 np0005604725 systemd[143861]: Reached target Paths. Feb 2 08:18:25 np0005604725 systemd[143861]: Reached target Timers. Feb 2 08:18:25 np0005604725 systemd[143861]: Starting D-Bus User Message Bus Socket... Feb 2 08:18:25 np0005604725 systemd[143861]: Starting Create User's Volatile Files and Directories... Feb 2 08:18:25 np0005604725 systemd[143861]: Listening on D-Bus User Message Bus Socket. Feb 2 08:18:25 np0005604725 systemd[143861]: Reached target Sockets. Feb 2 08:18:25 np0005604725 systemd[143861]: Finished Create User's Volatile Files and Directories. Feb 2 08:18:25 np0005604725 systemd[143861]: Reached target Basic System. Feb 2 08:18:25 np0005604725 systemd[143861]: Reached target Main User Target. Feb 2 08:18:25 np0005604725 systemd[143861]: Startup finished in 233ms. Feb 2 08:18:25 np0005604725 systemd-sysv-generator[143931]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:18:25 np0005604725 systemd-rc-local-generator[143925]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:18:25 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:18:26 np0005604725 systemd[1]: Started User Manager for UID 0. Feb 2 08:18:26 np0005604725 systemd[1]: Started Session c4 of User root. Feb 2 08:18:26 np0005604725 systemd[1]: session-c4.scope: Deactivated successfully. Feb 2 08:18:26 np0005604725 podman[143986]: 2026-02-02 08:18:26.266888774 +0000 UTC m=+0.119678159 container exec c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:58:35Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, tcib_managed=true, distribution-scope=public, batch=17.1_20260112.1, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 cinder-volume, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, com.redhat.component=openstack-cinder-volume-container, io.buildah.version=1.41.5, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, maintainer=OpenStack TripleO Team, version=17.1.13, name=rhosp-rhel9/openstack-cinder-volume, release=1766032510, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 cinder-volume, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, vcs-type=git, build-date=2026-01-12T22:58:35Z) Feb 2 08:18:26 np0005604725 systemd[1]: Started Session c5 of User root. Feb 2 08:18:26 np0005604725 podman[143986]: 2026-02-02 08:18:26.297003129 +0000 UTC m=+0.149792464 container exec_died c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, org.opencontainers.image.created=2026-01-12T22:58:35Z, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 cinder-volume, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, url=https://www.redhat.com, com.redhat.component=openstack-cinder-volume-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, io.buildah.version=1.41.5, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-volume, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-cinder-volume, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, vcs-type=git, batch=17.1_20260112.1, build-date=2026-01-12T22:58:35Z) Feb 2 08:18:26 np0005604725 systemd[1]: session-c5.scope: Deactivated successfully. Feb 2 08:18:26 np0005604725 systemd[1]: tmp-crun.T34Tvu.mount: Deactivated successfully. Feb 2 08:18:26 np0005604725 systemd[1]: tmp-crun.3zsOry.mount: Deactivated successfully. Feb 2 08:18:26 np0005604725 podman[144023]: 2026-02-02 08:18:26.456559202 +0000 UTC m=+0.129866361 container exec c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, distribution-scope=public, io.openshift.expose-services=, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:58:35Z, name=rhosp-rhel9/openstack-cinder-volume, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 cinder-volume, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vcs-type=git, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 cinder-volume, version=17.1.13, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:58:35Z, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-cinder-volume-container, tcib_managed=true) Feb 2 08:18:26 np0005604725 podman[144023]: 2026-02-02 08:18:26.487835843 +0000 UTC m=+0.161143002 container exec_died c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, summary=Red Hat OpenStack Platform 17.1 cinder-volume, name=rhosp-rhel9/openstack-cinder-volume, vendor=Red Hat, Inc., distribution-scope=public, io.buildah.version=1.41.5, io.openshift.expose-services=, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-cinder-volume-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, build-date=2026-01-12T22:58:35Z, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, maintainer=OpenStack TripleO Team, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 cinder-volume, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, org.opencontainers.image.created=2026-01-12T22:58:35Z, tcib_managed=true, vcs-type=git, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:18:26 np0005604725 podman(openstack-cinder-volume-podman-0)[143763]: NOTICE: Container openstack-cinder-volume-podman-0 started successfully Feb 2 08:18:26 np0005604725 pacemaker-controld[51065]: notice: Result of start operation for openstack-cinder-volume-podman-0 on np0005604725: ok Feb 2 08:18:26 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of monitor operation for openstack-cinder-volume-podman-0 on np0005604725 Feb 2 08:18:26 np0005604725 podman[144075]: 2026-02-02 08:18:26.613756283 +0000 UTC m=+0.059536801 container exec c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:58:35Z, io.buildah.version=1.41.5, com.redhat.component=openstack-cinder-volume-container, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, name=rhosp-rhel9/openstack-cinder-volume, tcib_managed=true, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:58:35Z, release=1766032510, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 cinder-volume, summary=Red Hat OpenStack Platform 17.1 cinder-volume, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, architecture=x86_64, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:18:26 np0005604725 podman[144075]: 2026-02-02 08:18:26.642578839 +0000 UTC m=+0.088359357 container exec_died c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, vcs-type=git, build-date=2026-01-12T22:58:35Z, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, release=1766032510, version=17.1.13, architecture=x86_64, com.redhat.component=openstack-cinder-volume-container, description=Red Hat OpenStack Platform 17.1 cinder-volume, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, io.openshift.expose-services=, url=https://www.redhat.com, tcib_managed=true, distribution-scope=public, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, summary=Red Hat OpenStack Platform 17.1 cinder-volume, org.opencontainers.image.created=2026-01-12T22:58:35Z, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, name=rhosp-rhel9/openstack-cinder-volume, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc.) Feb 2 08:18:26 np0005604725 pacemaker-controld[51065]: notice: Result of monitor operation for openstack-cinder-volume-podman-0 on np0005604725: ok Feb 2 08:18:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:18:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:18:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:18:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:18:28 np0005604725 podman[144194]: 2026-02-02 08:18:28.352787052 +0000 UTC m=+0.083666162 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, container_name=clustercheck, description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, release=1766032510, com.redhat.component=openstack-mariadb-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, architecture=x86_64, distribution-scope=public, config_id=tripleo_step2, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:18Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, io.openshift.expose-services=, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, version=17.1.13, batch=17.1_20260112.1, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:18:28 np0005604725 podman[144191]: 2026-02-02 08:18:28.422446603 +0000 UTC m=+0.162954638 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=healthy, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, vcs-type=git, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-ceilometer-central, description=Red Hat OpenStack Platform 17.1 ceilometer-central, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, config_id=tripleo_step4, vendor=Red Hat, Inc., build-date=2026-01-12T23:07:24Z, tcib_managed=true, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T23:07:24Z, batch=17.1_20260112.1, io.openshift.expose-services=, release=1766032510, com.redhat.component=openstack-ceilometer-central-container, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, container_name=ceilometer_agent_central, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central) Feb 2 08:18:28 np0005604725 podman[144191]: 2026-02-02 08:18:28.452846987 +0000 UTC m=+0.193354972 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, batch=17.1_20260112.1, config_id=tripleo_step4, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, tcib_managed=true, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-ceilometer-central-container, build-date=2026-01-12T23:07:24Z, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-ceilometer-central, io.openshift.expose-services=, managed_by=tripleo_ansible, vcs-type=git, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T23:07:24Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 ceilometer-central, container_name=ceilometer_agent_central, distribution-scope=public) Feb 2 08:18:28 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:18:28 np0005604725 podman[144200]: 2026-02-02 08:18:28.47440957 +0000 UTC m=+0.198030066 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, config_id=tripleo_step4, architecture=x86_64, container_name=cinder_api_cron, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, build-date=2026-01-12T22:58:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:58:44Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.openshift.expose-services=, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.13, com.redhat.component=openstack-cinder-api-container, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public) Feb 2 08:18:28 np0005604725 podman[144194]: 2026-02-02 08:18:28.503255876 +0000 UTC m=+0.234135016 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, io.buildah.version=1.41.5, build-date=2026-01-12T22:10:18Z, name=rhosp-rhel9/openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-mariadb-container, config_id=tripleo_step2, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, tcib_managed=true, managed_by=tripleo_ansible, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, version=17.1.13, container_name=clustercheck, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 mariadb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, vendor=Red Hat, Inc., release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, maintainer=OpenStack TripleO Team) Feb 2 08:18:28 np0005604725 podman[144200]: 2026-02-02 08:18:28.514979276 +0000 UTC m=+0.238599782 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, architecture=x86_64, container_name=cinder_api_cron, build-date=2026-01-12T22:58:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, distribution-scope=public, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.buildah.version=1.41.5, url=https://www.redhat.com, name=rhosp-rhel9/openstack-cinder-api, release=1766032510, vendor=Red Hat, Inc.) Feb 2 08:18:28 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:18:28 np0005604725 podman[144193]: 2026-02-02 08:18:28.521344762 +0000 UTC m=+0.258253937 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=healthy, architecture=x86_64, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, tcib_managed=true, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, maintainer=OpenStack TripleO Team, release=1766032510, name=rhosp-rhel9/openstack-cinder-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, managed_by=tripleo_ansible, build-date=2026-01-12T22:58:47Z, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, container_name=cinder_scheduler, batch=17.1_20260112.1, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, io.openshift.expose-services=, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:58:47Z, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, com.redhat.component=openstack-cinder-scheduler-container, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, config_id=tripleo_step4) Feb 2 08:18:28 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:18:28 np0005604725 podman[144193]: 2026-02-02 08:18:28.585909956 +0000 UTC m=+0.322819171 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.openshift.expose-services=, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, url=https://www.redhat.com, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-cinder-scheduler, org.opencontainers.image.created=2026-01-12T22:58:47Z, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, vendor=Red Hat, Inc., tcib_managed=true, container_name=cinder_scheduler, com.redhat.component=openstack-cinder-scheduler-container, version=17.1.13, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vcs-type=git, build-date=2026-01-12T22:58:47Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, release=1766032510) Feb 2 08:18:28 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:18:28 np0005604725 systemd[1]: Started Device-mapper event daemon. Feb 2 08:18:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:18:28 np0005604725 dmeventd[144349]: dmeventd ready for processing. Feb 2 08:18:28 np0005604725 dmeventd[144349]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Feb 2 08:18:28 np0005604725 lvm[144369]: PV /dev/loop0 online, VG cinder-volumes is complete. Feb 2 08:18:28 np0005604725 lvm[144369]: VG cinder-volumes finished Feb 2 08:18:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:18:28 np0005604725 podman[144351]: 2026-02-02 08:18:28.763736391 +0000 UTC m=+0.085089636 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=healthy, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, build-date=2026-01-12T23:07:25Z, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, tcib_managed=true, com.redhat.component=openstack-ceilometer-notification-container, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, name=rhosp-rhel9/openstack-ceilometer-notification, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, architecture=x86_64, io.buildah.version=1.41.5, distribution-scope=public, config_id=tripleo_step4, managed_by=tripleo_ansible, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, org.opencontainers.image.created=2026-01-12T23:07:25Z, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, container_name=ceilometer_agent_notification, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, batch=17.1_20260112.1, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06) Feb 2 08:18:28 np0005604725 podman[144351]: 2026-02-02 08:18:28.812681244 +0000 UTC m=+0.134034449 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, url=https://www.redhat.com, build-date=2026-01-12T23:07:25Z, vcs-type=git, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, architecture=x86_64, io.buildah.version=1.41.5, distribution-scope=public, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, name=rhosp-rhel9/openstack-ceilometer-notification, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, container_name=ceilometer_agent_notification, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, org.opencontainers.image.created=2026-01-12T23:07:25Z, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, com.redhat.component=openstack-ceilometer-notification-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, managed_by=tripleo_ansible, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:18:28 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:18:28 np0005604725 podman[144379]: 2026-02-02 08:18:28.817336698 +0000 UTC m=+0.052251207 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, name=rhosp-rhel9/openstack-heat-api, release=1766032510, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.created=2026-01-12T22:53:19Z, maintainer=OpenStack TripleO Team, vcs-type=git, build-date=2026-01-12T22:53:19Z, architecture=x86_64, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, distribution-scope=public, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, vcs-ref=755001522886c265e88561b4997cab642504a845, vendor=Red Hat, Inc., com.redhat.component=openstack-heat-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_step4, managed_by=tripleo_ansible, batch=17.1_20260112.1, container_name=heat_api_cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:18:28 np0005604725 podman[144379]: 2026-02-02 08:18:28.90918578 +0000 UTC m=+0.144100349 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, name=rhosp-rhel9/openstack-heat-api, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:53:19Z, version=17.1.13, config_id=tripleo_step4, vendor=Red Hat, Inc., distribution-scope=public, managed_by=tripleo_ansible, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, com.redhat.component=openstack-heat-api-container, container_name=heat_api_cron, summary=Red Hat OpenStack Platform 17.1 heat-api, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, io.openshift.expose-services=, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, maintainer=OpenStack TripleO Team, release=1766032510, vcs-ref=755001522886c265e88561b4997cab642504a845, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64) Feb 2 08:18:28 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:18:28 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:18:29 np0005604725 podman[144415]: 2026-02-02 08:18:29.012527426 +0000 UTC m=+0.068956890 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=healthy, vcs-ref=755001522886c265e88561b4997cab642504a845, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, container_name=heat_engine, managed_by=tripleo_ansible, url=https://www.redhat.com, io.openshift.expose-services=, distribution-scope=public, version=17.1.13, com.redhat.component=openstack-heat-engine-container, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:53:38Z, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 heat-engine, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, name=rhosp-rhel9/openstack-heat-engine, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, architecture=x86_64, build-date=2026-01-12T22:53:38Z, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 heat-engine, release=1766032510, batch=17.1_20260112.1) Feb 2 08:18:29 np0005604725 podman[144415]: 2026-02-02 08:18:29.041777345 +0000 UTC m=+0.098206829 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, description=Red Hat OpenStack Platform 17.1 heat-engine, container_name=heat_engine, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, url=https://www.redhat.com, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-heat-engine, architecture=x86_64, vcs-type=git, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, managed_by=tripleo_ansible, version=17.1.13, com.redhat.component=openstack-heat-engine-container, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, summary=Red Hat OpenStack Platform 17.1 heat-engine, build-date=2026-01-12T22:53:38Z, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:53:38Z, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=) Feb 2 08:18:29 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:18:29 np0005604725 systemd[1]: tmp-crun.qL9XfK.mount: Deactivated successfully. Feb 2 08:18:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:18:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:18:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:18:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:18:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:18:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:18:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:18:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:18:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:18:32 np0005604725 podman[144605]: 2026-02-02 08:18:32.411644538 +0000 UTC m=+0.120695470 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=healthy, batch=17.1_20260112.1, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, managed_by=tripleo_ansible, tcib_managed=true, container_name=neutron_api, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, com.redhat.component=openstack-neutron-server-container, vcs-type=git, description=Red Hat OpenStack Platform 17.1 neutron-server, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-neutron-server, url=https://www.redhat.com, release=1766032510, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, summary=Red Hat OpenStack Platform 17.1 neutron-server, io.buildah.version=1.41.5, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:57:35Z) Feb 2 08:18:32 np0005604725 podman[144577]: 2026-02-02 08:18:32.367643905 +0000 UTC m=+0.111702693 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, batch=17.1_20260112.1, container_name=cinder_api, distribution-scope=public, url=https://www.redhat.com, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, build-date=2026-01-12T22:58:44Z, io.openshift.expose-services=, name=rhosp-rhel9/openstack-cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.component=openstack-cinder-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, version=17.1.13) Feb 2 08:18:32 np0005604725 podman[144594]: 2026-02-02 08:18:32.497909499 +0000 UTC m=+0.219486505 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=healthy, summary=Red Hat OpenStack Platform 17.1 manila-api, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:52:22Z, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, org.opencontainers.image.created=2026-01-12T22:52:22Z, vendor=Red Hat, Inc., release=1766032510, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, url=https://www.redhat.com, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, managed_by=tripleo_ansible, architecture=x86_64, container_name=manila_api_cron, name=rhosp-rhel9/openstack-manila-api, batch=17.1_20260112.1, io.buildah.version=1.41.5, com.redhat.component=openstack-manila-api-container, description=Red Hat OpenStack Platform 17.1 manila-api, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, config_id=tripleo_step4, distribution-scope=public) Feb 2 08:18:32 np0005604725 podman[144578]: 2026-02-02 08:18:32.50966396 +0000 UTC m=+0.246455105 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=healthy, description=Red Hat OpenStack Platform 17.1 nova-conductor, version=17.1.13, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-conductor-container, architecture=x86_64, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T23:32:18Z, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:32:18Z, batch=17.1_20260112.1, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, tcib_managed=true, name=rhosp-rhel9/openstack-nova-conductor, distribution-scope=public, container_name=nova_conductor, summary=Red Hat OpenStack Platform 17.1 nova-conductor, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible) Feb 2 08:18:32 np0005604725 podman[144594]: 2026-02-02 08:18:32.532848622 +0000 UTC m=+0.254425588 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, com.redhat.component=openstack-manila-api-container, build-date=2026-01-12T22:52:22Z, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, batch=17.1_20260112.1, io.buildah.version=1.41.5, managed_by=tripleo_ansible, url=https://www.redhat.com, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, container_name=manila_api_cron, name=rhosp-rhel9/openstack-manila-api, distribution-scope=public, vcs-type=git, description=Red Hat OpenStack Platform 17.1 manila-api, org.opencontainers.image.created=2026-01-12T22:52:22Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, config_id=tripleo_step4, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api) Feb 2 08:18:32 np0005604725 podman[144611]: 2026-02-02 08:18:32.548482033 +0000 UTC m=+0.258694910 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-manila-scheduler-container, release=1766032510, io.buildah.version=1.41.5, url=https://www.redhat.com, name=rhosp-rhel9/openstack-manila-scheduler, distribution-scope=public, tcib_managed=true, config_id=tripleo_step4, managed_by=tripleo_ansible, architecture=x86_64, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, description=Red Hat OpenStack Platform 17.1 manila-scheduler, org.opencontainers.image.created=2026-01-12T22:52:54Z, vendor=Red Hat, Inc., vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, container_name=manila_scheduler, build-date=2026-01-12T22:52:54Z, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, version=17.1.13) Feb 2 08:18:32 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:18:32 np0005604725 podman[144578]: 2026-02-02 08:18:32.558859822 +0000 UTC m=+0.295650957 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, config_id=tripleo_step4, name=rhosp-rhel9/openstack-nova-conductor, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=nova_conductor, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, description=Red Hat OpenStack Platform 17.1 nova-conductor, release=1766032510, summary=Red Hat OpenStack Platform 17.1 nova-conductor, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, version=17.1.13, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, batch=17.1_20260112.1, url=https://www.redhat.com, architecture=x86_64, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:32:18Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:32:18Z, com.redhat.component=openstack-nova-conductor-container, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, io.openshift.expose-services=, vendor=Red Hat, Inc., distribution-scope=public) Feb 2 08:18:32 np0005604725 podman[144577]: 2026-02-02 08:18:32.565867267 +0000 UTC m=+0.309926155 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, org.opencontainers.image.created=2026-01-12T22:58:44Z, release=1766032510, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-api, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 cinder-api, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 cinder-api, build-date=2026-01-12T22:58:44Z, maintainer=OpenStack TripleO Team, container_name=cinder_api, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.buildah.version=1.41.5, com.redhat.component=openstack-cinder-api-container) Feb 2 08:18:32 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:18:32 np0005604725 podman[144583]: 2026-02-02 08:18:32.42732671 +0000 UTC m=+0.164298340 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:53:19Z, version=17.1.13, vcs-type=git, vcs-ref=755001522886c265e88561b4997cab642504a845, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container, name=rhosp-rhel9/openstack-heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, org.opencontainers.image.created=2026-01-12T22:53:19Z, distribution-scope=public, config_id=tripleo_step4, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, managed_by=tripleo_ansible, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, container_name=heat_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, url=https://www.redhat.com, vendor=Red Hat, Inc.) Feb 2 08:18:32 np0005604725 podman[144611]: 2026-02-02 08:18:32.58383829 +0000 UTC m=+0.294051167 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, org.opencontainers.image.created=2026-01-12T22:52:54Z, vcs-type=git, distribution-scope=public, io.openshift.expose-services=, name=rhosp-rhel9/openstack-manila-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, vendor=Red Hat, Inc., vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, release=1766032510, architecture=x86_64, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, com.redhat.component=openstack-manila-scheduler-container, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 manila-scheduler, tcib_managed=true, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, config_id=tripleo_step4, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, build-date=2026-01-12T22:52:54Z, container_name=manila_scheduler) Feb 2 08:18:32 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:18:32 np0005604725 podman[144583]: 2026-02-02 08:18:32.606881258 +0000 UTC m=+0.343852908 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, tcib_managed=true, com.redhat.component=openstack-heat-api-container, description=Red Hat OpenStack Platform 17.1 heat-api, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:53:19Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-ref=755001522886c265e88561b4997cab642504a845, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., container_name=heat_api, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, distribution-scope=public, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-heat-api, release=1766032510, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible, url=https://www.redhat.com) Feb 2 08:18:32 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:18:32 np0005604725 podman[144605]: 2026-02-02 08:18:32.62554169 +0000 UTC m=+0.334592642 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 neutron-server, distribution-scope=public, version=17.1.13, build-date=2026-01-12T22:57:35Z, org.opencontainers.image.created=2026-01-12T22:57:35Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, io.openshift.expose-services=, release=1766032510, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, com.redhat.component=openstack-neutron-server-container, batch=17.1_20260112.1, config_id=tripleo_step4, vcs-type=git, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, container_name=neutron_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, summary=Red Hat OpenStack Platform 17.1 neutron-server, name=rhosp-rhel9/openstack-neutron-server, tcib_managed=true, architecture=x86_64) Feb 2 08:18:32 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:18:32 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:18:32 np0005604725 podman[144584]: 2026-02-02 08:18:32.611636333 +0000 UTC m=+0.340192424 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, managed_by=tripleo_ansible, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-cron, config_id=tripleo_step4, tcib_managed=true, vcs-type=git, build-date=2026-01-12T22:10:15Z, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 cron, io.openshift.expose-services=, container_name=logrotate_crond, summary=Red Hat OpenStack Platform 17.1 cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, com.redhat.component=openstack-cron-container, distribution-scope=public, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, url=https://www.redhat.com, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:15Z, vendor=Red Hat, Inc.) Feb 2 08:18:32 np0005604725 podman[144620]: 2026-02-02 08:18:32.711017817 +0000 UTC m=+0.410673881 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=healthy, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, tcib_managed=true, build-date=2026-01-12T23:32:05Z, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-nova-scheduler, config_id=tripleo_step4, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T23:32:05Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-nova-scheduler-container, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, version=17.1.13, container_name=nova_scheduler, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, distribution-scope=public, io.openshift.expose-services=, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 nova-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler) Feb 2 08:18:32 np0005604725 podman[144584]: 2026-02-02 08:18:32.741634078 +0000 UTC m=+0.470190189 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 cron, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 cron, com.redhat.component=openstack-cron-container, container_name=logrotate_crond, name=rhosp-rhel9/openstack-cron, org.opencontainers.image.created=2026-01-12T22:10:15Z, io.buildah.version=1.41.5, distribution-scope=public, release=1766032510, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, managed_by=tripleo_ansible, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, build-date=2026-01-12T22:10:15Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron) Feb 2 08:18:32 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:18:32 np0005604725 podman[144620]: 2026-02-02 08:18:32.768775263 +0000 UTC m=+0.468431347 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, org.opencontainers.image.created=2026-01-12T23:32:05Z, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 nova-scheduler, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T23:32:05Z, io.openshift.expose-services=, release=1766032510, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, distribution-scope=public, batch=17.1_20260112.1, architecture=x86_64, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., config_id=tripleo_step4, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, com.redhat.component=openstack-nova-scheduler-container, name=rhosp-rhel9/openstack-nova-scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, container_name=nova_scheduler) Feb 2 08:18:32 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:18:32 np0005604725 podman[144601]: 2026-02-02 08:18:32.745856538 +0000 UTC m=+0.463589857 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, container_name=heat_api_cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-ref=755001522886c265e88561b4997cab642504a845, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-heat-api-cfn, org.opencontainers.image.created=2026-01-12T22:54:02Z, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, distribution-scope=public, vendor=Red Hat, Inc., release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, version=17.1.13, com.redhat.component=openstack-heat-api-cfn-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, url=https://www.redhat.com, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, build-date=2026-01-12T22:54:02Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, architecture=x86_64, managed_by=tripleo_ansible, io.openshift.expose-services=, tcib_managed=true) Feb 2 08:18:32 np0005604725 podman[144601]: 2026-02-02 08:18:32.808752521 +0000 UTC m=+0.526485840 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, url=https://www.redhat.com, io.openshift.expose-services=, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, config_id=tripleo_step4, architecture=x86_64, distribution-scope=public, com.redhat.component=openstack-heat-api-cfn-container, io.buildah.version=1.41.5, build-date=2026-01-12T22:54:02Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-ref=755001522886c265e88561b4997cab642504a845, name=rhosp-rhel9/openstack-heat-api-cfn, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.created=2026-01-12T22:54:02Z, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, managed_by=tripleo_ansible, tcib_managed=true, container_name=heat_api_cfn, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845) Feb 2 08:18:32 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:18:33 np0005604725 systemd[1]: tmp-crun.Khoxjs.mount: Deactivated successfully. Feb 2 08:18:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:18:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:18:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:18:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:18:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:18:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:18:36 np0005604725 podman[145109]: 2026-02-02 08:18:36.349438134 +0000 UTC m=+0.094707542 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=healthy, description=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-container-container, version=17.1.13, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-container, container_name=swift_container_replicator, config_id=tripleo_step4, vcs-type=git, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, name=rhosp-rhel9/openstack-swift-container, release=1766032510, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:57Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1) Feb 2 08:18:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:18:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:18:36 np0005604725 systemd[1]: Stopping User Manager for UID 0... Feb 2 08:18:36 np0005604725 systemd[143861]: Activating special unit Exit the Session... Feb 2 08:18:36 np0005604725 systemd[143861]: Stopped target Main User Target. Feb 2 08:18:36 np0005604725 systemd[143861]: Stopped target Basic System. Feb 2 08:18:36 np0005604725 systemd[143861]: Stopped target Paths. Feb 2 08:18:36 np0005604725 systemd[143861]: Stopped target Sockets. Feb 2 08:18:36 np0005604725 systemd[143861]: Stopped target Timers. Feb 2 08:18:36 np0005604725 systemd[143861]: Stopped Daily Cleanup of User's Temporary Directories. Feb 2 08:18:36 np0005604725 systemd[143861]: Closed D-Bus User Message Bus Socket. Feb 2 08:18:36 np0005604725 systemd[143861]: Stopped Create User's Volatile Files and Directories. Feb 2 08:18:36 np0005604725 systemd[143861]: Removed slice User Application Slice. Feb 2 08:18:36 np0005604725 systemd[143861]: Reached target Shutdown. Feb 2 08:18:36 np0005604725 systemd[143861]: Finished Exit the Session. Feb 2 08:18:36 np0005604725 systemd[143861]: Reached target Exit the Session. Feb 2 08:18:36 np0005604725 systemd[1]: user@0.service: Deactivated successfully. Feb 2 08:18:36 np0005604725 systemd[1]: Stopped User Manager for UID 0. Feb 2 08:18:36 np0005604725 systemd[1]: Stopping User Runtime Directory /run/user/0... Feb 2 08:18:36 np0005604725 systemd[1]: run-user-0.mount: Deactivated successfully. Feb 2 08:18:36 np0005604725 systemd[1]: user-runtime-dir@0.service: Deactivated successfully. Feb 2 08:18:36 np0005604725 systemd[1]: Stopped User Runtime Directory /run/user/0. Feb 2 08:18:36 np0005604725 podman[145122]: 2026-02-02 08:18:36.413990198 +0000 UTC m=+0.145546164 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, release=1766032510, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, com.redhat.component=openstack-swift-account-container, build-date=2026-01-12T22:50:44Z, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, vcs-type=git, config_id=tripleo_step4, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., version=17.1.13, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, container_name=swift_account_server, name=rhosp-rhel9/openstack-swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:44Z, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, io.buildah.version=1.41.5, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 swift-account) Feb 2 08:18:36 np0005604725 systemd[1]: Removed slice User Slice of UID 0. Feb 2 08:18:36 np0005604725 podman[145108]: 2026-02-02 08:18:36.428329908 +0000 UTC m=+0.170061717 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=healthy, build-date=2026-01-12T22:50:57Z, description=Red Hat OpenStack Platform 17.1 swift-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_container_server, distribution-scope=public, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 swift-container, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, name=rhosp-rhel9/openstack-swift-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, vcs-type=git, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:50:57Z, tcib_managed=true, com.redhat.component=openstack-swift-container-container, io.openshift.expose-services=) Feb 2 08:18:36 np0005604725 podman[145111]: 2026-02-02 08:18:36.516550369 +0000 UTC m=+0.249835759 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:32:22Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, architecture=x86_64, config_id=tripleo_step4, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, tcib_managed=true, name=rhosp-rhel9/openstack-nova-novncproxy, release=1766032510, container_name=nova_vnc_proxy, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, distribution-scope=public, version=17.1.13, com.redhat.component=openstack-nova-novncproxy-container, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, batch=17.1_20260112.1, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy) Feb 2 08:18:36 np0005604725 podman[145175]: 2026-02-02 08:18:36.489992493 +0000 UTC m=+0.118576225 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, managed_by=tripleo_ansible, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, com.redhat.component=openstack-ovn-northd-container, config_id=ovn_cluster_northd, summary=Red Hat OpenStack Platform 17.1 ovn-northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:06Z, release=1766032510, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 ovn-northd, vendor=Red Hat, Inc., batch=17.1_20260112.1, container_name=ovn_cluster_northd, version=17.1.13, architecture=x86_64, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, build-date=2026-01-12T22:34:06Z, maintainer=OpenStack TripleO Team, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, name=rhosp-rhel9/openstack-ovn-northd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, io.openshift.expose-services=) Feb 2 08:18:36 np0005604725 podman[145175]: 2026-02-02 08:18:36.57058213 +0000 UTC m=+0.199165852 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, vcs-type=git, io.buildah.version=1.41.5, config_id=ovn_cluster_northd, build-date=2026-01-12T22:34:06Z, version=17.1.13, url=https://www.redhat.com, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-ovn-northd-container, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 ovn-northd, org.opencontainers.image.created=2026-01-12T22:34:06Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, release=1766032510, vendor=Red Hat, Inc., tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 ovn-northd, managed_by=tripleo_ansible, io.openshift.expose-services=, name=rhosp-rhel9/openstack-ovn-northd, batch=17.1_20260112.1, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, container_name=ovn_cluster_northd, architecture=x86_64, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:18:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:18:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:18:36 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:18:36 np0005604725 podman[145108]: 2026-02-02 08:18:36.612881859 +0000 UTC m=+0.354613668 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, org.opencontainers.image.created=2026-01-12T22:50:57Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, version=17.1.13, architecture=x86_64, container_name=swift_container_server, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-swift-container, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 swift-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, release=1766032510, distribution-scope=public, managed_by=tripleo_ansible, com.redhat.component=openstack-swift-container-container, build-date=2026-01-12T22:50:57Z, description=Red Hat OpenStack Platform 17.1 swift-container, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container) Feb 2 08:18:36 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Deactivated successfully. Feb 2 08:18:36 np0005604725 podman[145110]: 2026-02-02 08:18:36.637110003 +0000 UTC m=+0.372389954 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=healthy, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:50:44Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, architecture=x86_64, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, version=17.1.13, config_id=tripleo_step4, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_account_replicator, com.redhat.component=openstack-swift-account-container, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, build-date=2026-01-12T22:50:44Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true, release=1766032510, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, name=rhosp-rhel9/openstack-swift-account, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 swift-account, description=Red Hat OpenStack Platform 17.1 swift-account) Feb 2 08:18:36 np0005604725 podman[145109]: 2026-02-02 08:18:36.638387403 +0000 UTC m=+0.383656851 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, container_name=swift_container_replicator, version=17.1.13, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:57Z, summary=Red Hat OpenStack Platform 17.1 swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, config_id=tripleo_step4, build-date=2026-01-12T22:50:57Z, distribution-scope=public, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-swift-container-container, name=rhosp-rhel9/openstack-swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, url=https://www.redhat.com, vendor=Red Hat, Inc., io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container) Feb 2 08:18:36 np0005604725 podman[145172]: 2026-02-02 08:18:36.663847135 +0000 UTC m=+0.282464351 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=healthy, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, container_name=ovn_controller, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, build-date=2026-01-12T22:36:40Z, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, release=1766032510, architecture=x86_64, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-ovn-controller, org.opencontainers.image.created=2026-01-12T22:36:40Z, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, config_id=tripleo_step4, managed_by=tripleo_ansible, com.redhat.component=openstack-ovn-controller-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, version=17.1.13, vendor=Red Hat, Inc., vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 ovn-controller) Feb 2 08:18:36 np0005604725 podman[145172]: 2026-02-02 08:18:36.68580522 +0000 UTC m=+0.304422436 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, batch=17.1_20260112.1, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, maintainer=OpenStack TripleO Team, architecture=x86_64, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, summary=Red Hat OpenStack Platform 17.1 ovn-controller, config_id=tripleo_step4, build-date=2026-01-12T22:36:40Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 ovn-controller, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, version=17.1.13, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, com.redhat.component=openstack-ovn-controller-container, container_name=ovn_controller, vcs-type=git, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-ovn-controller, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:36:40Z) Feb 2 08:18:36 np0005604725 podman[145110]: 2026-02-02 08:18:36.713718778 +0000 UTC m=+0.448998729 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true, build-date=2026-01-12T22:50:44Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, org.opencontainers.image.created=2026-01-12T22:50:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.component=openstack-swift-account-container, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, architecture=x86_64, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 swift-account, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_account_replicator, config_id=tripleo_step4, version=17.1.13, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.openshift.expose-services=) Feb 2 08:18:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:18:36 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:18:36 np0005604725 podman[145283]: 2026-02-02 08:18:36.732287528 +0000 UTC m=+0.130764959 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=healthy, distribution-scope=public, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=placement_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.component=openstack-placement-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, batch=17.1_20260112.1, io.openshift.expose-services=, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:34:35Z, vcs-type=git, version=17.1.13, architecture=x86_64, release=1766032510, build-date=2026-01-12T22:34:35Z, description=Red Hat OpenStack Platform 17.1 placement-api, name=rhosp-rhel9/openstack-placement-api, tcib_managed=true, config_id=tripleo_step4, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:18:36 np0005604725 podman[145121]: 2026-02-02 08:18:36.490586401 +0000 UTC m=+0.223146169 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=healthy, tcib_managed=true, architecture=x86_64, maintainer=OpenStack TripleO Team, version=17.1.13, url=https://www.redhat.com, container_name=swift_object_replicator, batch=17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, release=1766032510, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, com.redhat.component=openstack-swift-object-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, vcs-type=git, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-object, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:50:56Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, vendor=Red Hat, Inc.) Feb 2 08:18:36 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Deactivated successfully. Feb 2 08:18:36 np0005604725 podman[145283]: 2026-02-02 08:18:36.814547956 +0000 UTC m=+0.213025377 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-placement-api-container, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.5, release=1766032510, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, url=https://www.redhat.com, name=rhosp-rhel9/openstack-placement-api, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=placement_api, summary=Red Hat OpenStack Platform 17.1 placement-api, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., managed_by=tripleo_ansible, tcib_managed=true, build-date=2026-01-12T22:34:35Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:35Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, version=17.1.13, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:18:36 np0005604725 podman[145349]: 2026-02-02 08:18:36.818365193 +0000 UTC m=+0.083419374 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=healthy, managed_by=tripleo_ansible, version=17.1.13, distribution-scope=public, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, description=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, vendor=Red Hat, Inc., container_name=swift_object_server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, com.redhat.component=openstack-swift-object-container, io.openshift.expose-services=, tcib_managed=true, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:56Z, architecture=x86_64, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-swift-object, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:18:36 np0005604725 podman[145121]: 2026-02-02 08:18:36.830970661 +0000 UTC m=+0.563530429 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, config_id=tripleo_step4, batch=17.1_20260112.1, url=https://www.redhat.com, managed_by=tripleo_ansible, com.redhat.component=openstack-swift-object-container, summary=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.created=2026-01-12T22:50:56Z, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=swift_object_replicator, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-swift-object, build-date=2026-01-12T22:50:56Z, tcib_managed=true) Feb 2 08:18:36 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Deactivated successfully. Feb 2 08:18:36 np0005604725 podman[145122]: 2026-02-02 08:18:36.841259507 +0000 UTC m=+0.572815453 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-swift-account, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:50:44Z, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:44Z, summary=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, vcs-type=git, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-account-container, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, vendor=Red Hat, Inc., batch=17.1_20260112.1, architecture=x86_64, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, container_name=swift_account_server, config_id=tripleo_step4, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 swift-account, version=17.1.13) Feb 2 08:18:36 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Deactivated successfully. Feb 2 08:18:36 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:18:36 np0005604725 podman[145111]: 2026-02-02 08:18:36.886941401 +0000 UTC m=+0.620226871 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, name=rhosp-rhel9/openstack-nova-novncproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-nova-novncproxy-container, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, url=https://www.redhat.com, distribution-scope=public, io.buildah.version=1.41.5, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., build-date=2026-01-12T23:32:22Z, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, container_name=nova_vnc_proxy, vcs-type=git, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, maintainer=OpenStack TripleO Team, tcib_managed=true, version=17.1.13, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, managed_by=tripleo_ansible, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:32:22Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:18:36 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Deactivated successfully. Feb 2 08:18:36 np0005604725 podman[145282]: 2026-02-02 08:18:36.818471127 +0000 UTC m=+0.220185507 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, maintainer=OpenStack TripleO Team, config_id=tripleo_step1, com.redhat.component=openstack-memcached-container, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vendor=Red Hat, Inc., distribution-scope=public, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, batch=17.1_20260112.1, io.buildah.version=1.41.5, architecture=x86_64, vcs-type=git, build-date=2026-01-12T22:12:26Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 memcached, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=memcached, release=1766032510, name=rhosp-rhel9/openstack-memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=) Feb 2 08:18:36 np0005604725 podman[145282]: 2026-02-02 08:18:36.951881687 +0000 UTC m=+0.353596037 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, architecture=x86_64, distribution-scope=public, maintainer=OpenStack TripleO Team, config_id=tripleo_step1, vcs-type=git, release=1766032510, name=rhosp-rhel9/openstack-memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=memcached, url=https://www.redhat.com, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:12:26Z, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, description=Red Hat OpenStack Platform 17.1 memcached, summary=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, build-date=2026-01-12T22:12:26Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:18:36 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Deactivated successfully. Feb 2 08:18:36 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:18:36 np0005604725 podman[145349]: 2026-02-02 08:18:36.977868685 +0000 UTC m=+0.242922896 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, distribution-scope=public, name=rhosp-rhel9/openstack-swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_object_server, description=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.buildah.version=1.41.5, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-swift-object-container, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, org.opencontainers.image.created=2026-01-12T22:50:56Z, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., config_id=tripleo_step4, version=17.1.13, batch=17.1_20260112.1, vcs-type=git, release=1766032510, summary=Red Hat OpenStack Platform 17.1 swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:18:36 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Deactivated successfully. Feb 2 08:18:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:18:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:18:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:18:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:18:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:18:38 np0005604725 podman[145475]: 2026-02-02 08:18:38.356809588 +0000 UTC m=+0.086802478 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=healthy, description=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, build-date=2026-01-12T22:34:42Z, config_id=tripleo_step4, io.openshift.expose-services=, vendor=Red Hat, Inc., tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, version=17.1.13, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, container_name=glance_api_internal, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z) Feb 2 08:18:38 np0005604725 systemd[1]: tmp-crun.KHjlHF.mount: Deactivated successfully. Feb 2 08:18:38 np0005604725 systemd[1]: tmp-crun.jiBqfk.mount: Deactivated successfully. Feb 2 08:18:38 np0005604725 podman[145477]: 2026-02-02 08:18:38.335524425 +0000 UTC m=+0.066624319 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=healthy, description=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, batch=17.1_20260112.1, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, org.opencontainers.image.created=2026-01-12T22:34:42Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:42Z, config_id=tripleo_step4, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, distribution-scope=public, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, io.openshift.expose-services=, container_name=glance_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13) Feb 2 08:18:38 np0005604725 podman[145478]: 2026-02-02 08:18:38.401616905 +0000 UTC m=+0.130965164 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=healthy, url=https://www.redhat.com, release=1766032510, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_rsync, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, architecture=x86_64, batch=17.1_20260112.1, io.openshift.expose-services=, name=rhosp-rhel9/openstack-swift-object, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-object-container, description=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:50:56Z, vcs-type=git, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, io.buildah.version=1.41.5, build-date=2026-01-12T22:50:56Z, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:18:38 np0005604725 podman[145476]: 2026-02-02 08:18:38.430561375 +0000 UTC m=+0.161522294 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, vcs-type=git, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:10:14Z, build-date=2026-01-12T22:10:14Z, com.redhat.component=openstack-qdrouterd-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=metrics_qdr, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, url=https://www.redhat.com, config_id=tripleo_step1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.13, release=1766032510, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:18:38 np0005604725 podman[145474]: 2026-02-02 08:18:38.453725917 +0000 UTC m=+0.188214274 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=healthy, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, build-date=2026-01-12T22:34:42Z, config_id=tripleo_step4, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:34:42Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, com.redhat.component=openstack-glance-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, version=17.1.13, container_name=glance_api_cron, architecture=x86_64, name=rhosp-rhel9/openstack-glance-api, vcs-type=git, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:18:38 np0005604725 podman[145477]: 2026-02-02 08:18:38.534936763 +0000 UTC m=+0.266036667 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, description=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:34:42Z, name=rhosp-rhel9/openstack-glance-api, container_name=glance_api, summary=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, url=https://www.redhat.com, vcs-type=git, config_id=tripleo_step4, managed_by=tripleo_ansible, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:34:42Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team) Feb 2 08:18:38 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Deactivated successfully. Feb 2 08:18:38 np0005604725 podman[145474]: 2026-02-02 08:18:38.585338831 +0000 UTC m=+0.319827148 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, distribution-scope=public, com.redhat.component=openstack-glance-api-container, summary=Red Hat OpenStack Platform 17.1 glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:34:42Z, name=rhosp-rhel9/openstack-glance-api, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=glance_api_cron, build-date=2026-01-12T22:34:42Z, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, io.openshift.expose-services=, vcs-ref=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, io.buildah.version=1.41.5, batch=17.1_20260112.1) Feb 2 08:18:38 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:18:38 np0005604725 podman[145475]: 2026-02-02 08:18:38.60093826 +0000 UTC m=+0.330931160 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, build-date=2026-01-12T22:34:42Z, config_id=tripleo_step4, com.redhat.component=openstack-glance-api-container, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, container_name=glance_api_internal, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-glance-api, batch=17.1_20260112.1, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:18:38 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Deactivated successfully. Feb 2 08:18:38 np0005604725 podman[145476]: 2026-02-02 08:18:38.617372205 +0000 UTC m=+0.348333124 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, release=1766032510, maintainer=OpenStack TripleO Team, config_id=tripleo_step1, org.opencontainers.image.created=2026-01-12T22:10:14Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:14Z, com.redhat.component=openstack-qdrouterd-container, summary=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-qdrouterd, tcib_managed=true) Feb 2 08:18:38 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:18:38 np0005604725 podman[145478]: 2026-02-02 08:18:38.848032494 +0000 UTC m=+0.577380793 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_rsync, batch=17.1_20260112.1, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, release=1766032510, distribution-scope=public, version=17.1.13, vcs-type=git, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-object-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:50:56Z, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-swift-object, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:50:56Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:18:38 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:18:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:18:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:18:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:18:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:18:42 np0005604725 podman[145728]: 2026-02-02 08:18:42.356112424 +0000 UTC m=+0.095535897 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-nova-api, architecture=x86_64, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.created=2026-01-12T23:31:50Z, vendor=Red Hat, Inc., container_name=nova_api_cron, io.buildah.version=1.41.5, release=1766032510, summary=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, description=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, vcs-type=git, managed_by=tripleo_ansible, build-date=2026-01-12T23:31:50Z, tcib_managed=true, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-nova-api-container, batch=17.1_20260112.1, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:18:42 np0005604725 podman[145728]: 2026-02-02 08:18:42.367896626 +0000 UTC m=+0.107320049 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, vendor=Red Hat, Inc., build-date=2026-01-12T23:31:50Z, name=rhosp-rhel9/openstack-nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.buildah.version=1.41.5, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, container_name=nova_api_cron, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.created=2026-01-12T23:31:50Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-nova-api-container, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, tcib_managed=true) Feb 2 08:18:42 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:18:42 np0005604725 podman[145730]: 2026-02-02 08:18:42.415082606 +0000 UTC m=+0.148162694 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=healthy, release=1766032510, description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-nova-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-nova-api, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T23:31:50Z, vcs-type=git, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.buildah.version=1.41.5, distribution-scope=public, vendor=Red Hat, Inc., container_name=nova_api, summary=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, io.openshift.expose-services=, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T23:31:50Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:18:42 np0005604725 podman[145729]: 2026-02-02 08:18:42.458742408 +0000 UTC m=+0.195126757 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, batch=17.1_20260112.1, distribution-scope=public, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, managed_by=tripleo_ansible, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_step4, name=rhosp-rhel9/openstack-nova-api, version=17.1.13, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, com.redhat.component=openstack-nova-api-container, container_name=nova_metadata, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., build-date=2026-01-12T23:31:50Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:18:42 np0005604725 podman[145730]: 2026-02-02 08:18:42.511955043 +0000 UTC m=+0.245035161 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, io.openshift.expose-services=, tcib_managed=true, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, managed_by=tripleo_ansible, container_name=nova_api, description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, version=17.1.13, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, com.redhat.component=openstack-nova-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.buildah.version=1.41.5, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-nova-api, build-date=2026-01-12T23:31:50Z, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:18:42 np0005604725 systemd[1]: tmp-crun.z45o1N.mount: Deactivated successfully. Feb 2 08:18:42 np0005604725 podman[145735]: 2026-02-02 08:18:42.522541628 +0000 UTC m=+0.248416054 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=healthy, name=rhosp-rhel9/openstack-swift-proxy-server, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=swift_proxy, architecture=x86_64, build-date=2026-01-12T22:50:51Z, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.created=2026-01-12T22:50:51Z, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, com.redhat.component=openstack-swift-proxy-server-container, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, vcs-type=git, maintainer=OpenStack TripleO Team, version=17.1.13, release=1766032510) Feb 2 08:18:42 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:18:42 np0005604725 podman[145729]: 2026-02-02 08:18:42.542835532 +0000 UTC m=+0.279219911 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, com.redhat.component=openstack-nova-api-container, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.buildah.version=1.41.5, build-date=2026-01-12T23:31:50Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T23:31:50Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, container_name=nova_metadata, version=17.1.13, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-nova-api, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:18:42 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:18:42 np0005604725 podman[145735]: 2026-02-02 08:18:42.746549602 +0000 UTC m=+0.472424018 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, architecture=x86_64, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, distribution-scope=public, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, config_id=tripleo_step4, build-date=2026-01-12T22:50:51Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=swift_proxy, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, io.openshift.expose-services=, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:51Z, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1766032510, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:18:42 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Deactivated successfully. Feb 2 08:18:49 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:18:49 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:18:49 np0005604725 podman[146255]: 2026-02-02 08:18:49.35353848 +0000 UTC m=+0.090519053 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, config_id=tripleo_step3, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, io.buildah.version=1.41.5, container_name=collectd, summary=Red Hat OpenStack Platform 17.1 collectd, build-date=2026-01-12T22:10:15Z, architecture=x86_64, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:15Z, vcs-type=git, tcib_managed=true, name=rhosp-rhel9/openstack-collectd, url=https://www.redhat.com, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, batch=17.1_20260112.1, managed_by=tripleo_ansible, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, io.openshift.expose-services=, com.redhat.component=openstack-collectd-container, description=Red Hat OpenStack Platform 17.1 collectd, maintainer=OpenStack TripleO Team) Feb 2 08:18:49 np0005604725 podman[146255]: 2026-02-02 08:18:49.362037061 +0000 UTC m=+0.099017604 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, tcib_managed=true, build-date=2026-01-12T22:10:15Z, name=rhosp-rhel9/openstack-collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, summary=Red Hat OpenStack Platform 17.1 collectd, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step3, container_name=collectd, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, vendor=Red Hat, Inc., distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.created=2026-01-12T22:10:15Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, vcs-type=git, com.redhat.component=openstack-collectd-container, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, release=1766032510) Feb 2 08:18:49 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:18:49 np0005604725 podman[146256]: 2026-02-02 08:18:49.407352344 +0000 UTC m=+0.143770129 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, build-date=2026-01-12T22:34:41Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, batch=17.1_20260112.1, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-horizon-container, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:34:41Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, release=1766032510, tcib_managed=true, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, container_name=horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, io.buildah.version=1.41.5, config_id=tripleo_step3, vcs-type=git, maintainer=OpenStack TripleO Team, version=17.1.13) Feb 2 08:18:49 np0005604725 podman[146256]: 2026-02-02 08:18:49.438898973 +0000 UTC m=+0.175316788 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, managed_by=tripleo_ansible, release=1766032510, architecture=x86_64, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, version=17.1.13, name=rhosp-rhel9/openstack-horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:34:41Z, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, io.buildah.version=1.41.5, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vcs-type=git, container_name=horizon, batch=17.1_20260112.1, config_id=tripleo_step3, build-date=2026-01-12T22:34:41Z, com.redhat.component=openstack-horizon-container, description=Red Hat OpenStack Platform 17.1 horizon) Feb 2 08:18:49 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:18:52 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:18:52 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:18:52 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:18:52 np0005604725 podman[146430]: 2026-02-02 08:18:52.352897058 +0000 UTC m=+0.090985427 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, batch=17.1_20260112.1, config_id=tripleo_step3, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:33:53Z, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.component=openstack-keystone-container, io.openshift.expose-services=, release=1766032510, container_name=keystone, distribution-scope=public, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, io.buildah.version=1.41.5, version=17.1.13, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, build-date=2026-01-12T22:33:53Z, summary=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, vcs-type=git, name=rhosp-rhel9/openstack-keystone) Feb 2 08:18:52 np0005604725 systemd[1]: tmp-crun.KHduOm.mount: Deactivated successfully. Feb 2 08:18:52 np0005604725 podman[146431]: 2026-02-02 08:18:52.368626241 +0000 UTC m=+0.103264934 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, container_name=keystone_cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:33:53Z, summary=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, vcs-type=git, version=17.1.13, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, batch=17.1_20260112.1, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, managed_by=tripleo_ansible, release=1766032510, com.redhat.component=openstack-keystone-container, config_id=tripleo_step3, name=rhosp-rhel9/openstack-keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.buildah.version=1.41.5) Feb 2 08:18:52 np0005604725 podman[146432]: 2026-02-02 08:18:52.406484725 +0000 UTC m=+0.137342621 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, vcs-type=git, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, build-date=2026-01-12T22:34:43Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 iscsid, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, tcib_managed=true, version=17.1.13, vendor=Red Hat, Inc., distribution-scope=public, name=rhosp-rhel9/openstack-iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 iscsid, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:34:43Z, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, release=1766032510, managed_by=tripleo_ansible, com.redhat.component=openstack-iscsid-container, container_name=iscsid, config_id=tripleo_step3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:18:52 np0005604725 podman[146432]: 2026-02-02 08:18:52.419910787 +0000 UTC m=+0.150768713 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, description=Red Hat OpenStack Platform 17.1 iscsid, release=1766032510, url=https://www.redhat.com, vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-iscsid-container, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:34:43Z, config_id=tripleo_step3, name=rhosp-rhel9/openstack-iscsid, build-date=2026-01-12T22:34:43Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 iscsid, container_name=iscsid, vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, io.buildah.version=1.41.5, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, vendor=Red Hat, Inc.) Feb 2 08:18:52 np0005604725 podman[146431]: 2026-02-02 08:18:52.429962946 +0000 UTC m=+0.164601609 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, release=1766032510, vcs-type=git, description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, com.redhat.component=openstack-keystone-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 keystone, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.buildah.version=1.41.5, distribution-scope=public, build-date=2026-01-12T22:33:53Z, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.openshift.expose-services=, config_id=tripleo_step3, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, container_name=keystone_cron, architecture=x86_64, batch=17.1_20260112.1, url=https://www.redhat.com, name=rhosp-rhel9/openstack-keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:18:52 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:18:52 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:18:52 np0005604725 podman[146430]: 2026-02-02 08:18:52.497862702 +0000 UTC m=+0.235951031 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, name=rhosp-rhel9/openstack-keystone, com.redhat.component=openstack-keystone-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, distribution-scope=public, io.openshift.expose-services=, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step3, vendor=Red Hat, Inc., container_name=keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, build-date=2026-01-12T22:33:53Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, managed_by=tripleo_ansible, architecture=x86_64, release=1766032510, summary=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com) Feb 2 08:18:52 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:18:56 np0005604725 pacemaker-controld[51065]: notice: Requesting local execution of probe operation for openstack-manila-share-podman-0 on np0005604725 Feb 2 08:18:56 np0005604725 pacemaker-controld[51065]: notice: Result of probe operation for openstack-manila-share-podman-0 on np0005604725: not running Feb 2 08:18:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:18:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:18:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:18:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:18:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:18:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:18:59 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:18:59 np0005604725 podman[146879]: 2026-02-02 08:18:59.394155849 +0000 UTC m=+0.109605219 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, tcib_managed=true, vendor=Red Hat, Inc., version=17.1.13, name=rhosp-rhel9/openstack-mariadb, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, container_name=clustercheck, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, build-date=2026-01-12T22:10:18Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:18Z, release=1766032510, com.redhat.component=openstack-mariadb-container, batch=17.1_20260112.1, config_id=tripleo_step2, summary=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, distribution-scope=public, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5) Feb 2 08:18:59 np0005604725 podman[146865]: 2026-02-02 08:18:59.411568884 +0000 UTC m=+0.148238956 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=healthy, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-type=git, build-date=2026-01-12T23:07:24Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, io.openshift.expose-services=, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, container_name=ceilometer_agent_central, version=17.1.13, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, com.redhat.component=openstack-ceilometer-central-container, release=1766032510, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, managed_by=tripleo_ansible, config_id=tripleo_step4, name=rhosp-rhel9/openstack-ceilometer-central, distribution-scope=public, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T23:07:24Z, description=Red Hat OpenStack Platform 17.1 ceilometer-central, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central) Feb 2 08:18:59 np0005604725 podman[146873]: 2026-02-02 08:18:59.471873138 +0000 UTC m=+0.198972046 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=healthy, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, build-date=2026-01-12T22:53:38Z, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:53:38Z, com.redhat.component=openstack-heat-engine-container, distribution-scope=public, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, description=Red Hat OpenStack Platform 17.1 heat-engine, version=17.1.13, architecture=x86_64, container_name=heat_engine, tcib_managed=true, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-heat-engine, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 heat-engine, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, maintainer=OpenStack TripleO Team, release=1766032510, vcs-ref=755001522886c265e88561b4997cab642504a845) Feb 2 08:18:59 np0005604725 podman[146890]: 2026-02-02 08:18:59.481644137 +0000 UTC m=+0.194827677 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, maintainer=OpenStack TripleO Team, vcs-type=git, managed_by=tripleo_ansible, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:58:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, io.openshift.expose-services=, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-cinder-api-container, container_name=cinder_api_cron, config_id=tripleo_step4, build-date=2026-01-12T22:58:44Z, vendor=Red Hat, Inc., org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, tcib_managed=true, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, architecture=x86_64) Feb 2 08:18:59 np0005604725 podman[146866]: 2026-02-02 08:18:59.482946518 +0000 UTC m=+0.217342220 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, batch=17.1_20260112.1, version=17.1.13, release=1766032510, io.openshift.expose-services=, tcib_managed=true, container_name=heat_api_cron, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:53:19Z, name=rhosp-rhel9/openstack-heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, com.redhat.component=openstack-heat-api-container, summary=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, distribution-scope=public, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=755001522886c265e88561b4997cab642504a845, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:18:59 np0005604725 podman[146866]: 2026-02-02 08:18:59.486681352 +0000 UTC m=+0.221077074 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=755001522886c265e88561b4997cab642504a845, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:53:19Z, name=rhosp-rhel9/openstack-heat-api, tcib_managed=true, distribution-scope=public, vendor=Red Hat, Inc., build-date=2026-01-12T22:53:19Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, container_name=heat_api_cron, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-heat-api-container, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, release=1766032510, vcs-type=git, io.openshift.expose-services=) Feb 2 08:18:59 np0005604725 podman[146892]: 2026-02-02 08:18:59.495524804 +0000 UTC m=+0.201281086 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, url=https://www.redhat.com, build-date=2026-01-12T23:07:25Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, name=rhosp-rhel9/openstack-ceilometer-notification, config_id=tripleo_step4, architecture=x86_64, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, version=17.1.13, com.redhat.component=openstack-ceilometer-notification-container, batch=17.1_20260112.1, managed_by=tripleo_ansible, tcib_managed=true, release=1766032510, container_name=ceilometer_agent_notification, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, distribution-scope=public, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T23:07:25Z, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 ceilometer-notification) Feb 2 08:18:59 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:18:59 np0005604725 podman[146865]: 2026-02-02 08:18:59.514696773 +0000 UTC m=+0.251366875 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, config_id=tripleo_step4, architecture=x86_64, name=rhosp-rhel9/openstack-ceilometer-central, io.buildah.version=1.41.5, managed_by=tripleo_ansible, vcs-type=git, distribution-scope=public, org.opencontainers.image.created=2026-01-12T23:07:24Z, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, container_name=ceilometer_agent_central, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, description=Red Hat OpenStack Platform 17.1 ceilometer-central, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, release=1766032510, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, com.redhat.component=openstack-ceilometer-central-container, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, build-date=2026-01-12T23:07:24Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.expose-services=) Feb 2 08:18:59 np0005604725 podman[146873]: 2026-02-02 08:18:59.526802395 +0000 UTC m=+0.253901323 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, batch=17.1_20260112.1, config_id=tripleo_step4, managed_by=tripleo_ansible, container_name=heat_engine, vcs-ref=755001522886c265e88561b4997cab642504a845, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, distribution-scope=public, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 heat-engine, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, build-date=2026-01-12T22:53:38Z, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:53:38Z, name=rhosp-rhel9/openstack-heat-engine, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, description=Red Hat OpenStack Platform 17.1 heat-engine, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.expose-services=, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vendor=Red Hat, Inc., com.redhat.component=openstack-heat-engine-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git) Feb 2 08:18:59 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:18:59 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:18:59 np0005604725 podman[146890]: 2026-02-02 08:18:59.566082632 +0000 UTC m=+0.279266172 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cinder-api, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vcs-type=git, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 cinder-api, container_name=cinder_api_cron, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:58:44Z, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:58:44Z, release=1766032510, managed_by=tripleo_ansible, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, tcib_managed=true, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.openshift.expose-services=, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, com.redhat.component=openstack-cinder-api-container) Feb 2 08:18:59 np0005604725 podman[146867]: 2026-02-02 08:18:59.572153178 +0000 UTC m=+0.300018270 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, url=https://www.redhat.com, architecture=x86_64, io.buildah.version=1.41.5, release=1766032510, distribution-scope=public, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:58:47Z, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, name=rhosp-rhel9/openstack-cinder-scheduler, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, vcs-type=git, container_name=cinder_scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.component=openstack-cinder-scheduler-container, tcib_managed=true, build-date=2026-01-12T22:58:47Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:18:59 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:18:59 np0005604725 podman[146892]: 2026-02-02 08:18:59.585738016 +0000 UTC m=+0.291494268 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, build-date=2026-01-12T23:07:25Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, org.opencontainers.image.created=2026-01-12T23:07:25Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, io.openshift.expose-services=, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, io.buildah.version=1.41.5, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-ceilometer-notification, container_name=ceilometer_agent_notification, architecture=x86_64, managed_by=tripleo_ansible, release=1766032510, vcs-type=git, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, tcib_managed=true, com.redhat.component=openstack-ceilometer-notification-container) Feb 2 08:18:59 np0005604725 podman[146879]: 2026-02-02 08:18:59.59889024 +0000 UTC m=+0.314339590 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:18Z, io.buildah.version=1.41.5, com.redhat.component=openstack-mariadb-container, tcib_managed=true, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, release=1766032510, container_name=clustercheck, description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, config_id=tripleo_step2, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1) Feb 2 08:18:59 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:18:59 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:18:59 np0005604725 podman[146867]: 2026-02-02 08:18:59.623441115 +0000 UTC m=+0.351306207 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, build-date=2026-01-12T22:58:47Z, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, url=https://www.redhat.com, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, io.buildah.version=1.41.5, release=1766032510, batch=17.1_20260112.1, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, vcs-type=git, vendor=Red Hat, Inc., architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:58:47Z, tcib_managed=true, name=rhosp-rhel9/openstack-cinder-scheduler, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, config_id=tripleo_step4, container_name=cinder_scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-cinder-scheduler-container, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team) Feb 2 08:18:59 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:19:02 np0005604725 podman[147199]: 2026-02-02 08:19:02.745474672 +0000 UTC m=+0.078279446 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:18Z, name=rhosp-rhel9/openstack-mariadb, distribution-scope=public, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:18Z, com.redhat.component=openstack-mariadb-container, tcib_managed=true, vcs-type=git, release=1766032510, architecture=x86_64) Feb 2 08:19:02 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:19:02 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:19:02 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:19:02 np0005604725 podman[147199]: 2026-02-02 08:19:02.774769023 +0000 UTC m=+0.107573797 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, name=rhosp-rhel9/openstack-mariadb, batch=17.1_20260112.1, vcs-type=git, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:18Z, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, release=1766032510, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:19:02 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:19:02 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:19:02 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:19:02 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:19:02 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:19:02 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:19:02 np0005604725 podman[147245]: 2026-02-02 08:19:02.883749462 +0000 UTC m=+0.100694795 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, version=17.1.13, build-date=2026-01-12T22:52:22Z, io.openshift.expose-services=, name=rhosp-rhel9/openstack-manila-api, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, summary=Red Hat OpenStack Platform 17.1 manila-api, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-manila-api-container, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:52:22Z, container_name=manila_api_cron, distribution-scope=public, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.41.5, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, release=1766032510, vcs-type=git, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:19:02 np0005604725 podman[147232]: 2026-02-02 08:19:02.864371097 +0000 UTC m=+0.085797398 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=healthy, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, org.opencontainers.image.created=2026-01-12T23:32:18Z, distribution-scope=public, name=rhosp-rhel9/openstack-nova-conductor, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 nova-conductor, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, architecture=x86_64, release=1766032510, description=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=nova_conductor, build-date=2026-01-12T23:32:18Z, tcib_managed=true, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, com.redhat.component=openstack-nova-conductor-container) Feb 2 08:19:02 np0005604725 podman[147352]: 2026-02-02 08:19:02.936313167 +0000 UTC m=+0.065520964 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, org.opencontainers.image.created=2026-01-12T22:54:02Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, build-date=2026-01-12T22:54:02Z, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-heat-api-cfn, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=heat_api_cfn, release=1766032510, url=https://www.redhat.com, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, architecture=x86_64, maintainer=OpenStack TripleO Team, tcib_managed=true, config_id=tripleo_step4, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-heat-api-cfn-container, version=17.1.13) Feb 2 08:19:02 np0005604725 podman[147232]: 2026-02-02 08:19:02.997812327 +0000 UTC m=+0.219238648 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, managed_by=tripleo_ansible, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, io.openshift.expose-services=, name=rhosp-rhel9/openstack-nova-conductor, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, vendor=Red Hat, Inc., container_name=nova_conductor, release=1766032510, com.redhat.component=openstack-nova-conductor-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, build-date=2026-01-12T23:32:18Z, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 nova-conductor, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T23:32:18Z, description=Red Hat OpenStack Platform 17.1 nova-conductor) Feb 2 08:19:03 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:19:03 np0005604725 podman[147245]: 2026-02-02 08:19:03.017152751 +0000 UTC m=+0.234098074 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, description=Red Hat OpenStack Platform 17.1 manila-api, build-date=2026-01-12T22:52:22Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, org.opencontainers.image.created=2026-01-12T22:52:22Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-manila-api, batch=17.1_20260112.1, managed_by=tripleo_ansible, url=https://www.redhat.com, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, io.openshift.expose-services=, vcs-type=git, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, container_name=manila_api_cron, com.redhat.component=openstack-manila-api-container, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, tcib_managed=true) Feb 2 08:19:03 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:19:03 np0005604725 podman[147249]: 2026-02-02 08:19:03.028268803 +0000 UTC m=+0.236947242 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, description=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, release=1766032510, distribution-scope=public, name=rhosp-rhel9/openstack-neutron-server, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_step4, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:57:35Z, build-date=2026-01-12T22:57:35Z, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, container_name=neutron_api, url=https://www.redhat.com, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, vcs-type=git) Feb 2 08:19:03 np0005604725 podman[147224]: 2026-02-02 08:19:02.903244641 +0000 UTC m=+0.131667687 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:58:44Z, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, version=17.1.13, config_id=tripleo_step4, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vcs-type=git, url=https://www.redhat.com, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, container_name=cinder_api, maintainer=OpenStack TripleO Team, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, architecture=x86_64, build-date=2026-01-12T22:58:44Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-cinder-api, release=1766032510, io.openshift.expose-services=) Feb 2 08:19:03 np0005604725 podman[147352]: 2026-02-02 08:19:03.069207671 +0000 UTC m=+0.198415498 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=755001522886c265e88561b4997cab642504a845, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, maintainer=OpenStack TripleO Team, tcib_managed=true, container_name=heat_api_cfn, com.redhat.component=openstack-heat-api-cfn-container, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, distribution-scope=public, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, name=rhosp-rhel9/openstack-heat-api-cfn, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T22:54:02Z, batch=17.1_20260112.1, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, build-date=2026-01-12T22:54:02Z, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible) Feb 2 08:19:03 np0005604725 podman[147260]: 2026-02-02 08:19:03.068888561 +0000 UTC m=+0.277068535 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=healthy, build-date=2026-01-12T22:52:54Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, name=rhosp-rhel9/openstack-manila-scheduler, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, release=1766032510, container_name=manila_scheduler, io.buildah.version=1.41.5, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:52:54Z, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, config_id=tripleo_step4, io.openshift.expose-services=, architecture=x86_64, url=https://www.redhat.com, vcs-type=git, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, version=17.1.13, description=Red Hat OpenStack Platform 17.1 manila-scheduler, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-manila-scheduler-container, vendor=Red Hat, Inc.) Feb 2 08:19:03 np0005604725 podman[147224]: 2026-02-02 08:19:03.090225706 +0000 UTC m=+0.318648762 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:58:44Z, url=https://www.redhat.com, container_name=cinder_api, distribution-scope=public, version=17.1.13, com.redhat.component=openstack-cinder-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, vendor=Red Hat, Inc., vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-api, maintainer=OpenStack TripleO Team, release=1766032510, architecture=x86_64, build-date=2026-01-12T22:58:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.expose-services=) Feb 2 08:19:03 np0005604725 podman[147276]: 2026-02-02 08:19:03.103943838 +0000 UTC m=+0.303308771 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, architecture=x86_64, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-cron, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, version=17.1.13, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, summary=Red Hat OpenStack Platform 17.1 cron, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 cron, org.opencontainers.image.created=2026-01-12T22:10:15Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, distribution-scope=public, com.redhat.component=openstack-cron-container, container_name=logrotate_crond, io.buildah.version=1.41.5, build-date=2026-01-12T22:10:15Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, io.openshift.expose-services=, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:19:03 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:19:03 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:19:03 np0005604725 podman[147241]: 2026-02-02 08:19:03.153004516 +0000 UTC m=+0.356849297 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, url=https://www.redhat.com, vcs-ref=755001522886c265e88561b4997cab642504a845, vendor=Red Hat, Inc., container_name=heat_api, com.redhat.component=openstack-heat-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.created=2026-01-12T22:53:19Z, description=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, name=rhosp-rhel9/openstack-heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, config_id=tripleo_step4, io.buildah.version=1.41.5, vcs-type=git, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, architecture=x86_64, version=17.1.13, managed_by=tripleo_ansible) Feb 2 08:19:03 np0005604725 podman[147276]: 2026-02-02 08:19:03.171671279 +0000 UTC m=+0.371036212 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, io.openshift.expose-services=, managed_by=tripleo_ansible, vcs-type=git, build-date=2026-01-12T22:10:15Z, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, io.buildah.version=1.41.5, version=17.1.13, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:15Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-cron, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 cron, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 cron, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, container_name=logrotate_crond, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, architecture=x86_64, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, com.redhat.component=openstack-cron-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:19:03 np0005604725 podman[147284]: 2026-02-02 08:19:03.128364669 +0000 UTC m=+0.323669028 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=healthy, batch=17.1_20260112.1, container_name=nova_scheduler, org.opencontainers.image.created=2026-01-12T23:32:05Z, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, io.openshift.expose-services=, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, architecture=x86_64, name=rhosp-rhel9/openstack-nova-scheduler, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-scheduler-container, maintainer=OpenStack TripleO Team, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 nova-scheduler, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, build-date=2026-01-12T23:32:05Z) Feb 2 08:19:03 np0005604725 podman[147429]: 2026-02-02 08:19:03.181292495 +0000 UTC m=+0.129940254 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, batch=17.1_20260112.1, version=17.1.13, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, description=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, vcs-type=git, name=rhosp-rhel9/openstack-redis, org.opencontainers.image.created=2026-01-12T22:10:16Z, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, build-date=2026-01-12T22:10:16Z, release=1766032510, io.buildah.version=1.41.5) Feb 2 08:19:03 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:19:03 np0005604725 podman[147249]: 2026-02-02 08:19:03.207346746 +0000 UTC m=+0.416025195 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, url=https://www.redhat.com, name=rhosp-rhel9/openstack-neutron-server, vcs-type=git, architecture=x86_64, distribution-scope=public, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:57:35Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:57:35Z, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_step4, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, release=1766032510, io.openshift.expose-services=, com.redhat.component=openstack-neutron-server-container, container_name=neutron_api, description=Red Hat OpenStack Platform 17.1 neutron-server, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 neutron-server) Feb 2 08:19:03 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:19:03 np0005604725 podman[147284]: 2026-02-02 08:19:03.264352197 +0000 UTC m=+0.459656546 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 nova-scheduler, tcib_managed=true, vcs-type=git, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, container_name=nova_scheduler, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, name=rhosp-rhel9/openstack-nova-scheduler, com.redhat.component=openstack-nova-scheduler-container, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T23:32:05Z, distribution-scope=public, io.buildah.version=1.41.5, build-date=2026-01-12T23:32:05Z, batch=17.1_20260112.1, version=17.1.13) Feb 2 08:19:03 np0005604725 podman[147493]: 2026-02-02 08:19:03.265986508 +0000 UTC m=+0.076085079 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, architecture=x86_64, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, version=17.1.13, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, build-date=2026-01-12T22:10:16Z, io.openshift.expose-services=, tcib_managed=true, vendor=Red Hat, Inc., vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:16Z, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, com.redhat.component=openstack-redis-container, summary=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team) Feb 2 08:19:03 np0005604725 podman[147503]: 2026-02-02 08:19:03.274596792 +0000 UTC m=+0.075910013 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, build-date=2026-01-12T22:10:12Z, vendor=Red Hat, Inc., tcib_managed=true, vcs-type=git, distribution-scope=public, io.openshift.expose-services=, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 haproxy, architecture=x86_64, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:12Z, summary=Red Hat OpenStack Platform 17.1 haproxy, version=17.1.13, com.redhat.component=openstack-haproxy-container, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, name=rhosp-rhel9/openstack-haproxy, maintainer=OpenStack TripleO Team) Feb 2 08:19:03 np0005604725 podman[147260]: 2026-02-02 08:19:03.275023615 +0000 UTC m=+0.483203599 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, version=17.1.13, description=Red Hat OpenStack Platform 17.1 manila-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-manila-scheduler-container, org.opencontainers.image.created=2026-01-12T22:52:54Z, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, name=rhosp-rhel9/openstack-manila-scheduler, config_id=tripleo_step4, io.buildah.version=1.41.5, url=https://www.redhat.com, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, tcib_managed=true, batch=17.1_20260112.1, build-date=2026-01-12T22:52:54Z, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, vendor=Red Hat, Inc., container_name=manila_scheduler, vcs-type=git, release=1766032510, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb) Feb 2 08:19:03 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:19:03 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:19:03 np0005604725 podman[147595]: 2026-02-02 08:19:03.358636985 +0000 UTC m=+0.077187903 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, url=https://www.redhat.com, tcib_managed=true, com.redhat.component=openstack-haproxy-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, org.opencontainers.image.created=2026-01-12T22:10:12Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-haproxy, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, batch=17.1_20260112.1, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 haproxy, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:12Z, summary=Red Hat OpenStack Platform 17.1 haproxy, vendor=Red Hat, Inc., version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, architecture=x86_64) Feb 2 08:19:03 np0005604725 podman[147503]: 2026-02-02 08:19:03.361663958 +0000 UTC m=+0.162977189 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, summary=Red Hat OpenStack Platform 17.1 haproxy, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.buildah.version=1.41.5, build-date=2026-01-12T22:10:12Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, architecture=x86_64, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, release=1766032510, vcs-type=git, name=rhosp-rhel9/openstack-haproxy, com.redhat.component=openstack-haproxy-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, description=Red Hat OpenStack Platform 17.1 haproxy) Feb 2 08:19:03 np0005604725 podman[147429]: 2026-02-02 08:19:03.369771917 +0000 UTC m=+0.318419656 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, description=Red Hat OpenStack Platform 17.1 redis, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-redis, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:16Z, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, release=1766032510, com.redhat.component=openstack-redis-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:16Z, version=17.1.13) Feb 2 08:19:03 np0005604725 podman[147241]: 2026-02-02 08:19:03.376546905 +0000 UTC m=+0.580391696 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, build-date=2026-01-12T22:53:19Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, io.buildah.version=1.41.5, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, description=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp-rhel9/openstack-heat-api, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, vcs-type=git, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, architecture=x86_64, io.openshift.expose-services=, container_name=heat_api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.created=2026-01-12T22:53:19Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, config_id=tripleo_step4, release=1766032510, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-heat-api-container) Feb 2 08:19:03 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:19:03 np0005604725 podman[147627]: 2026-02-02 08:19:03.65105684 +0000 UTC m=+0.068842676 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, org.opencontainers.image.created=2026-01-12T22:10:14Z, release=1766032510, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-rabbitmq, vcs-type=git, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq) Feb 2 08:19:03 np0005604725 podman[147627]: 2026-02-02 08:19:03.68910916 +0000 UTC m=+0.106894996 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20260112.1, distribution-scope=public, build-date=2026-01-12T22:10:14Z, version=17.1.13, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., architecture=x86_64, name=rhosp-rhel9/openstack-rabbitmq, com.redhat.component=openstack-rabbitmq-container) Feb 2 08:19:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:19:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:19:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:19:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:19:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:19:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:19:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:19:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:19:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:19:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:19:07 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:19:07 np0005604725 systemd[1]: tmp-crun.0ANEej.mount: Deactivated successfully. Feb 2 08:19:07 np0005604725 podman[147875]: 2026-02-02 08:19:07.390574483 +0000 UTC m=+0.084323822 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, container_name=ovn_cluster_northd, summary=Red Hat OpenStack Platform 17.1 ovn-northd, build-date=2026-01-12T22:34:06Z, url=https://www.redhat.com, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, description=Red Hat OpenStack Platform 17.1 ovn-northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-ovn-northd, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=ovn_cluster_northd, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, architecture=x86_64, com.redhat.component=openstack-ovn-northd-container, org.opencontainers.image.created=2026-01-12T22:34:06Z, tcib_managed=true, managed_by=tripleo_ansible, io.buildah.version=1.41.5, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, batch=17.1_20260112.1, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, vendor=Red Hat, Inc., release=1766032510, vcs-type=git, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}) Feb 2 08:19:07 np0005604725 podman[147838]: 2026-02-02 08:19:07.455718296 +0000 UTC m=+0.186153542 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, config_id=tripleo_step1, name=rhosp-rhel9/openstack-memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:12:26Z, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vcs-type=git, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, tcib_managed=true, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, url=https://www.redhat.com, vendor=Red Hat, Inc., com.redhat.component=openstack-memcached-container, build-date=2026-01-12T22:12:26Z, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, managed_by=tripleo_ansible, release=1766032510) Feb 2 08:19:07 np0005604725 podman[147876]: 2026-02-02 08:19:07.47896732 +0000 UTC m=+0.164592599 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=healthy, distribution-scope=public, release=1766032510, config_id=tripleo_step4, name=rhosp-rhel9/openstack-placement-api, io.buildah.version=1.41.5, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, architecture=x86_64, com.redhat.component=openstack-placement-api-container, tcib_managed=true, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, managed_by=tripleo_ansible, url=https://www.redhat.com, container_name=placement_api, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, build-date=2026-01-12T22:34:35Z, org.opencontainers.image.created=2026-01-12T22:34:35Z, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13) Feb 2 08:19:07 np0005604725 podman[147875]: 2026-02-02 08:19:07.479376552 +0000 UTC m=+0.173125911 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, maintainer=OpenStack TripleO Team, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 ovn-northd, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-ovn-northd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, managed_by=tripleo_ansible, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:34:06Z, version=17.1.13, description=Red Hat OpenStack Platform 17.1 ovn-northd, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, container_name=ovn_cluster_northd, architecture=x86_64, com.redhat.component=openstack-ovn-northd-container, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_id=ovn_cluster_northd, build-date=2026-01-12T22:34:06Z, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, distribution-scope=public) Feb 2 08:19:07 np0005604725 podman[147839]: 2026-02-02 08:19:07.4366479 +0000 UTC m=+0.162561197 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=healthy, architecture=x86_64, version=17.1.13, distribution-scope=public, batch=17.1_20260112.1, build-date=2026-01-12T22:50:57Z, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, com.redhat.component=openstack-swift-container-container, container_name=swift_container_server, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, config_id=tripleo_step4, release=1766032510, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 swift-container, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:57Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:19:07 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:19:07 np0005604725 podman[147872]: 2026-02-02 08:19:07.413579261 +0000 UTC m=+0.100135778 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=healthy, description=Red Hat OpenStack Platform 17.1 swift-account, release=1766032510, container_name=swift_account_server, config_id=tripleo_step4, name=rhosp-rhel9/openstack-swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, vendor=Red Hat, Inc., version=17.1.13, org.opencontainers.image.created=2026-01-12T22:50:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, architecture=x86_64, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, vcs-type=git, com.redhat.component=openstack-swift-account-container, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, tcib_managed=true, build-date=2026-01-12T22:50:44Z) Feb 2 08:19:07 np0005604725 podman[147838]: 2026-02-02 08:19:07.543839203 +0000 UTC m=+0.274274449 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, com.redhat.component=openstack-memcached-container, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:12:26Z, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, build-date=2026-01-12T22:12:26Z, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, distribution-scope=public, name=rhosp-rhel9/openstack-memcached, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, config_id=tripleo_step1, container_name=memcached, tcib_managed=true, url=https://www.redhat.com, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 memcached) Feb 2 08:19:07 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:19:07 np0005604725 podman[147840]: 2026-02-02 08:19:07.55319472 +0000 UTC m=+0.269057609 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=healthy, vcs-type=git, vendor=Red Hat, Inc., build-date=2026-01-12T22:50:57Z, description=Red Hat OpenStack Platform 17.1 swift-container, architecture=x86_64, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, name=rhosp-rhel9/openstack-swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, config_id=tripleo_step4, distribution-scope=public, version=17.1.13, managed_by=tripleo_ansible, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_container_replicator, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-swift-container-container, tcib_managed=true, io.buildah.version=1.41.5, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:57Z, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:19:07 np0005604725 podman[147858]: 2026-02-02 08:19:07.578681934 +0000 UTC m=+0.280701447 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=healthy, version=17.1.13, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-novncproxy-container, container_name=nova_vnc_proxy, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:32:22Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, release=1766032510, name=rhosp-rhel9/openstack-nova-novncproxy, distribution-scope=public, batch=17.1_20260112.1, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T23:32:22Z, architecture=x86_64, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true) Feb 2 08:19:07 np0005604725 podman[147866]: 2026-02-02 08:19:07.587574278 +0000 UTC m=+0.286618000 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64, config_id=tripleo_step4, io.buildah.version=1.41.5, version=17.1.13, description=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, tcib_managed=true, com.redhat.component=openstack-swift-object-container, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, container_name=swift_object_replicator, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, name=rhosp-rhel9/openstack-swift-object, build-date=2026-01-12T22:50:56Z) Feb 2 08:19:07 np0005604725 podman[147837]: 2026-02-02 08:19:07.490541565 +0000 UTC m=+0.221191048 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=healthy, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=ovn_controller, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:36:40Z, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, description=Red Hat OpenStack Platform 17.1 ovn-controller, vendor=Red Hat, Inc., url=https://www.redhat.com, com.redhat.component=openstack-ovn-controller-container, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 ovn-controller, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, version=17.1.13, vcs-type=git, distribution-scope=public, name=rhosp-rhel9/openstack-ovn-controller, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, maintainer=OpenStack TripleO Team, tcib_managed=true, build-date=2026-01-12T22:36:40Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, managed_by=tripleo_ansible, release=1766032510, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_id=tripleo_step4, batch=17.1_20260112.1, io.buildah.version=1.41.5) Feb 2 08:19:07 np0005604725 podman[147872]: 2026-02-02 08:19:07.597307586 +0000 UTC m=+0.283864113 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:50:44Z, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 swift-account, batch=17.1_20260112.1, io.openshift.expose-services=, com.redhat.component=openstack-swift-account-container, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, vcs-type=git, managed_by=tripleo_ansible, version=17.1.13, container_name=swift_account_server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, build-date=2026-01-12T22:50:44Z) Feb 2 08:19:07 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Deactivated successfully. Feb 2 08:19:07 np0005604725 podman[147839]: 2026-02-02 08:19:07.642932618 +0000 UTC m=+0.368845925 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-container, config_id=tripleo_step4, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:50:57Z, io.openshift.expose-services=, tcib_managed=true, com.redhat.component=openstack-swift-container-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-container, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, container_name=swift_container_server, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, release=1766032510, architecture=x86_64) Feb 2 08:19:07 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Deactivated successfully. Feb 2 08:19:07 np0005604725 podman[147840]: 2026-02-02 08:19:07.681141592 +0000 UTC m=+0.397004521 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, managed_by=tripleo_ansible, url=https://www.redhat.com, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-type=git, build-date=2026-01-12T22:50:57Z, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, tcib_managed=true, container_name=swift_container_replicator, org.opencontainers.image.created=2026-01-12T22:50:57Z, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.component=openstack-swift-container-container, maintainer=OpenStack TripleO Team, distribution-scope=public, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:19:07 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Deactivated successfully. Feb 2 08:19:07 np0005604725 podman[147866]: 2026-02-02 08:19:07.697874947 +0000 UTC m=+0.396918679 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, com.redhat.component=openstack-swift-object-container, maintainer=OpenStack TripleO Team, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-object, managed_by=tripleo_ansible, tcib_managed=true, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:56Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, summary=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_object_replicator, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, version=17.1.13, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:50:56Z, url=https://www.redhat.com, config_id=tripleo_step4, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:19:07 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Deactivated successfully. Feb 2 08:19:07 np0005604725 podman[147837]: 2026-02-02 08:19:07.727013172 +0000 UTC m=+0.457662645 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, summary=Red Hat OpenStack Platform 17.1 ovn-controller, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., tcib_managed=true, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, com.redhat.component=openstack-ovn-controller-container, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, batch=17.1_20260112.1, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, config_id=tripleo_step4, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:36:40Z, name=rhosp-rhel9/openstack-ovn-controller, build-date=2026-01-12T22:36:40Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, container_name=ovn_controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, distribution-scope=public, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c) Feb 2 08:19:07 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Deactivated successfully. Feb 2 08:19:07 np0005604725 podman[147851]: 2026-02-02 08:19:07.648007674 +0000 UTC m=+0.362633474 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=healthy, batch=17.1_20260112.1, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, url=https://www.redhat.com, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=swift_account_replicator, build-date=2026-01-12T22:50:44Z, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-type=git, description=Red Hat OpenStack Platform 17.1 swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.component=openstack-swift-account-container, managed_by=tripleo_ansible, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:44Z, tcib_managed=true, name=rhosp-rhel9/openstack-swift-account, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, version=17.1.13) Feb 2 08:19:07 np0005604725 podman[147876]: 2026-02-02 08:19:07.766110483 +0000 UTC m=+0.451735772 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:34:35Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, release=1766032510, description=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.5, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:35Z, url=https://www.redhat.com, vcs-type=git, container_name=placement_api, distribution-scope=public, com.redhat.component=openstack-placement-api-container, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-placement-api, io.openshift.expose-services=, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 placement-api, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step4) Feb 2 08:19:07 np0005604725 podman[147851]: 2026-02-02 08:19:07.781099704 +0000 UTC m=+0.495725614 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, name=rhosp-rhel9/openstack-swift-account, url=https://www.redhat.com, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, managed_by=tripleo_ansible, build-date=2026-01-12T22:50:44Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_account_replicator, summary=Red Hat OpenStack Platform 17.1 swift-account, version=17.1.13, architecture=x86_64, maintainer=OpenStack TripleO Team, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, batch=17.1_20260112.1, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-swift-account-container, description=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z) Feb 2 08:19:07 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:19:07 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:19:07 np0005604725 podman[147857]: 2026-02-02 08:19:07.854318714 +0000 UTC m=+0.565582501 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=healthy, distribution-scope=public, build-date=2026-01-12T22:50:56Z, container_name=swift_object_server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, managed_by=tripleo_ansible, com.redhat.component=openstack-swift-object-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, version=17.1.13, architecture=x86_64, url=https://www.redhat.com, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:50:56Z, config_id=tripleo_step4) Feb 2 08:19:07 np0005604725 podman[147858]: 2026-02-02 08:19:07.948425425 +0000 UTC m=+0.650444978 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, config_id=tripleo_step4, version=17.1.13, tcib_managed=true, com.redhat.component=openstack-nova-novncproxy-container, container_name=nova_vnc_proxy, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, url=https://www.redhat.com, architecture=x86_64, io.buildah.version=1.41.5, vcs-type=git, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, distribution-scope=public, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, name=rhosp-rhel9/openstack-nova-novncproxy, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, release=1766032510, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:32:22Z, managed_by=tripleo_ansible, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:19:07 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Deactivated successfully. Feb 2 08:19:08 np0005604725 podman[147857]: 2026-02-02 08:19:08.102609193 +0000 UTC m=+0.813873070 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, config_id=tripleo_step4, managed_by=tripleo_ansible, build-date=2026-01-12T22:50:56Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, org.opencontainers.image.created=2026-01-12T22:50:56Z, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, vcs-type=git, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-object, tcib_managed=true, com.redhat.component=openstack-swift-object-container, container_name=swift_object_server, vendor=Red Hat, Inc., version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:19:08 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Deactivated successfully. Feb 2 08:19:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:19:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:19:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:19:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:19:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:19:09 np0005604725 podman[148206]: 2026-02-02 08:19:09.364900033 +0000 UTC m=+0.099843640 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=healthy, vendor=Red Hat, Inc., io.openshift.expose-services=, config_id=tripleo_step4, io.buildah.version=1.41.5, version=17.1.13, description=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, build-date=2026-01-12T22:34:42Z, tcib_managed=true, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=glance_api_cron, managed_by=tripleo_ansible, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, architecture=x86_64, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp-rhel9/openstack-glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, com.redhat.component=openstack-glance-api-container) Feb 2 08:19:09 np0005604725 podman[148206]: 2026-02-02 08:19:09.37066968 +0000 UTC m=+0.105613267 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, com.redhat.component=openstack-glance-api-container, distribution-scope=public, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, container_name=glance_api_cron, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-glance-api, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., vcs-type=git, org.opencontainers.image.created=2026-01-12T22:34:42Z, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 glance-api, build-date=2026-01-12T22:34:42Z) Feb 2 08:19:09 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:19:09 np0005604725 podman[148207]: 2026-02-02 08:19:09.423126562 +0000 UTC m=+0.158573224 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:42Z, io.buildah.version=1.41.5, managed_by=tripleo_ansible, distribution-scope=public, config_id=tripleo_step4, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, build-date=2026-01-12T22:34:42Z, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, tcib_managed=true, name=rhosp-rhel9/openstack-glance-api, release=1766032510, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, summary=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., batch=17.1_20260112.1, container_name=glance_api_internal) Feb 2 08:19:09 np0005604725 systemd[1]: tmp-crun.r1zQIk.mount: Deactivated successfully. Feb 2 08:19:09 np0005604725 podman[148219]: 2026-02-02 08:19:09.471048075 +0000 UTC m=+0.192043123 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=healthy, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, com.redhat.component=openstack-glance-api-container, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:34:42Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, container_name=glance_api, release=1766032510, vcs-type=git, build-date=2026-01-12T22:34:42Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-glance-api, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible) Feb 2 08:19:09 np0005604725 podman[148208]: 2026-02-02 08:19:09.515901563 +0000 UTC m=+0.241455270 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., managed_by=tripleo_ansible, build-date=2026-01-12T22:10:14Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, container_name=metrics_qdr) Feb 2 08:19:09 np0005604725 podman[148225]: 2026-02-02 08:19:09.55907939 +0000 UTC m=+0.267767999 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=healthy, com.redhat.component=openstack-swift-object-container, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, container_name=swift_rsync, distribution-scope=public, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, tcib_managed=true, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:50:56Z, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:50:56Z, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, config_id=tripleo_step4, vendor=Red Hat, Inc., architecture=x86_64) Feb 2 08:19:09 np0005604725 podman[148207]: 2026-02-02 08:19:09.628051449 +0000 UTC m=+0.363498101 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, maintainer=OpenStack TripleO Team, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=glance_api_internal, summary=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, tcib_managed=true, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, build-date=2026-01-12T22:34:42Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:34:42Z, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, vendor=Red Hat, Inc., vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-glance-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-glance-api) Feb 2 08:19:09 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Deactivated successfully. Feb 2 08:19:09 np0005604725 podman[148219]: 2026-02-02 08:19:09.674987332 +0000 UTC m=+0.395982310 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, container_name=glance_api, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, io.openshift.expose-services=, io.buildah.version=1.41.5, release=1766032510, batch=17.1_20260112.1, com.redhat.component=openstack-glance-api-container, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, vendor=Red Hat, Inc., vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:34:42Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:42Z, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-glance-api, config_id=tripleo_step4) Feb 2 08:19:09 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Deactivated successfully. Feb 2 08:19:09 np0005604725 podman[148208]: 2026-02-02 08:19:09.690768896 +0000 UTC m=+0.416322583 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, summary=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, org.opencontainers.image.created=2026-01-12T22:10:14Z, description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., com.redhat.component=openstack-qdrouterd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=metrics_qdr, build-date=2026-01-12T22:10:14Z, vcs-type=git, tcib_managed=true, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, release=1766032510, managed_by=tripleo_ansible, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, distribution-scope=public, config_id=tripleo_step1) Feb 2 08:19:09 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:19:09 np0005604725 podman[148225]: 2026-02-02 08:19:09.938967994 +0000 UTC m=+0.647656643 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_rsync, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:50:56Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, vendor=Red Hat, Inc., batch=17.1_20260112.1, managed_by=tripleo_ansible, release=1766032510, version=17.1.13, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, vcs-type=git, build-date=2026-01-12T22:50:56Z, description=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, com.redhat.component=openstack-swift-object-container, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:19:09 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:19:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:19:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:19:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:19:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:19:13 np0005604725 podman[148432]: 2026-02-02 08:19:13.335805855 +0000 UTC m=+0.078378869 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, architecture=x86_64, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:31:50Z, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.buildah.version=1.41.5, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, batch=17.1_20260112.1, container_name=nova_api, tcib_managed=true, vcs-type=git, release=1766032510, name=rhosp-rhel9/openstack-nova-api, com.redhat.component=openstack-nova-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible) Feb 2 08:19:13 np0005604725 podman[148430]: 2026-02-02 08:19:13.39976924 +0000 UTC m=+0.147814223 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=healthy, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, io.openshift.expose-services=, container_name=nova_api_cron, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, name=rhosp-rhel9/openstack-nova-api, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.13, com.redhat.component=openstack-nova-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, tcib_managed=true, url=https://www.redhat.com, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:31:50Z, release=1766032510, architecture=x86_64, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:19:13 np0005604725 podman[148432]: 2026-02-02 08:19:13.432018311 +0000 UTC m=+0.174591295 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, container_name=nova_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, com.redhat.component=openstack-nova-api-container, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, release=1766032510, description=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, vcs-type=git, maintainer=OpenStack TripleO Team, build-date=2026-01-12T23:31:50Z, managed_by=tripleo_ansible, distribution-scope=public, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-nova-api, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}) Feb 2 08:19:13 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:19:13 np0005604725 podman[148431]: 2026-02-02 08:19:13.442934647 +0000 UTC m=+0.186986747 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=healthy, architecture=x86_64, com.redhat.component=openstack-nova-api-container, container_name=nova_metadata, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, build-date=2026-01-12T23:31:50Z, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, batch=17.1_20260112.1, io.buildah.version=1.41.5, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, summary=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, tcib_managed=true, managed_by=tripleo_ansible, distribution-scope=public, vcs-type=git, maintainer=OpenStack TripleO Team) Feb 2 08:19:13 np0005604725 podman[148437]: 2026-02-02 08:19:13.368678945 +0000 UTC m=+0.105221554 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=healthy, batch=17.1_20260112.1, distribution-scope=public, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, architecture=x86_64, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, container_name=swift_proxy, version=17.1.13, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:51Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:50:51Z, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-swift-proxy-server-container) Feb 2 08:19:13 np0005604725 podman[148430]: 2026-02-02 08:19:13.48568654 +0000 UTC m=+0.233731513 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T23:31:50Z, build-date=2026-01-12T23:31:50Z, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.13, maintainer=OpenStack TripleO Team, container_name=nova_api_cron, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_step4, io.buildah.version=1.41.5, release=1766032510, vcs-type=git, com.redhat.component=openstack-nova-api-container, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, name=rhosp-rhel9/openstack-nova-api, io.openshift.expose-services=, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1) Feb 2 08:19:13 np0005604725 podman[148431]: 2026-02-02 08:19:13.495620746 +0000 UTC m=+0.239672866 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, container_name=nova_metadata, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, distribution-scope=public, vcs-type=git, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-nova-api, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-nova-api-container, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T23:31:50Z, summary=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T23:31:50Z, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, config_id=tripleo_step4, vendor=Red Hat, Inc., release=1766032510, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api) Feb 2 08:19:13 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:19:13 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:19:13 np0005604725 podman[148437]: 2026-02-02 08:19:13.585799587 +0000 UTC m=+0.322342176 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.13, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, vcs-type=git, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-proxy-server-container, vendor=Red Hat, Inc., tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, build-date=2026-01-12T22:50:51Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-swift-proxy-server, release=1766032510, batch=17.1_20260112.1, container_name=swift_proxy, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:50:51Z) Feb 2 08:19:13 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Deactivated successfully. Feb 2 08:19:20 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:19:20 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:19:20 np0005604725 podman[149013]: 2026-02-02 08:19:20.319152158 +0000 UTC m=+0.064546925 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, vcs-ref=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:41Z, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, version=17.1.13, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, io.openshift.expose-services=, batch=17.1_20260112.1, managed_by=tripleo_ansible, tcib_managed=true, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 horizon, container_name=horizon, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-horizon-container) Feb 2 08:19:20 np0005604725 podman[149012]: 2026-02-02 08:19:20.381367272 +0000 UTC m=+0.126438429 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, description=Red Hat OpenStack Platform 17.1 collectd, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-collectd-container, batch=17.1_20260112.1, build-date=2026-01-12T22:10:15Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, summary=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, vendor=Red Hat, Inc., architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-collectd, io.buildah.version=1.41.5, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:15Z, container_name=collectd, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd) Feb 2 08:19:20 np0005604725 podman[149012]: 2026-02-02 08:19:20.394805764 +0000 UTC m=+0.139876931 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.created=2026-01-12T22:10:15Z, maintainer=OpenStack TripleO Team, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 collectd, batch=17.1_20260112.1, version=17.1.13, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, build-date=2026-01-12T22:10:15Z, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., config_id=tripleo_step3, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 collectd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-collectd-container, container_name=collectd, distribution-scope=public, release=1766032510, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, architecture=x86_64) Feb 2 08:19:20 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:19:20 np0005604725 podman[149013]: 2026-02-02 08:19:20.44704329 +0000 UTC m=+0.192438057 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, build-date=2026-01-12T22:34:41Z, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, vendor=Red Hat, Inc., version=17.1.13, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, release=1766032510, batch=17.1_20260112.1, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 horizon, container_name=horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-horizon, config_id=tripleo_step3, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-horizon-container, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, maintainer=OpenStack TripleO Team, vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible) Feb 2 08:19:20 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:19:23 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:19:23 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:19:23 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:19:23 np0005604725 systemd[1]: tmp-crun.njTzKu.mount: Deactivated successfully. Feb 2 08:19:23 np0005604725 podman[149135]: 2026-02-02 08:19:23.36868044 +0000 UTC m=+0.098455718 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, release=1766032510, name=rhosp-rhel9/openstack-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, batch=17.1_20260112.1, config_id=tripleo_step3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, version=17.1.13, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=iscsid, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, tcib_managed=true, io.openshift.expose-services=, build-date=2026-01-12T22:34:43Z, url=https://www.redhat.com, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:34:43Z, description=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.component=openstack-iscsid-container, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, vendor=Red Hat, Inc., io.buildah.version=1.41.5) Feb 2 08:19:23 np0005604725 podman[149132]: 2026-02-02 08:19:23.433402669 +0000 UTC m=+0.173293428 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, version=17.1.13, architecture=x86_64, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 keystone, build-date=2026-01-12T22:33:53Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, managed_by=tripleo_ansible, release=1766032510, description=Red Hat OpenStack Platform 17.1 keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-keystone, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:33:53Z, url=https://www.redhat.com, container_name=keystone, vcs-type=git, vendor=Red Hat, Inc., com.redhat.component=openstack-keystone-container, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, maintainer=OpenStack TripleO Team, config_id=tripleo_step3) Feb 2 08:19:23 np0005604725 podman[149133]: 2026-02-02 08:19:23.351619535 +0000 UTC m=+0.089174202 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, config_id=tripleo_step3, description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-keystone, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, distribution-scope=public, vendor=Red Hat, Inc., version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, container_name=keystone_cron, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20260112.1, release=1766032510, build-date=2026-01-12T22:33:53Z, summary=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.openshift.expose-services=, vcs-type=git) Feb 2 08:19:23 np0005604725 podman[149133]: 2026-02-02 08:19:23.487043908 +0000 UTC m=+0.224598575 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, build-date=2026-01-12T22:33:53Z, description=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step3, summary=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, release=1766032510, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.buildah.version=1.41.5, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone_cron, managed_by=tripleo_ansible, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, version=17.1.13, vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z) Feb 2 08:19:23 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:19:23 np0005604725 podman[149135]: 2026-02-02 08:19:23.50563839 +0000 UTC m=+0.235413718 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, name=rhosp-rhel9/openstack-iscsid, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 iscsid, distribution-scope=public, build-date=2026-01-12T22:34:43Z, vendor=Red Hat, Inc., url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:43Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, vcs-type=git, version=17.1.13, config_id=tripleo_step3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, container_name=iscsid, managed_by=tripleo_ansible, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, release=1766032510, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-iscsid-container) Feb 2 08:19:23 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:19:23 np0005604725 podman[149132]: 2026-02-02 08:19:23.536979673 +0000 UTC m=+0.276870422 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, release=1766032510, com.redhat.component=openstack-keystone-container, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, build-date=2026-01-12T22:33:53Z, vcs-type=git, name=rhosp-rhel9/openstack-keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, container_name=keystone, description=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, io.buildah.version=1.41.5, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:33:53Z, vendor=Red Hat, Inc., batch=17.1_20260112.1) Feb 2 08:19:23 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:19:26 np0005604725 podman[149421]: 2026-02-02 08:19:26.762324098 +0000 UTC m=+0.077039899 container exec c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, org.opencontainers.image.created=2026-01-12T22:58:35Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-cinder-volume-container, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, io.buildah.version=1.41.5, batch=17.1_20260112.1, release=1766032510, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, description=Red Hat OpenStack Platform 17.1 cinder-volume, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-cinder-volume, vendor=Red Hat, Inc., distribution-scope=public, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, build-date=2026-01-12T22:58:35Z, summary=Red Hat OpenStack Platform 17.1 cinder-volume, url=https://www.redhat.com, tcib_managed=true) Feb 2 08:19:26 np0005604725 podman[149421]: 2026-02-02 08:19:26.796097366 +0000 UTC m=+0.110813197 container exec_died c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, vcs-type=git, architecture=x86_64, version=17.1.13, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, build-date=2026-01-12T22:58:35Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-volume, io.buildah.version=1.41.5, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, org.opencontainers.image.created=2026-01-12T22:58:35Z, com.redhat.component=openstack-cinder-volume-container, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, summary=Red Hat OpenStack Platform 17.1 cinder-volume, description=Red Hat OpenStack Platform 17.1 cinder-volume, tcib_managed=true, vendor=Red Hat, Inc.) Feb 2 08:19:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:19:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:19:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:19:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:19:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:19:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:19:30 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:19:30 np0005604725 podman[149634]: 2026-02-02 08:19:30.365870199 +0000 UTC m=+0.102966667 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=healthy, tcib_managed=true, com.redhat.component=openstack-cinder-scheduler-container, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, url=https://www.redhat.com, managed_by=tripleo_ansible, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, container_name=cinder_scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-scheduler, architecture=x86_64, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:58:47Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.expose-services=, release=1766032510, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, vendor=Red Hat, Inc., org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, build-date=2026-01-12T22:58:47Z) Feb 2 08:19:30 np0005604725 systemd[1]: tmp-crun.Kf0AHk.mount: Deactivated successfully. Feb 2 08:19:30 np0005604725 podman[149635]: 2026-02-02 08:19:30.383989465 +0000 UTC m=+0.111059624 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=healthy, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-heat-engine-container, container_name=heat_engine, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, distribution-scope=public, release=1766032510, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:53:38Z, vcs-ref=755001522886c265e88561b4997cab642504a845, description=Red Hat OpenStack Platform 17.1 heat-engine, name=rhosp-rhel9/openstack-heat-engine, build-date=2026-01-12T22:53:38Z, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, version=17.1.13, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, vendor=Red Hat, Inc., batch=17.1_20260112.1, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, summary=Red Hat OpenStack Platform 17.1 heat-engine, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:19:30 np0005604725 podman[149634]: 2026-02-02 08:19:30.41408405 +0000 UTC m=+0.151180488 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, vendor=Red Hat, Inc., io.buildah.version=1.41.5, com.redhat.component=openstack-cinder-scheduler-container, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, architecture=x86_64, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=cinder_scheduler, release=1766032510, name=rhosp-rhel9/openstack-cinder-scheduler, version=17.1.13, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:58:47Z, managed_by=tripleo_ansible, batch=17.1_20260112.1, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, org.opencontainers.image.created=2026-01-12T22:58:47Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.openshift.expose-services=, config_id=tripleo_step4) Feb 2 08:19:30 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:19:30 np0005604725 podman[149653]: 2026-02-02 08:19:30.433701883 +0000 UTC m=+0.157148901 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, container_name=cinder_api_cron, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:58:44Z, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, io.buildah.version=1.41.5, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, release=1766032510, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, build-date=2026-01-12T22:58:44Z, batch=17.1_20260112.1) Feb 2 08:19:30 np0005604725 podman[149653]: 2026-02-02 08:19:30.440645436 +0000 UTC m=+0.164092464 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, vcs-type=git, managed_by=tripleo_ansible, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.expose-services=, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:58:44Z, version=17.1.13, com.redhat.component=openstack-cinder-api-container, container_name=cinder_api_cron, config_id=tripleo_step4, tcib_managed=true, release=1766032510, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-cinder-api, build-date=2026-01-12T22:58:44Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api) Feb 2 08:19:30 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:19:30 np0005604725 podman[149635]: 2026-02-02 08:19:30.460102155 +0000 UTC m=+0.187172314 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, url=https://www.redhat.com, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-heat-engine-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=heat_engine, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 heat-engine, release=1766032510, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:53:38Z, vendor=Red Hat, Inc., vcs-ref=755001522886c265e88561b4997cab642504a845, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-heat-engine, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, description=Red Hat OpenStack Platform 17.1 heat-engine, vcs-type=git, architecture=x86_64, config_id=tripleo_step4, version=17.1.13, tcib_managed=true, io.openshift.expose-services=, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:53:38Z) Feb 2 08:19:30 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:19:30 np0005604725 podman[149647]: 2026-02-02 08:19:30.478374477 +0000 UTC m=+0.210269215 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, tcib_managed=true, build-date=2026-01-12T22:10:18Z, managed_by=tripleo_ansible, com.redhat.component=openstack-mariadb-container, vendor=Red Hat, Inc., batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:18Z, maintainer=OpenStack TripleO Team, architecture=x86_64, version=17.1.13, container_name=clustercheck, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, url=https://www.redhat.com, config_id=tripleo_step2, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:19:30 np0005604725 podman[149632]: 2026-02-02 08:19:30.354017213 +0000 UTC m=+0.094619398 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=healthy, tcib_managed=true, url=https://www.redhat.com, vendor=Red Hat, Inc., batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T23:07:24Z, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T23:07:24Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, com.redhat.component=openstack-ceilometer-central-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, release=1766032510, description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, container_name=ceilometer_agent_central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, name=rhosp-rhel9/openstack-ceilometer-central, managed_by=tripleo_ansible) Feb 2 08:19:30 np0005604725 podman[149654]: 2026-02-02 08:19:30.517710956 +0000 UTC m=+0.243672201 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=healthy, url=https://www.redhat.com, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, architecture=x86_64, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, batch=17.1_20260112.1, version=17.1.13, build-date=2026-01-12T23:07:25Z, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, distribution-scope=public, name=rhosp-rhel9/openstack-ceilometer-notification, tcib_managed=true, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, vcs-type=git, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, org.opencontainers.image.created=2026-01-12T23:07:25Z, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, io.buildah.version=1.41.5, io.openshift.expose-services=, container_name=ceilometer_agent_notification, com.redhat.component=openstack-ceilometer-notification-container) Feb 2 08:19:30 np0005604725 podman[149647]: 2026-02-02 08:19:30.538932818 +0000 UTC m=+0.270827546 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:10:18Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, batch=17.1_20260112.1, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, version=17.1.13, build-date=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=clustercheck, config_id=tripleo_step2, io.openshift.expose-services=, architecture=x86_64, io.buildah.version=1.41.5, release=1766032510, com.redhat.component=openstack-mariadb-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-mariadb, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true) Feb 2 08:19:30 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:19:30 np0005604725 podman[149654]: 2026-02-02 08:19:30.551208656 +0000 UTC m=+0.277169891 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, org.opencontainers.image.created=2026-01-12T23:07:25Z, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-ceilometer-notification, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, distribution-scope=public, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, architecture=x86_64, build-date=2026-01-12T23:07:25Z, io.buildah.version=1.41.5, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, url=https://www.redhat.com, release=1766032510, container_name=ceilometer_agent_notification, maintainer=OpenStack TripleO Team, vcs-type=git, managed_by=tripleo_ansible, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-ceilometer-notification-container, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06) Feb 2 08:19:30 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:19:30 np0005604725 podman[149632]: 2026-02-02 08:19:30.589523184 +0000 UTC m=+0.330125399 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, maintainer=OpenStack TripleO Team, container_name=ceilometer_agent_central, tcib_managed=true, com.redhat.component=openstack-ceilometer-central-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 ceilometer-central, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, version=17.1.13, distribution-scope=public, build-date=2026-01-12T23:07:24Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, name=rhosp-rhel9/openstack-ceilometer-central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T23:07:24Z, vcs-type=git, url=https://www.redhat.com) Feb 2 08:19:30 np0005604725 podman[149633]: 2026-02-02 08:19:30.591328209 +0000 UTC m=+0.331850592 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, architecture=x86_64, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-heat-api, build-date=2026-01-12T22:53:19Z, container_name=heat_api_cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-heat-api-container, version=17.1.13, vcs-type=git, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, io.openshift.expose-services=, vcs-ref=755001522886c265e88561b4997cab642504a845, io.buildah.version=1.41.5, managed_by=tripleo_ansible, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:53:19Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}) Feb 2 08:19:30 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:19:30 np0005604725 podman[149633]: 2026-02-02 08:19:30.673838985 +0000 UTC m=+0.414361358 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, description=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.created=2026-01-12T22:53:19Z, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, managed_by=tripleo_ansible, container_name=heat_api_cron, vcs-ref=755001522886c265e88561b4997cab642504a845, name=rhosp-rhel9/openstack-heat-api, batch=17.1_20260112.1, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, config_id=tripleo_step4, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, com.redhat.component=openstack-heat-api-container, distribution-scope=public, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, build-date=2026-01-12T22:53:19Z, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:19:30 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:19:31 np0005604725 systemd[1]: tmp-crun.iI5T54.mount: Deactivated successfully. Feb 2 08:19:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:19:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:19:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:19:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:19:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:19:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:19:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:19:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:19:33 np0005604725 podman[149996]: 2026-02-02 08:19:33.347602044 +0000 UTC m=+0.095757164 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, batch=17.1_20260112.1, container_name=cinder_api, release=1766032510, name=rhosp-rhel9/openstack-cinder-api, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, vendor=Red Hat, Inc., build-date=2026-01-12T22:58:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, architecture=x86_64, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.13, com.redhat.component=openstack-cinder-api-container) Feb 2 08:19:33 np0005604725 podman[149997]: 2026-02-02 08:19:33.389546544 +0000 UTC m=+0.133824435 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, vcs-type=git, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, build-date=2026-01-12T23:32:18Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T23:32:18Z, url=https://www.redhat.com, release=1766032510, managed_by=tripleo_ansible, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, container_name=nova_conductor, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, com.redhat.component=openstack-nova-conductor-container, name=rhosp-rhel9/openstack-nova-conductor, summary=Red Hat OpenStack Platform 17.1 nova-conductor, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 nova-conductor, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:19:33 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:19:33 np0005604725 podman[150001]: 2026-02-02 08:19:33.329284142 +0000 UTC m=+0.070436687 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, managed_by=tripleo_ansible, batch=17.1_20260112.1, url=https://www.redhat.com, io.openshift.expose-services=, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:15Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, version=17.1.13, config_id=tripleo_step4, tcib_managed=true, com.redhat.component=openstack-cron-container, architecture=x86_64, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, description=Red Hat OpenStack Platform 17.1 cron, release=1766032510, container_name=logrotate_crond, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, name=rhosp-rhel9/openstack-cron, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, build-date=2026-01-12T22:10:15Z, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc.) Feb 2 08:19:33 np0005604725 podman[150016]: 2026-02-02 08:19:33.398444367 +0000 UTC m=+0.131404510 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, distribution-scope=public, name=rhosp-rhel9/openstack-heat-api-cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, container_name=heat_api_cfn, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-heat-api-cfn-container, tcib_managed=true, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, version=17.1.13, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, io.buildah.version=1.41.5, managed_by=tripleo_ansible, build-date=2026-01-12T22:54:02Z, vcs-ref=755001522886c265e88561b4997cab642504a845, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, org.opencontainers.image.created=2026-01-12T22:54:02Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, vendor=Red Hat, Inc., vcs-type=git) Feb 2 08:19:33 np0005604725 podman[150069]: 2026-02-02 08:19:33.454450929 +0000 UTC m=+0.111401976 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=healthy, tcib_managed=true, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, release=1766032510, io.openshift.expose-services=, batch=17.1_20260112.1, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, container_name=manila_scheduler, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-manila-scheduler, description=Red Hat OpenStack Platform 17.1 manila-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, com.redhat.component=openstack-manila-scheduler-container, maintainer=OpenStack TripleO Team, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, build-date=2026-01-12T22:52:54Z, org.opencontainers.image.created=2026-01-12T22:52:54Z) Feb 2 08:19:33 np0005604725 podman[149996]: 2026-02-02 08:19:33.477152536 +0000 UTC m=+0.225307656 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, org.opencontainers.image.created=2026-01-12T22:58:44Z, com.redhat.component=openstack-cinder-api-container, io.buildah.version=1.41.5, batch=17.1_20260112.1, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, url=https://www.redhat.com, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, build-date=2026-01-12T22:58:44Z, tcib_managed=true, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, container_name=cinder_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 cinder-api, architecture=x86_64, name=rhosp-rhel9/openstack-cinder-api, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, distribution-scope=public, vendor=Red Hat, Inc., release=1766032510) Feb 2 08:19:33 np0005604725 podman[150122]: 2026-02-02 08:19:33.484037859 +0000 UTC m=+0.057606163 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, tcib_managed=true, vcs-ref=755001522886c265e88561b4997cab642504a845, release=1766032510, batch=17.1_20260112.1, io.openshift.expose-services=, vendor=Red Hat, Inc., com.redhat.component=openstack-heat-api-container, description=Red Hat OpenStack Platform 17.1 heat-api, container_name=heat_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, summary=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:53:19Z, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-heat-api, distribution-scope=public, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, architecture=x86_64, maintainer=OpenStack TripleO Team, vcs-type=git, build-date=2026-01-12T22:53:19Z, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:19:33 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:19:33 np0005604725 podman[149997]: 2026-02-02 08:19:33.505996424 +0000 UTC m=+0.250274335 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, config_id=tripleo_step4, url=https://www.redhat.com, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 nova-conductor, org.opencontainers.image.created=2026-01-12T23:32:18Z, container_name=nova_conductor, name=rhosp-rhel9/openstack-nova-conductor, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, build-date=2026-01-12T23:32:18Z, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, vendor=Red Hat, Inc., version=17.1.13, batch=17.1_20260112.1, tcib_managed=true, com.redhat.component=openstack-nova-conductor-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 nova-conductor, distribution-scope=public, managed_by=tripleo_ansible) Feb 2 08:19:33 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:19:33 np0005604725 podman[150069]: 2026-02-02 08:19:33.524701408 +0000 UTC m=+0.181652475 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:52:54Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, description=Red Hat OpenStack Platform 17.1 manila-scheduler, vcs-type=git, build-date=2026-01-12T22:52:54Z, tcib_managed=true, url=https://www.redhat.com, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, container_name=manila_scheduler, name=rhosp-rhel9/openstack-manila-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, com.redhat.component=openstack-manila-scheduler-container, distribution-scope=public, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, release=1766032510, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, managed_by=tripleo_ansible) Feb 2 08:19:33 np0005604725 podman[150005]: 2026-02-02 08:19:33.430615617 +0000 UTC m=+0.164765306 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=healthy, url=https://www.redhat.com, vendor=Red Hat, Inc., com.redhat.component=openstack-manila-api-container, release=1766032510, build-date=2026-01-12T22:52:22Z, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, name=rhosp-rhel9/openstack-manila-api, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, tcib_managed=true, vcs-type=git, distribution-scope=public, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, io.openshift.expose-services=, container_name=manila_api_cron, summary=Red Hat OpenStack Platform 17.1 manila-api, org.opencontainers.image.created=2026-01-12T22:52:22Z, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}) Feb 2 08:19:33 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:19:33 np0005604725 podman[150122]: 2026-02-02 08:19:33.548913233 +0000 UTC m=+0.122481567 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, org.opencontainers.image.created=2026-01-12T22:53:19Z, name=rhosp-rhel9/openstack-heat-api, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, container_name=heat_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, vcs-type=git, config_id=tripleo_step4, io.openshift.expose-services=, build-date=2026-01-12T22:53:19Z, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, version=17.1.13, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=755001522886c265e88561b4997cab642504a845, architecture=x86_64, vendor=Red Hat, Inc., org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api) Feb 2 08:19:33 np0005604725 podman[150016]: 2026-02-02 08:19:33.559621112 +0000 UTC m=+0.292581265 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, container_name=heat_api_cfn, release=1766032510, com.redhat.component=openstack-heat-api-cfn-container, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, name=rhosp-rhel9/openstack-heat-api-cfn, tcib_managed=true, vcs-ref=755001522886c265e88561b4997cab642504a845, distribution-scope=public, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, maintainer=OpenStack TripleO Team, version=17.1.13, build-date=2026-01-12T22:54:02Z, batch=17.1_20260112.1, io.buildah.version=1.41.5, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:54:02Z, config_id=tripleo_step4, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, url=https://www.redhat.com) Feb 2 08:19:33 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:19:33 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:19:33 np0005604725 podman[150020]: 2026-02-02 08:19:33.594404271 +0000 UTC m=+0.322873516 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=healthy, org.opencontainers.image.created=2026-01-12T22:57:35Z, architecture=x86_64, release=1766032510, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, name=rhosp-rhel9/openstack-neutron-server, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, container_name=neutron_api, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, io.buildah.version=1.41.5, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:57:35Z, summary=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., tcib_managed=true, description=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_step4, com.redhat.component=openstack-neutron-server-container, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f) Feb 2 08:19:33 np0005604725 podman[150005]: 2026-02-02 08:19:33.610942859 +0000 UTC m=+0.345092538 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, release=1766032510, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, build-date=2026-01-12T22:52:22Z, tcib_managed=true, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:52:22Z, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, batch=17.1_20260112.1, config_id=tripleo_step4, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-manila-api-container, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=manila_api_cron, managed_by=tripleo_ansible, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.expose-services=) Feb 2 08:19:33 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:19:33 np0005604725 podman[150001]: 2026-02-02 08:19:33.663361841 +0000 UTC m=+0.404514446 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, tcib_managed=true, architecture=x86_64, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:15Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, url=https://www.redhat.com, name=rhosp-rhel9/openstack-cron, io.buildah.version=1.41.5, build-date=2026-01-12T22:10:15Z, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, summary=Red Hat OpenStack Platform 17.1 cron, vcs-type=git, container_name=logrotate_crond, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, release=1766032510, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 cron, com.redhat.component=openstack-cron-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:19:33 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:19:33 np0005604725 podman[150074]: 2026-02-02 08:19:33.674087001 +0000 UTC m=+0.328658515 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=healthy, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, maintainer=OpenStack TripleO Team, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, name=rhosp-rhel9/openstack-nova-scheduler, version=17.1.13, managed_by=tripleo_ansible, build-date=2026-01-12T23:32:05Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, architecture=x86_64, io.buildah.version=1.41.5, tcib_managed=true, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 nova-scheduler, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-scheduler-container, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:32:05Z, container_name=nova_scheduler, distribution-scope=public, io.openshift.expose-services=) Feb 2 08:19:33 np0005604725 podman[150020]: 2026-02-02 08:19:33.751091407 +0000 UTC m=+0.479560652 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, release=1766032510, batch=17.1_20260112.1, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 neutron-server, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, container_name=neutron_api, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, architecture=x86_64, name=rhosp-rhel9/openstack-neutron-server, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, build-date=2026-01-12T22:57:35Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, vendor=Red Hat, Inc., com.redhat.component=openstack-neutron-server-container, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z, vcs-type=git) Feb 2 08:19:33 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:19:33 np0005604725 podman[150074]: 2026-02-02 08:19:33.804372135 +0000 UTC m=+0.458943429 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, name=rhosp-rhel9/openstack-nova-scheduler, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, url=https://www.redhat.com, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, maintainer=OpenStack TripleO Team, build-date=2026-01-12T23:32:05Z, container_name=nova_scheduler, org.opencontainers.image.created=2026-01-12T23:32:05Z, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, release=1766032510, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-nova-scheduler-container, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 nova-scheduler, io.openshift.expose-services=, tcib_managed=true, vcs-type=git, vendor=Red Hat, Inc., vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13) Feb 2 08:19:33 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:19:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:19:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:19:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:19:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:19:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:19:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:19:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:19:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:19:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:19:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:19:38 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:19:38 np0005604725 podman[150431]: 2026-02-02 08:19:38.398337389 +0000 UTC m=+0.128613054 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, summary=Red Hat OpenStack Platform 17.1 ovn-controller, release=1766032510, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, config_id=tripleo_step4, container_name=ovn_controller, name=rhosp-rhel9/openstack-ovn-controller, tcib_managed=true, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, org.opencontainers.image.created=2026-01-12T22:36:40Z, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:36:40Z, managed_by=tripleo_ansible, com.redhat.component=openstack-ovn-controller-container, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.expose-services=, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 ovn-controller, url=https://www.redhat.com) Feb 2 08:19:38 np0005604725 podman[150431]: 2026-02-02 08:19:38.424856314 +0000 UTC m=+0.155131969 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, release=1766032510, vcs-type=git, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-ovn-controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, tcib_managed=true, container_name=ovn_controller, vendor=Red Hat, Inc., config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:36:40Z, com.redhat.component=openstack-ovn-controller-container, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, org.opencontainers.image.created=2026-01-12T22:36:40Z, architecture=x86_64, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, summary=Red Hat OpenStack Platform 17.1 ovn-controller, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, managed_by=tripleo_ansible, distribution-scope=public, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:19:38 np0005604725 systemd[1]: tmp-crun.4wVgng.mount: Deactivated successfully. Feb 2 08:19:38 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Deactivated successfully. Feb 2 08:19:38 np0005604725 podman[150459]: 2026-02-02 08:19:38.459469589 +0000 UTC m=+0.159196185 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, version=17.1.13, config_id=tripleo_step4, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=swift_object_server, description=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, build-date=2026-01-12T22:50:56Z, batch=17.1_20260112.1, url=https://www.redhat.com, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, vcs-type=git, vendor=Red Hat, Inc., managed_by=tripleo_ansible, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, com.redhat.component=openstack-swift-object-container, architecture=x86_64, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:50:56Z) Feb 2 08:19:38 np0005604725 podman[150437]: 2026-02-02 08:19:38.363697965 +0000 UTC m=+0.097611832 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, batch=17.1_20260112.1, container_name=memcached, architecture=x86_64, config_id=tripleo_step1, org.opencontainers.image.created=2026-01-12T22:12:26Z, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., build-date=2026-01-12T22:12:26Z, distribution-scope=public, com.redhat.component=openstack-memcached-container, io.openshift.expose-services=, managed_by=tripleo_ansible, vcs-type=git, description=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, version=17.1.13, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 memcached, name=rhosp-rhel9/openstack-memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true) Feb 2 08:19:38 np0005604725 podman[150487]: 2026-02-02 08:19:38.444890461 +0000 UTC m=+0.145171224 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, vcs-type=git, config_id=ovn_cluster_northd, description=Red Hat OpenStack Platform 17.1 ovn-northd, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-ovn-northd, summary=Red Hat OpenStack Platform 17.1 ovn-northd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, io.openshift.expose-services=, container_name=ovn_cluster_northd, distribution-scope=public, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, build-date=2026-01-12T22:34:06Z, com.redhat.component=openstack-ovn-northd-container, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:34:06Z, managed_by=tripleo_ansible, tcib_managed=true, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, release=1766032510, vendor=Red Hat, Inc.) Feb 2 08:19:38 np0005604725 podman[150437]: 2026-02-02 08:19:38.495807726 +0000 UTC m=+0.229721593 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, version=17.1.13, release=1766032510, com.redhat.component=openstack-memcached-container, managed_by=tripleo_ansible, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, name=rhosp-rhel9/openstack-memcached, architecture=x86_64, vcs-type=git, io.buildah.version=1.41.5, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:12:26Z, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, build-date=2026-01-12T22:12:26Z, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, container_name=memcached) Feb 2 08:19:38 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:19:38 np0005604725 podman[150498]: 2026-02-02 08:19:38.537699933 +0000 UTC m=+0.235279013 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=healthy, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:34:35Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, container_name=placement_api, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, name=rhosp-rhel9/openstack-placement-api, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, distribution-scope=public, vendor=Red Hat, Inc., url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, tcib_managed=true, com.redhat.component=openstack-placement-api-container, release=1766032510, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:34:35Z, vcs-type=git, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 placement-api) Feb 2 08:19:38 np0005604725 podman[150469]: 2026-02-02 08:19:38.501992296 +0000 UTC m=+0.210708688 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, version=17.1.13, name=rhosp-rhel9/openstack-swift-object, build-date=2026-01-12T22:50:56Z, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, batch=17.1_20260112.1, config_id=tripleo_step4, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, maintainer=OpenStack TripleO Team, container_name=swift_object_replicator, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.buildah.version=1.41.5, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com) Feb 2 08:19:38 np0005604725 podman[150469]: 2026-02-02 08:19:38.592791356 +0000 UTC m=+0.301507738 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, architecture=x86_64, build-date=2026-01-12T22:50:56Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, release=1766032510, container_name=swift_object_replicator, managed_by=tripleo_ansible, vcs-type=git, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:50:56Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, com.redhat.component=openstack-swift-object-container, maintainer=OpenStack TripleO Team, version=17.1.13) Feb 2 08:19:38 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Deactivated successfully. Feb 2 08:19:38 np0005604725 podman[150441]: 2026-02-02 08:19:38.611330506 +0000 UTC m=+0.341846109 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=healthy, description=Red Hat OpenStack Platform 17.1 swift-container, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_container_server, io.openshift.expose-services=, name=rhosp-rhel9/openstack-swift-container, config_id=tripleo_step4, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:50:57Z, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, distribution-scope=public, architecture=x86_64, io.buildah.version=1.41.5, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.component=openstack-swift-container-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:50:57Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, vcs-type=git, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:19:38 np0005604725 podman[150448]: 2026-02-02 08:19:38.647847319 +0000 UTC m=+0.367074715 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, description=Red Hat OpenStack Platform 17.1 swift-account, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-account-container, io.buildah.version=1.41.5, vcs-type=git, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 swift-account, managed_by=tripleo_ansible, url=https://www.redhat.com, container_name=swift_account_replicator, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, io.openshift.expose-services=, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:50:44Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:50:44Z, name=rhosp-rhel9/openstack-swift-account, release=1766032510, tcib_managed=true) Feb 2 08:19:38 np0005604725 podman[150461]: 2026-02-02 08:19:38.472629053 +0000 UTC m=+0.188881067 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=healthy, name=rhosp-rhel9/openstack-nova-novncproxy, vendor=Red Hat, Inc., tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, version=17.1.13, batch=17.1_20260112.1, url=https://www.redhat.com, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=nova_vnc_proxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-novncproxy-container, vcs-type=git, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, io.buildah.version=1.41.5, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, build-date=2026-01-12T23:32:22Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}) Feb 2 08:19:38 np0005604725 podman[150442]: 2026-02-02 08:19:38.576551698 +0000 UTC m=+0.300932762 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-container, release=1766032510, config_id=tripleo_step4, architecture=x86_64, build-date=2026-01-12T22:50:57Z, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, distribution-scope=public, com.redhat.component=openstack-swift-container-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vendor=Red Hat, Inc., tcib_managed=true, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, container_name=swift_container_replicator, url=https://www.redhat.com, name=rhosp-rhel9/openstack-swift-container, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, managed_by=tripleo_ansible, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:19:38 np0005604725 podman[150459]: 2026-02-02 08:19:38.695912186 +0000 UTC m=+0.395638762 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, org.opencontainers.image.created=2026-01-12T22:50:56Z, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 swift-object, config_id=tripleo_step4, architecture=x86_64, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_object_server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, vcs-type=git, release=1766032510, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:50:56Z, io.openshift.expose-services=, batch=17.1_20260112.1, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-object-container, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, version=17.1.13, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:19:38 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Deactivated successfully. Feb 2 08:19:38 np0005604725 podman[150442]: 2026-02-02 08:19:38.711778584 +0000 UTC m=+0.436159648 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, batch=17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, name=rhosp-rhel9/openstack-swift-container, com.redhat.component=openstack-swift-container-container, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-container, build-date=2026-01-12T22:50:57Z, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:50:57Z, vcs-type=git, container_name=swift_container_replicator, config_id=tripleo_step4, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container) Feb 2 08:19:38 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Deactivated successfully. Feb 2 08:19:38 np0005604725 podman[150448]: 2026-02-02 08:19:38.722837514 +0000 UTC m=+0.442064910 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, description=Red Hat OpenStack Platform 17.1 swift-account, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, config_id=tripleo_step4, container_name=swift_account_replicator, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, batch=17.1_20260112.1, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-swift-account-container, org.opencontainers.image.created=2026-01-12T22:50:44Z, architecture=x86_64, build-date=2026-01-12T22:50:44Z, io.buildah.version=1.41.5, url=https://www.redhat.com, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, release=1766032510, maintainer=OpenStack TripleO Team, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 swift-account, distribution-scope=public, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:19:38 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:19:38 np0005604725 podman[150498]: 2026-02-02 08:19:38.750544866 +0000 UTC m=+0.448123966 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, release=1766032510, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.component=openstack-placement-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, config_id=tripleo_step4, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:35Z, vcs-type=git, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, name=rhosp-rhel9/openstack-placement-api, container_name=placement_api, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:34:35Z, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, managed_by=tripleo_ansible, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc.) Feb 2 08:19:38 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:19:38 np0005604725 podman[150487]: 2026-02-02 08:19:38.776237816 +0000 UTC m=+0.476518589 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, managed_by=tripleo_ansible, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, org.opencontainers.image.created=2026-01-12T22:34:06Z, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:06Z, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_id=ovn_cluster_northd, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=ovn_cluster_northd, com.redhat.component=openstack-ovn-northd-container, url=https://www.redhat.com, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 ovn-northd, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, name=rhosp-rhel9/openstack-ovn-northd, tcib_managed=true, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 ovn-northd, vcs-type=git, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, version=17.1.13) Feb 2 08:19:38 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:19:38 np0005604725 podman[150441]: 2026-02-02 08:19:38.792805725 +0000 UTC m=+0.523321308 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, version=17.1.13, description=Red Hat OpenStack Platform 17.1 swift-container, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 swift-container, vcs-type=git, io.openshift.expose-services=, name=rhosp-rhel9/openstack-swift-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, io.buildah.version=1.41.5, vendor=Red Hat, Inc., tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:50:57Z, batch=17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:57Z, config_id=tripleo_step4, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_container_server, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-container-container, release=1766032510) Feb 2 08:19:38 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Deactivated successfully. Feb 2 08:19:38 np0005604725 podman[150461]: 2026-02-02 08:19:38.84143385 +0000 UTC m=+0.557685864 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, io.openshift.expose-services=, io.buildah.version=1.41.5, distribution-scope=public, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, vendor=Red Hat, Inc., vcs-type=git, build-date=2026-01-12T23:32:22Z, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, name=rhosp-rhel9/openstack-nova-novncproxy, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, version=17.1.13, container_name=nova_vnc_proxy, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, batch=17.1_20260112.1, com.redhat.component=openstack-nova-novncproxy-container, config_id=tripleo_step4, architecture=x86_64, release=1766032510, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:19:38 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Deactivated successfully. Feb 2 08:19:38 np0005604725 podman[150484]: 2026-02-02 08:19:38.856488773 +0000 UTC m=+0.556470087 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=healthy, managed_by=tripleo_ansible, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, io.openshift.expose-services=, com.redhat.component=openstack-swift-account-container, container_name=swift_account_server, tcib_managed=true, build-date=2026-01-12T22:50:44Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-account, vendor=Red Hat, Inc., io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 swift-account, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, config_id=tripleo_step4, distribution-scope=public, name=rhosp-rhel9/openstack-swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:50:44Z) Feb 2 08:19:39 np0005604725 podman[150484]: 2026-02-02 08:19:39.084917384 +0000 UTC m=+0.784898698 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, description=Red Hat OpenStack Platform 17.1 swift-account, batch=17.1_20260112.1, io.buildah.version=1.41.5, build-date=2026-01-12T22:50:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-swift-account, container_name=swift_account_server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, version=17.1.13, url=https://www.redhat.com, config_id=tripleo_step4, release=1766032510, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.component=openstack-swift-account-container, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:50:44Z, architecture=x86_64, vendor=Red Hat, Inc., org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true) Feb 2 08:19:39 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Deactivated successfully. Feb 2 08:19:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:19:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:19:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:19:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:19:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:19:40 np0005604725 podman[150841]: 2026-02-02 08:19:40.345753051 +0000 UTC m=+0.084350044 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:14Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, container_name=metrics_qdr, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., vcs-type=git, maintainer=OpenStack TripleO Team, release=1766032510, summary=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-qdrouterd-container, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2026-01-12T22:10:14Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, name=rhosp-rhel9/openstack-qdrouterd, version=17.1.13, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=) Feb 2 08:19:40 np0005604725 systemd[1]: tmp-crun.JHpOOF.mount: Deactivated successfully. Feb 2 08:19:40 np0005604725 podman[150842]: 2026-02-02 08:19:40.418340642 +0000 UTC m=+0.151419675 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=healthy, architecture=x86_64, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, version=17.1.13, managed_by=tripleo_ansible, release=1766032510, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-glance-api-container, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, batch=17.1_20260112.1, container_name=glance_api, org.opencontainers.image.created=2026-01-12T22:34:42Z, description=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:42Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:19:40 np0005604725 podman[150840]: 2026-02-02 08:19:40.375436754 +0000 UTC m=+0.112504189 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=healthy, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:42Z, vcs-type=git, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, distribution-scope=public, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, com.redhat.component=openstack-glance-api-container, summary=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, container_name=glance_api_internal, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, batch=17.1_20260112.1, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, org.opencontainers.image.created=2026-01-12T22:34:42Z, url=https://www.redhat.com, version=17.1.13, name=rhosp-rhel9/openstack-glance-api) Feb 2 08:19:40 np0005604725 podman[150844]: 2026-02-02 08:19:40.523473164 +0000 UTC m=+0.245776136 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=healthy, batch=17.1_20260112.1, vcs-type=git, container_name=swift_rsync, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-swift-object-container, build-date=2026-01-12T22:50:56Z, io.openshift.expose-services=, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, managed_by=tripleo_ansible, distribution-scope=public, name=rhosp-rhel9/openstack-swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, release=1766032510, tcib_managed=true, version=17.1.13, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:50:56Z, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:19:40 np0005604725 podman[150840]: 2026-02-02 08:19:40.559359397 +0000 UTC m=+0.296426832 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, vcs-ref=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, managed_by=tripleo_ansible, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:42Z, distribution-scope=public, release=1766032510, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, description=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:34:42Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, com.redhat.component=openstack-glance-api-container, summary=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20260112.1, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, container_name=glance_api_internal, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-glance-api, io.openshift.expose-services=, vendor=Red Hat, Inc.) Feb 2 08:19:40 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Deactivated successfully. Feb 2 08:19:40 np0005604725 podman[150835]: 2026-02-02 08:19:40.57831721 +0000 UTC m=+0.315415026 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, com.redhat.component=openstack-glance-api-container, name=rhosp-rhel9/openstack-glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:34:42Z, tcib_managed=true, io.openshift.expose-services=, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, container_name=glance_api_cron, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, vcs-type=git, build-date=2026-01-12T22:34:42Z, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:19:40 np0005604725 podman[150835]: 2026-02-02 08:19:40.586682927 +0000 UTC m=+0.323780723 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, io.openshift.expose-services=, managed_by=tripleo_ansible, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, vcs-ref=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-glance-api, url=https://www.redhat.com, config_id=tripleo_step4, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, build-date=2026-01-12T22:34:42Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, tcib_managed=true, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, container_name=glance_api_cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:19:40 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:19:40 np0005604725 podman[150841]: 2026-02-02 08:19:40.609852699 +0000 UTC m=+0.348449702 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp-rhel9/openstack-qdrouterd, maintainer=OpenStack TripleO Team, architecture=x86_64, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, io.buildah.version=1.41.5, container_name=metrics_qdr, build-date=2026-01-12T22:10:14Z, batch=17.1_20260112.1, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, vendor=Red Hat, Inc., config_id=tripleo_step1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, distribution-scope=public, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:19:40 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:19:40 np0005604725 podman[150842]: 2026-02-02 08:19:40.647812206 +0000 UTC m=+0.380891239 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, org.opencontainers.image.created=2026-01-12T22:34:42Z, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.buildah.version=1.41.5, managed_by=tripleo_ansible, build-date=2026-01-12T22:34:42Z, com.redhat.component=openstack-glance-api-container, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-glance-api, config_id=tripleo_step4, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, container_name=glance_api, vendor=Red Hat, Inc., org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, batch=17.1_20260112.1, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:19:40 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Deactivated successfully. Feb 2 08:19:40 np0005604725 podman[150844]: 2026-02-02 08:19:40.956146204 +0000 UTC m=+0.678449276 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, tcib_managed=true, architecture=x86_64, distribution-scope=public, container_name=swift_rsync, com.redhat.component=openstack-swift-object-container, build-date=2026-01-12T22:50:56Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, name=rhosp-rhel9/openstack-swift-object, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, vcs-type=git, io.buildah.version=1.41.5, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, vendor=Red Hat, Inc., release=1766032510, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:50:56Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, url=https://www.redhat.com, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:19:40 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:19:44 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:19:44 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:19:44 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:19:44 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:19:44 np0005604725 systemd[1]: tmp-crun.OSi6rh.mount: Deactivated successfully. Feb 2 08:19:44 np0005604725 podman[151203]: 2026-02-02 08:19:44.33998913 +0000 UTC m=+0.081437794 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=healthy, vcs-type=git, architecture=x86_64, config_id=tripleo_step4, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=nova_metadata, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:31:50Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-nova-api, managed_by=tripleo_ansible, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, version=17.1.13, description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, url=https://www.redhat.com, com.redhat.component=openstack-nova-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:19:44 np0005604725 podman[151205]: 2026-02-02 08:19:44.399725086 +0000 UTC m=+0.135781714 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, release=1766032510, tcib_managed=true, vcs-type=git, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-proxy-server, org.opencontainers.image.created=2026-01-12T22:50:51Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, vendor=Red Hat, Inc., url=https://www.redhat.com, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=swift_proxy, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, io.openshift.expose-services=, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, config_id=tripleo_step4, build-date=2026-01-12T22:50:51Z) Feb 2 08:19:44 np0005604725 podman[151203]: 2026-02-02 08:19:44.420778164 +0000 UTC m=+0.162226828 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, url=https://www.redhat.com, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, architecture=x86_64, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, container_name=nova_metadata, name=rhosp-rhel9/openstack-nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.created=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, tcib_managed=true, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:19:44 np0005604725 systemd[1]: tmp-crun.DgjA4g.mount: Deactivated successfully. Feb 2 08:19:44 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:19:44 np0005604725 podman[151204]: 2026-02-02 08:19:44.444976807 +0000 UTC m=+0.185358328 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=healthy, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.created=2026-01-12T23:31:50Z, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step4, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T23:31:50Z, release=1766032510, com.redhat.component=openstack-nova-api-container, managed_by=tripleo_ansible, container_name=nova_api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, url=https://www.redhat.com, name=rhosp-rhel9/openstack-nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, tcib_managed=true, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}) Feb 2 08:19:44 np0005604725 podman[151202]: 2026-02-02 08:19:44.495644416 +0000 UTC m=+0.236766980 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=healthy, build-date=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, distribution-scope=public, com.redhat.component=openstack-nova-api-container, url=https://www.redhat.com, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, org.opencontainers.image.created=2026-01-12T23:31:50Z, name=rhosp-rhel9/openstack-nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_api_cron, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, io.buildah.version=1.41.5, version=17.1.13, managed_by=tripleo_ansible, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, maintainer=OpenStack TripleO Team) Feb 2 08:19:44 np0005604725 podman[151202]: 2026-02-02 08:19:44.525366119 +0000 UTC m=+0.266488663 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, build-date=2026-01-12T23:31:50Z, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, managed_by=tripleo_ansible, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, distribution-scope=public, version=17.1.13, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, container_name=nova_api_cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, com.redhat.component=openstack-nova-api-container, name=rhosp-rhel9/openstack-nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 nova-api, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:19:44 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:19:44 np0005604725 podman[151204]: 2026-02-02 08:19:44.555619169 +0000 UTC m=+0.296000690 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, version=17.1.13, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, config_id=tripleo_step4, io.buildah.version=1.41.5, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.created=2026-01-12T23:31:50Z, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T23:31:50Z, managed_by=tripleo_ansible, release=1766032510, name=rhosp-rhel9/openstack-nova-api, tcib_managed=true, container_name=nova_api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc.) Feb 2 08:19:44 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:19:44 np0005604725 podman[151205]: 2026-02-02 08:19:44.619698259 +0000 UTC m=+0.355754897 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, url=https://www.redhat.com, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1766032510, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, vendor=Red Hat, Inc., tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-swift-proxy-server-container, version=17.1.13, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-proxy-server, distribution-scope=public, batch=17.1_20260112.1, managed_by=tripleo_ansible, build-date=2026-01-12T22:50:51Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_proxy, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, org.opencontainers.image.created=2026-01-12T22:50:51Z, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server) Feb 2 08:19:44 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Deactivated successfully. Feb 2 08:19:45 np0005604725 sshd[151356]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:19:45 np0005604725 sshd[151418]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:19:51 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:19:51 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:19:51 np0005604725 systemd[1]: tmp-crun.31LwO1.mount: Deactivated successfully. Feb 2 08:19:51 np0005604725 podman[151694]: 2026-02-02 08:19:51.431600171 +0000 UTC m=+0.164690333 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-horizon-container, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., vcs-type=git, version=17.1.13, io.buildah.version=1.41.5, container_name=horizon, summary=Red Hat OpenStack Platform 17.1 horizon, config_id=tripleo_step3, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, name=rhosp-rhel9/openstack-horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, build-date=2026-01-12T22:34:41Z, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, managed_by=tripleo_ansible, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, release=1766032510) Feb 2 08:19:51 np0005604725 podman[151694]: 2026-02-02 08:19:51.46374999 +0000 UTC m=+0.196840162 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-horizon, batch=17.1_20260112.1, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-horizon-container, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, vcs-type=git, architecture=x86_64, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, release=1766032510, distribution-scope=public, build-date=2026-01-12T22:34:41Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:34:41Z, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3) Feb 2 08:19:51 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:19:51 np0005604725 podman[151693]: 2026-02-02 08:19:51.383597505 +0000 UTC m=+0.119205724 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 collectd, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, architecture=x86_64, name=rhosp-rhel9/openstack-collectd, description=Red Hat OpenStack Platform 17.1 collectd, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-collectd-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:15Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, container_name=collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, version=17.1.13, build-date=2026-01-12T22:10:15Z, config_id=tripleo_step3, tcib_managed=true, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd) Feb 2 08:19:51 np0005604725 podman[151693]: 2026-02-02 08:19:51.518977328 +0000 UTC m=+0.254585527 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, container_name=collectd, vendor=Red Hat, Inc., config_id=tripleo_step3, architecture=x86_64, distribution-scope=public, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:15Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 collectd, version=17.1.13, maintainer=OpenStack TripleO Team, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 collectd, vcs-type=git, name=rhosp-rhel9/openstack-collectd, url=https://www.redhat.com, build-date=2026-01-12T22:10:15Z, io.buildah.version=1.41.5, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-collectd-container) Feb 2 08:19:51 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:19:54 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:19:54 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:19:54 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:19:54 np0005604725 podman[151867]: 2026-02-02 08:19:54.333026479 +0000 UTC m=+0.071231241 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, vendor=Red Hat, Inc., managed_by=tripleo_ansible, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20260112.1, distribution-scope=public, name=rhosp-rhel9/openstack-keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 keystone, build-date=2026-01-12T22:33:53Z, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:33:53Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, container_name=keystone_cron, io.buildah.version=1.41.5, io.openshift.expose-services=, tcib_managed=true, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, release=1766032510, com.redhat.component=openstack-keystone-container, architecture=x86_64, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step3) Feb 2 08:19:54 np0005604725 podman[151867]: 2026-02-02 08:19:54.364423143 +0000 UTC m=+0.102627905 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, tcib_managed=true, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, container_name=keystone_cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, description=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, managed_by=tripleo_ansible, build-date=2026-01-12T22:33:53Z, config_id=tripleo_step3, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.openshift.expose-services=, name=rhosp-rhel9/openstack-keystone, batch=17.1_20260112.1, vcs-type=git) Feb 2 08:19:54 np0005604725 podman[151866]: 2026-02-02 08:19:54.392104554 +0000 UTC m=+0.136805166 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, config_id=tripleo_step3, release=1766032510, distribution-scope=public, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, container_name=keystone, com.redhat.component=openstack-keystone-container, org.opencontainers.image.created=2026-01-12T22:33:53Z, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, url=https://www.redhat.com, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, build-date=2026-01-12T22:33:53Z, io.buildah.version=1.41.5) Feb 2 08:19:54 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:19:54 np0005604725 podman[151866]: 2026-02-02 08:19:54.470867485 +0000 UTC m=+0.215568077 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, tcib_managed=true, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, version=17.1.13, description=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-keystone-container, distribution-scope=public, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:33:53Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, container_name=keystone, summary=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, batch=17.1_20260112.1, io.openshift.expose-services=, io.buildah.version=1.41.5, managed_by=tripleo_ansible, vcs-ref=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:33:53Z, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:19:54 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:19:54 np0005604725 podman[151872]: 2026-02-02 08:19:54.546955314 +0000 UTC m=+0.279924416 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, architecture=x86_64, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, com.redhat.component=openstack-iscsid-container, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-iscsid, build-date=2026-01-12T22:34:43Z, config_id=tripleo_step3, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:34:43Z, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 iscsid, tcib_managed=true, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, container_name=iscsid, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}) Feb 2 08:19:54 np0005604725 podman[151872]: 2026-02-02 08:19:54.58810941 +0000 UTC m=+0.321078531 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, config_id=tripleo_step3, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 iscsid, distribution-scope=public, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, io.openshift.expose-services=, vcs-type=git, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:43Z, vendor=Red Hat, Inc., architecture=x86_64, vcs-ref=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:43Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, description=Red Hat OpenStack Platform 17.1 iscsid, container_name=iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, name=rhosp-rhel9/openstack-iscsid, com.redhat.component=openstack-iscsid-container, managed_by=tripleo_ansible, url=https://www.redhat.com) Feb 2 08:19:54 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:20:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:20:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:20:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:20:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:20:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:20:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:20:01 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:20:01 np0005604725 podman[152382]: 2026-02-02 08:20:01.365812241 +0000 UTC m=+0.083602491 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=healthy, architecture=x86_64, batch=17.1_20260112.1, distribution-scope=public, release=1766032510, url=https://www.redhat.com, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, container_name=ceilometer_agent_notification, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, name=rhosp-rhel9/openstack-ceilometer-notification, io.buildah.version=1.41.5, build-date=2026-01-12T23:07:25Z, com.redhat.component=openstack-ceilometer-notification-container, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T23:07:25Z) Feb 2 08:20:01 np0005604725 systemd[1]: tmp-crun.lVxpVd.mount: Deactivated successfully. Feb 2 08:20:01 np0005604725 podman[152370]: 2026-02-02 08:20:01.395233215 +0000 UTC m=+0.122770905 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, release=1766032510, com.redhat.component=openstack-cinder-api-container, io.openshift.expose-services=, managed_by=tripleo_ansible, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, config_id=tripleo_step4, batch=17.1_20260112.1, container_name=cinder_api_cron, vendor=Red Hat, Inc., url=https://www.redhat.com, name=rhosp-rhel9/openstack-cinder-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:58:44Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, distribution-scope=public, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, architecture=x86_64) Feb 2 08:20:01 np0005604725 podman[152382]: 2026-02-02 08:20:01.450804073 +0000 UTC m=+0.168594343 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.openshift.expose-services=, build-date=2026-01-12T23:07:25Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=ceilometer_agent_notification, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, managed_by=tripleo_ansible, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, name=rhosp-rhel9/openstack-ceilometer-notification, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T23:07:25Z, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, com.redhat.component=openstack-ceilometer-notification-container, io.buildah.version=1.41.5, vcs-type=git, url=https://www.redhat.com, distribution-scope=public, tcib_managed=true, release=1766032510, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:20:01 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:20:01 np0005604725 podman[152359]: 2026-02-02 08:20:01.499367136 +0000 UTC m=+0.230364742 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, config_id=tripleo_step2, description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=clustercheck, tcib_managed=true, vendor=Red Hat, Inc., architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, io.openshift.expose-services=, release=1766032510, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, name=rhosp-rhel9/openstack-mariadb, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, version=17.1.13, com.redhat.component=openstack-mariadb-container) Feb 2 08:20:01 np0005604725 podman[152370]: 2026-02-02 08:20:01.527599344 +0000 UTC m=+0.255137034 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, distribution-scope=public, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:58:44Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, managed_by=tripleo_ansible, com.redhat.component=openstack-cinder-api-container, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 cinder-api, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:58:44Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vcs-type=git, release=1766032510, name=rhosp-rhel9/openstack-cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=cinder_api_cron, url=https://www.redhat.com, io.openshift.expose-services=, batch=17.1_20260112.1, architecture=x86_64, vendor=Red Hat, Inc., vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, config_id=tripleo_step4, version=17.1.13) Feb 2 08:20:01 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:20:01 np0005604725 podman[152359]: 2026-02-02 08:20:01.545890676 +0000 UTC m=+0.276888312 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, container_name=clustercheck, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, name=rhosp-rhel9/openstack-mariadb, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., io.openshift.expose-services=, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step2, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, release=1766032510, com.redhat.component=openstack-mariadb-container, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, architecture=x86_64, build-date=2026-01-12T22:10:18Z) Feb 2 08:20:01 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:20:01 np0005604725 podman[152350]: 2026-02-02 08:20:01.451659689 +0000 UTC m=+0.195276153 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=healthy, com.redhat.component=openstack-ceilometer-central-container, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T23:07:24Z, io.openshift.expose-services=, distribution-scope=public, release=1766032510, batch=17.1_20260112.1, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 ceilometer-central, config_id=tripleo_step4, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, org.opencontainers.image.created=2026-01-12T23:07:24Z, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, url=https://www.redhat.com, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, container_name=ceilometer_agent_central, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, name=rhosp-rhel9/openstack-ceilometer-central, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, version=17.1.13, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible) Feb 2 08:20:01 np0005604725 podman[152351]: 2026-02-02 08:20:01.609590585 +0000 UTC m=+0.348175255 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:53:19Z, build-date=2026-01-12T22:53:19Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, vendor=Red Hat, Inc., release=1766032510, maintainer=OpenStack TripleO Team, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=, batch=17.1_20260112.1, container_name=heat_api_cron, summary=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, com.redhat.component=openstack-heat-api-container, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-heat-api, architecture=x86_64, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:20:01 np0005604725 podman[152351]: 2026-02-02 08:20:01.617700734 +0000 UTC m=+0.356285394 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, tcib_managed=true, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, io.openshift.expose-services=, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, vcs-ref=755001522886c265e88561b4997cab642504a845, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-heat-api-container, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-heat-api, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:53:19Z, container_name=heat_api_cron, summary=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510) Feb 2 08:20:01 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:20:01 np0005604725 podman[152352]: 2026-02-02 08:20:01.427657622 +0000 UTC m=+0.165632542 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=healthy, io.openshift.expose-services=, distribution-scope=public, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:58:47Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, version=17.1.13, config_id=tripleo_step4, build-date=2026-01-12T22:58:47Z, tcib_managed=true, managed_by=tripleo_ansible, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, vendor=Red Hat, Inc., vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, release=1766032510, container_name=cinder_scheduler, architecture=x86_64, com.redhat.component=openstack-cinder-scheduler-container, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-cinder-scheduler, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:20:01 np0005604725 podman[152358]: 2026-02-02 08:20:01.348668773 +0000 UTC m=+0.082193797 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=healthy, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 heat-engine, com.redhat.component=openstack-heat-engine-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 heat-engine, org.opencontainers.image.created=2026-01-12T22:53:38Z, container_name=heat_engine, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., version=17.1.13, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, name=rhosp-rhel9/openstack-heat-engine, managed_by=tripleo_ansible, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, tcib_managed=true, vcs-ref=755001522886c265e88561b4997cab642504a845, build-date=2026-01-12T22:53:38Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, url=https://www.redhat.com, batch=17.1_20260112.1) Feb 2 08:20:01 np0005604725 podman[152352]: 2026-02-02 08:20:01.665044568 +0000 UTC m=+0.403019518 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, io.buildah.version=1.41.5, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, vendor=Red Hat, Inc., version=17.1.13, config_id=tripleo_step4, com.redhat.component=openstack-cinder-scheduler-container, org.opencontainers.image.created=2026-01-12T22:58:47Z, managed_by=tripleo_ansible, container_name=cinder_scheduler, name=rhosp-rhel9/openstack-cinder-scheduler, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, vcs-type=git, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, batch=17.1_20260112.1, build-date=2026-01-12T22:58:47Z, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.openshift.expose-services=, maintainer=OpenStack TripleO Team) Feb 2 08:20:01 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:20:01 np0005604725 podman[152350]: 2026-02-02 08:20:01.682416283 +0000 UTC m=+0.426032737 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, com.redhat.component=openstack-ceilometer-central-container, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, managed_by=tripleo_ansible, build-date=2026-01-12T23:07:24Z, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, vcs-type=git, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, io.buildah.version=1.41.5, version=17.1.13, tcib_managed=true, name=rhosp-rhel9/openstack-ceilometer-central, description=Red Hat OpenStack Platform 17.1 ceilometer-central, config_id=tripleo_step4, container_name=ceilometer_agent_central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T23:07:24Z, url=https://www.redhat.com) Feb 2 08:20:01 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:20:01 np0005604725 podman[152358]: 2026-02-02 08:20:01.73665019 +0000 UTC m=+0.470175214 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, org.opencontainers.image.created=2026-01-12T22:53:38Z, version=17.1.13, name=rhosp-rhel9/openstack-heat-engine, vendor=Red Hat, Inc., container_name=heat_engine, distribution-scope=public, build-date=2026-01-12T22:53:38Z, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, tcib_managed=true, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, batch=17.1_20260112.1, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-heat-engine-container, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, summary=Red Hat OpenStack Platform 17.1 heat-engine, vcs-type=git, io.openshift.expose-services=, vcs-ref=755001522886c265e88561b4997cab642504a845, description=Red Hat OpenStack Platform 17.1 heat-engine, managed_by=tripleo_ansible, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, io.buildah.version=1.41.5, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845) Feb 2 08:20:01 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:20:02 np0005604725 podman[152563]: 2026-02-02 08:20:02.947341336 +0000 UTC m=+0.103201884 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, build-date=2026-01-12T22:10:18Z, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, name=rhosp-rhel9/openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.component=openstack-mariadb-container, vcs-type=git, distribution-scope=public, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64) Feb 2 08:20:02 np0005604725 podman[152563]: 2026-02-02 08:20:02.980907488 +0000 UTC m=+0.136767996 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, version=17.1.13, description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.created=2026-01-12T22:10:18Z, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, tcib_managed=true, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, release=1766032510, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-mariadb) Feb 2 08:20:03 np0005604725 podman[152622]: 2026-02-02 08:20:03.495587799 +0000 UTC m=+0.100825460 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-haproxy-container, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-haproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, description=Red Hat OpenStack Platform 17.1 haproxy, build-date=2026-01-12T22:10:12Z, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., distribution-scope=public, io.openshift.expose-services=, vcs-type=git, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:20:03 np0005604725 systemd[1]: tmp-crun.HPenoG.mount: Deactivated successfully. Feb 2 08:20:03 np0005604725 podman[152630]: 2026-02-02 08:20:03.527364275 +0000 UTC m=+0.119745642 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:16Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, architecture=x86_64, name=rhosp-rhel9/openstack-redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, url=https://www.redhat.com, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 redis, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-redis-container, org.opencontainers.image.created=2026-01-12T22:10:16Z, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 redis, io.buildah.version=1.41.5, tcib_managed=true, version=17.1.13, io.openshift.expose-services=) Feb 2 08:20:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:20:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:20:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:20:03 np0005604725 podman[152630]: 2026-02-02 08:20:03.567374425 +0000 UTC m=+0.159755812 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-redis, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:10:16Z, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, architecture=x86_64, io.openshift.expose-services=, com.redhat.component=openstack-redis-container, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, release=1766032510, description=Red Hat OpenStack Platform 17.1 redis, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 redis, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:16Z, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis) Feb 2 08:20:03 np0005604725 podman[152622]: 2026-02-02 08:20:03.58314618 +0000 UTC m=+0.188383801 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, io.openshift.expose-services=, tcib_managed=true, com.redhat.component=openstack-haproxy-container, distribution-scope=public, name=rhosp-rhel9/openstack-haproxy, architecture=x86_64, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:12Z, org.opencontainers.image.created=2026-01-12T22:10:12Z, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 haproxy, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5) Feb 2 08:20:03 np0005604725 podman[152670]: 2026-02-02 08:20:03.634657393 +0000 UTC m=+0.088362427 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=healthy, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, url=https://www.redhat.com, managed_by=tripleo_ansible, batch=17.1_20260112.1, container_name=nova_conductor, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, maintainer=OpenStack TripleO Team, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, description=Red Hat OpenStack Platform 17.1 nova-conductor, com.redhat.component=openstack-nova-conductor-container, tcib_managed=true, io.buildah.version=1.41.5, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, name=rhosp-rhel9/openstack-nova-conductor, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T23:32:18Z, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T23:32:18Z, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 nova-conductor, config_id=tripleo_step4, vcs-type=git) Feb 2 08:20:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:20:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:20:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:20:03 np0005604725 podman[152670]: 2026-02-02 08:20:03.682594647 +0000 UTC m=+0.136299681 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, name=rhosp-rhel9/openstack-nova-conductor, managed_by=tripleo_ansible, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T23:32:18Z, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, io.buildah.version=1.41.5, vcs-type=git, build-date=2026-01-12T23:32:18Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, container_name=nova_conductor, url=https://www.redhat.com, release=1766032510, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, batch=17.1_20260112.1, com.redhat.component=openstack-nova-conductor-container, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 nova-conductor, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 nova-conductor, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team) Feb 2 08:20:03 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:20:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:20:03 np0005604725 podman[152716]: 2026-02-02 08:20:03.733882654 +0000 UTC m=+0.083457087 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=healthy, batch=17.1_20260112.1, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, io.openshift.expose-services=, name=rhosp-rhel9/openstack-manila-api, release=1766032510, build-date=2026-01-12T22:52:22Z, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, architecture=x86_64, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, org.opencontainers.image.created=2026-01-12T22:52:22Z, container_name=manila_api_cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, version=17.1.13, com.redhat.component=openstack-manila-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:20:03 np0005604725 podman[152676]: 2026-02-02 08:20:03.74774807 +0000 UTC m=+0.195702427 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=healthy, io.openshift.expose-services=, vendor=Red Hat, Inc., build-date=2026-01-12T22:52:54Z, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:52:54Z, release=1766032510, com.redhat.component=openstack-manila-scheduler-container, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, name=rhosp-rhel9/openstack-manila-scheduler, managed_by=tripleo_ansible, vcs-type=git, container_name=manila_scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, description=Red Hat OpenStack Platform 17.1 manila-scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, distribution-scope=public, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, version=17.1.13, io.buildah.version=1.41.5, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb) Feb 2 08:20:03 np0005604725 podman[152767]: 2026-02-02 08:20:03.801168402 +0000 UTC m=+0.064758721 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, version=17.1.13, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:14Z, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, name=rhosp-rhel9/openstack-rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20260112.1, io.openshift.expose-services=, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, architecture=x86_64, tcib_managed=true, release=1766032510, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-rabbitmq-container, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:14Z, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:20:03 np0005604725 podman[152716]: 2026-02-02 08:20:03.828254915 +0000 UTC m=+0.177829328 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, architecture=x86_64, release=1766032510, container_name=manila_api_cron, description=Red Hat OpenStack Platform 17.1 manila-api, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:52:22Z, name=rhosp-rhel9/openstack-manila-api, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, summary=Red Hat OpenStack Platform 17.1 manila-api, build-date=2026-01-12T22:52:22Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.component=openstack-manila-api-container, vendor=Red Hat, Inc., config_id=tripleo_step4, vcs-type=git, io.buildah.version=1.41.5, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, batch=17.1_20260112.1) Feb 2 08:20:03 np0005604725 podman[152767]: 2026-02-02 08:20:03.842948546 +0000 UTC m=+0.106538865 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, vcs-type=git, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 rabbitmq, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, version=17.1.13, vendor=Red Hat, Inc., url=https://www.redhat.com, name=rhosp-rhel9/openstack-rabbitmq, tcib_managed=true, build-date=2026-01-12T22:10:14Z, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, batch=17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, com.redhat.component=openstack-rabbitmq-container, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:14Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:20:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:20:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:20:03 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:20:03 np0005604725 podman[152713]: 2026-02-02 08:20:03.777686181 +0000 UTC m=+0.127321366 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, name=rhosp-rhel9/openstack-heat-api, maintainer=OpenStack TripleO Team, distribution-scope=public, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:53:19Z, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, vendor=Red Hat, Inc., org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, build-date=2026-01-12T22:53:19Z, description=Red Hat OpenStack Platform 17.1 heat-api, container_name=heat_api, io.openshift.expose-services=, batch=17.1_20260112.1, vcs-ref=755001522886c265e88561b4997cab642504a845, url=https://www.redhat.com, version=17.1.13, com.redhat.component=openstack-heat-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api) Feb 2 08:20:03 np0005604725 podman[152676]: 2026-02-02 08:20:03.885475054 +0000 UTC m=+0.333429411 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, release=1766032510, architecture=x86_64, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, com.redhat.component=openstack-manila-scheduler-container, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, io.buildah.version=1.41.5, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, vcs-type=git, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:52:54Z, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, config_id=tripleo_step4, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, tcib_managed=true, name=rhosp-rhel9/openstack-manila-scheduler, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, description=Red Hat OpenStack Platform 17.1 manila-scheduler, container_name=manila_scheduler, distribution-scope=public, build-date=2026-01-12T22:52:54Z) Feb 2 08:20:03 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:20:03 np0005604725 podman[152713]: 2026-02-02 08:20:03.911778332 +0000 UTC m=+0.261413517 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, container_name=heat_api, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vendor=Red Hat, Inc., tcib_managed=true, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, release=1766032510, com.redhat.component=openstack-heat-api-container, description=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp-rhel9/openstack-heat-api, io.openshift.expose-services=, vcs-type=git, config_id=tripleo_step4, architecture=x86_64, managed_by=tripleo_ansible, io.buildah.version=1.41.5, version=17.1.13, build-date=2026-01-12T22:53:19Z, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:53:19Z, summary=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1) Feb 2 08:20:03 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:20:03 np0005604725 podman[152717]: 2026-02-02 08:20:03.88114575 +0000 UTC m=+0.224779700 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, url=https://www.redhat.com, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-heat-api-cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-heat-api-cfn-container, build-date=2026-01-12T22:54:02Z, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, version=17.1.13, release=1766032510, io.buildah.version=1.41.5, vcs-ref=755001522886c265e88561b4997cab642504a845, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, org.opencontainers.image.created=2026-01-12T22:54:02Z, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, container_name=heat_api_cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, distribution-scope=public, architecture=x86_64) Feb 2 08:20:03 np0005604725 podman[152717]: 2026-02-02 08:20:03.958766496 +0000 UTC m=+0.302400456 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, vcs-ref=755001522886c265e88561b4997cab642504a845, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, distribution-scope=public, url=https://www.redhat.com, com.redhat.component=openstack-heat-api-cfn-container, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.created=2026-01-12T22:54:02Z, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-heat-api-cfn, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, container_name=heat_api_cfn, architecture=x86_64, build-date=2026-01-12T22:54:02Z, vendor=Red Hat, Inc., release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn) Feb 2 08:20:03 np0005604725 podman[152878]: 2026-02-02 08:20:03.96536186 +0000 UTC m=+0.106418653 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=healthy, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-scheduler, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T23:32:05Z, url=https://www.redhat.com, container_name=nova_scheduler, release=1766032510, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T23:32:05Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-scheduler-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-nova-scheduler, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, io.buildah.version=1.41.5, tcib_managed=true) Feb 2 08:20:03 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:20:03 np0005604725 podman[152878]: 2026-02-02 08:20:03.993777873 +0000 UTC m=+0.134834666 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, url=https://www.redhat.com, vendor=Red Hat, Inc., architecture=x86_64, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, build-date=2026-01-12T23:32:05Z, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T23:32:05Z, vcs-type=git, name=rhosp-rhel9/openstack-nova-scheduler, batch=17.1_20260112.1, com.redhat.component=openstack-nova-scheduler-container, distribution-scope=public, container_name=nova_scheduler, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, managed_by=tripleo_ansible, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step4, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 nova-scheduler, release=1766032510, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, maintainer=OpenStack TripleO Team) Feb 2 08:20:04 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:20:04 np0005604725 podman[152872]: 2026-02-02 08:20:04.030261394 +0000 UTC m=+0.167374616 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=healthy, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, container_name=neutron_api, batch=17.1_20260112.1, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, org.opencontainers.image.created=2026-01-12T22:57:35Z, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, architecture=x86_64, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, tcib_managed=true, maintainer=OpenStack TripleO Team, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 neutron-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, summary=Red Hat OpenStack Platform 17.1 neutron-server, build-date=2026-01-12T22:57:35Z, name=rhosp-rhel9/openstack-neutron-server, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-neutron-server-container, vcs-type=git) Feb 2 08:20:04 np0005604725 podman[152752]: 2026-02-02 08:20:04.042436578 +0000 UTC m=+0.316814679 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, build-date=2026-01-12T22:10:15Z, version=17.1.13, com.redhat.component=openstack-cron-container, release=1766032510, description=Red Hat OpenStack Platform 17.1 cron, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, config_id=tripleo_step4, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:15Z, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 cron, name=rhosp-rhel9/openstack-cron, container_name=logrotate_crond, batch=17.1_20260112.1, managed_by=tripleo_ansible, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:20:04 np0005604725 podman[152668]: 2026-02-02 08:20:03.843643188 +0000 UTC m=+0.298777346 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, maintainer=OpenStack TripleO Team, distribution-scope=public, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 cinder-api, build-date=2026-01-12T22:58:44Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, architecture=x86_64, io.openshift.expose-services=, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, release=1766032510, url=https://www.redhat.com, container_name=cinder_api, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, io.buildah.version=1.41.5) Feb 2 08:20:04 np0005604725 podman[152752]: 2026-02-02 08:20:04.052770086 +0000 UTC m=+0.327148177 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, io.openshift.expose-services=, release=1766032510, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-cron, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 cron, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, managed_by=tripleo_ansible, com.redhat.component=openstack-cron-container, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=logrotate_crond, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:15Z, description=Red Hat OpenStack Platform 17.1 cron, distribution-scope=public, io.buildah.version=1.41.5, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:15Z, vendor=Red Hat, Inc., version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron) Feb 2 08:20:04 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:20:04 np0005604725 podman[152668]: 2026-02-02 08:20:04.078762335 +0000 UTC m=+0.533896483 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, build-date=2026-01-12T22:58:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 cinder-api, vcs-type=git, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:58:44Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, config_id=tripleo_step4, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, name=rhosp-rhel9/openstack-cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, container_name=cinder_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, release=1766032510) Feb 2 08:20:04 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:20:04 np0005604725 podman[152872]: 2026-02-02 08:20:04.238096713 +0000 UTC m=+0.375209965 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:57:35Z, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 neutron-server, description=Red Hat OpenStack Platform 17.1 neutron-server, io.buildah.version=1.41.5, vcs-type=git, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, managed_by=tripleo_ansible, architecture=x86_64, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:57:35Z, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, batch=17.1_20260112.1, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, tcib_managed=true, container_name=neutron_api, name=rhosp-rhel9/openstack-neutron-server, com.redhat.component=openstack-neutron-server-container) Feb 2 08:20:04 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:20:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:20:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:20:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:20:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:20:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:20:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:20:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:20:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:20:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:20:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:20:09 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:20:09 np0005604725 podman[153237]: 2026-02-02 08:20:09.419567657 +0000 UTC m=+0.084827009 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=healthy, maintainer=OpenStack TripleO Team, version=17.1.13, distribution-scope=public, container_name=placement_api, config_id=tripleo_step4, io.openshift.expose-services=, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, name=rhosp-rhel9/openstack-placement-api, url=https://www.redhat.com, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, build-date=2026-01-12T22:34:35Z, summary=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-type=git, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:34:35Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-placement-api-container) Feb 2 08:20:09 np0005604725 podman[153194]: 2026-02-02 08:20:09.395464195 +0000 UTC m=+0.105759422 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=healthy, version=17.1.13, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., io.openshift.expose-services=, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, url=https://www.redhat.com, name=rhosp-rhel9/openstack-swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=swift_container_replicator, build-date=2026-01-12T22:50:57Z, org.opencontainers.image.created=2026-01-12T22:50:57Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, config_id=tripleo_step4, distribution-scope=public, com.redhat.component=openstack-swift-container-container, summary=Red Hat OpenStack Platform 17.1 swift-container, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, release=1766032510) Feb 2 08:20:09 np0005604725 podman[153230]: 2026-02-02 08:20:09.467569492 +0000 UTC m=+0.137088945 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=healthy, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, build-date=2026-01-12T22:50:44Z, description=Red Hat OpenStack Platform 17.1 swift-account, release=1766032510, vcs-type=git, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, container_name=swift_account_server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-swift-account-container, summary=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, tcib_managed=true, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, distribution-scope=public, vendor=Red Hat, Inc., io.buildah.version=1.41.5, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account) Feb 2 08:20:09 np0005604725 podman[153207]: 2026-02-02 08:20:09.492290591 +0000 UTC m=+0.189224567 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, vcs-type=git, container_name=swift_account_replicator, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-account-container, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 swift-account, name=rhosp-rhel9/openstack-swift-account, architecture=x86_64, io.buildah.version=1.41.5, release=1766032510, vendor=Red Hat, Inc., build-date=2026-01-12T22:50:44Z, org.opencontainers.image.created=2026-01-12T22:50:44Z, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-account, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, batch=17.1_20260112.1, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true) Feb 2 08:20:09 np0005604725 podman[153226]: 2026-02-02 08:20:09.514674389 +0000 UTC m=+0.192273600 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=healthy, config_id=tripleo_step4, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-nova-novncproxy, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, container_name=nova_vnc_proxy, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, architecture=x86_64, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, tcib_managed=true, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, com.redhat.component=openstack-nova-novncproxy-container, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.buildah.version=1.41.5, build-date=2026-01-12T23:32:22Z, version=17.1.13, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:20:09 np0005604725 podman[153215]: 2026-02-02 08:20:09.549637885 +0000 UTC m=+0.234895172 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=healthy, description=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, managed_by=tripleo_ansible, version=17.1.13, batch=17.1_20260112.1, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-swift-object-container, config_id=tripleo_step4, container_name=swift_object_server, io.openshift.expose-services=, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, org.opencontainers.image.created=2026-01-12T22:50:56Z, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-object, architecture=x86_64, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vendor=Red Hat, Inc.) Feb 2 08:20:09 np0005604725 podman[153182]: 2026-02-02 08:20:09.447087102 +0000 UTC m=+0.173664239 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, name=rhosp-rhel9/openstack-memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, managed_by=tripleo_ansible, com.redhat.component=openstack-memcached-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, description=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, tcib_managed=true, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vcs-type=git, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, release=1766032510, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., config_id=tripleo_step1, summary=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, batch=17.1_20260112.1, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:12:26Z, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:20:09 np0005604725 podman[153186]: 2026-02-02 08:20:09.568571577 +0000 UTC m=+0.291226193 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=healthy, container_name=swift_container_server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:50:57Z, release=1766032510, config_id=tripleo_step4, distribution-scope=public, io.openshift.expose-services=, name=rhosp-rhel9/openstack-swift-container, io.buildah.version=1.41.5, version=17.1.13, build-date=2026-01-12T22:50:57Z, maintainer=OpenStack TripleO Team, vcs-type=git, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, com.redhat.component=openstack-swift-container-container, vendor=Red Hat, Inc., url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, description=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:20:09 np0005604725 podman[153181]: 2026-02-02 08:20:09.613703274 +0000 UTC m=+0.340315212 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=healthy, build-date=2026-01-12T22:36:40Z, architecture=x86_64, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, managed_by=tripleo_ansible, version=17.1.13, distribution-scope=public, vcs-type=git, url=https://www.redhat.com, name=rhosp-rhel9/openstack-ovn-controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, org.opencontainers.image.created=2026-01-12T22:36:40Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, release=1766032510, com.redhat.component=openstack-ovn-controller-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, container_name=ovn_controller, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 ovn-controller, vendor=Red Hat, Inc., org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c) Feb 2 08:20:09 np0005604725 podman[153237]: 2026-02-02 08:20:09.622630078 +0000 UTC m=+0.287889460 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, org.opencontainers.image.created=2026-01-12T22:34:35Z, vendor=Red Hat, Inc., config_id=tripleo_step4, version=17.1.13, description=Red Hat OpenStack Platform 17.1 placement-api, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, container_name=placement_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-placement-api-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, tcib_managed=true, io.openshift.expose-services=, architecture=x86_64, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, name=rhosp-rhel9/openstack-placement-api, build-date=2026-01-12T22:34:35Z, summary=Red Hat OpenStack Platform 17.1 placement-api) Feb 2 08:20:09 np0005604725 podman[153194]: 2026-02-02 08:20:09.630977775 +0000 UTC m=+0.341272992 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, maintainer=OpenStack TripleO Team, vcs-type=git, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:57Z, tcib_managed=true, name=rhosp-rhel9/openstack-swift-container, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, architecture=x86_64, managed_by=tripleo_ansible, config_id=tripleo_step4, com.redhat.component=openstack-swift-container-container, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, container_name=swift_container_replicator, description=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container) Feb 2 08:20:09 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:20:09 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Deactivated successfully. Feb 2 08:20:09 np0005604725 podman[153207]: 2026-02-02 08:20:09.658218143 +0000 UTC m=+0.355152089 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, url=https://www.redhat.com, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.component=openstack-swift-account-container, vcs-type=git, build-date=2026-01-12T22:50:44Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, name=rhosp-rhel9/openstack-swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, architecture=x86_64, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, managed_by=tripleo_ansible, vendor=Red Hat, Inc., tcib_managed=true, container_name=swift_account_replicator, batch=17.1_20260112.1, config_id=tripleo_step4) Feb 2 08:20:09 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:20:09 np0005604725 podman[153181]: 2026-02-02 08:20:09.667782716 +0000 UTC m=+0.394394644 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, container_name=ovn_controller, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 ovn-controller, version=17.1.13, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vendor=Red Hat, Inc., batch=17.1_20260112.1, architecture=x86_64, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:36:40Z, com.redhat.component=openstack-ovn-controller-container, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:36:40Z, io.openshift.expose-services=, tcib_managed=true, name=rhosp-rhel9/openstack-ovn-controller) Feb 2 08:20:09 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Deactivated successfully. Feb 2 08:20:09 np0005604725 podman[153182]: 2026-02-02 08:20:09.687406819 +0000 UTC m=+0.413983946 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, build-date=2026-01-12T22:12:26Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, release=1766032510, vendor=Red Hat, Inc., architecture=x86_64, io.buildah.version=1.41.5, version=17.1.13, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step1, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 memcached, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, name=rhosp-rhel9/openstack-memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, com.redhat.component=openstack-memcached-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, container_name=memcached, url=https://www.redhat.com, managed_by=tripleo_ansible) Feb 2 08:20:09 np0005604725 podman[153234]: 2026-02-02 08:20:09.540545455 +0000 UTC m=+0.209625174 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, batch=17.1_20260112.1, com.redhat.component=openstack-ovn-northd-container, tcib_managed=true, managed_by=tripleo_ansible, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, io.openshift.expose-services=, name=rhosp-rhel9/openstack-ovn-northd, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=ovn_cluster_northd, container_name=ovn_cluster_northd, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, release=1766032510, org.opencontainers.image.created=2026-01-12T22:34:06Z, version=17.1.13, build-date=2026-01-12T22:34:06Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 ovn-northd, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, distribution-scope=public, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 ovn-northd) Feb 2 08:20:09 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:20:09 np0005604725 podman[153230]: 2026-02-02 08:20:09.699866483 +0000 UTC m=+0.369385916 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 swift-account, container_name=swift_account_server, description=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, architecture=x86_64, maintainer=OpenStack TripleO Team, version=17.1.13, io.openshift.expose-services=, managed_by=tripleo_ansible, url=https://www.redhat.com, release=1766032510, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:44Z, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, build-date=2026-01-12T22:50:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-swift-account-container, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, vendor=Red Hat, Inc.) Feb 2 08:20:09 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Deactivated successfully. Feb 2 08:20:09 np0005604725 podman[153234]: 2026-02-02 08:20:09.722810208 +0000 UTC m=+0.391889937 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=ovn_cluster_northd, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, org.opencontainers.image.created=2026-01-12T22:34:06Z, io.buildah.version=1.41.5, build-date=2026-01-12T22:34:06Z, release=1766032510, config_id=ovn_cluster_northd, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-ovn-northd-container, managed_by=tripleo_ansible, architecture=x86_64, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-ovn-northd, version=17.1.13, vcs-type=git, io.openshift.expose-services=, batch=17.1_20260112.1, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 ovn-northd, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 ovn-northd) Feb 2 08:20:09 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:20:09 np0005604725 podman[153229]: 2026-02-02 08:20:09.592269665 +0000 UTC m=+0.270980481 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, tcib_managed=true, io.openshift.expose-services=, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_object_replicator, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, url=https://www.redhat.com, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:50:56Z, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-object, batch=17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, release=1766032510, version=17.1.13, vcs-type=git, build-date=2026-01-12T22:50:56Z) Feb 2 08:20:09 np0005604725 podman[153186]: 2026-02-02 08:20:09.754953326 +0000 UTC m=+0.477607982 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-container-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, maintainer=OpenStack TripleO Team, tcib_managed=true, vendor=Red Hat, Inc., vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:57Z, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:50:57Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, io.buildah.version=1.41.5, release=1766032510, version=17.1.13, distribution-scope=public, container_name=swift_container_server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container) Feb 2 08:20:09 np0005604725 podman[153215]: 2026-02-02 08:20:09.800989451 +0000 UTC m=+0.486246718 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, vcs-type=git, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-swift-object-container, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, config_id=tripleo_step4, container_name=swift_object_server, name=rhosp-rhel9/openstack-swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, managed_by=tripleo_ansible, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64, io.buildah.version=1.41.5, build-date=2026-01-12T22:50:56Z, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:20:09 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Deactivated successfully. Feb 2 08:20:09 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Deactivated successfully. Feb 2 08:20:09 np0005604725 podman[153229]: 2026-02-02 08:20:09.849854453 +0000 UTC m=+0.528565249 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, com.redhat.component=openstack-swift-object-container, build-date=2026-01-12T22:50:56Z, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, version=17.1.13, description=Red Hat OpenStack Platform 17.1 swift-object, managed_by=tripleo_ansible, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:50:56Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, container_name=swift_object_replicator, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., release=1766032510, vcs-type=git, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4) Feb 2 08:20:09 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Deactivated successfully. Feb 2 08:20:09 np0005604725 podman[153226]: 2026-02-02 08:20:09.986757561 +0000 UTC m=+0.664356822 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, config_id=tripleo_step4, name=rhosp-rhel9/openstack-nova-novncproxy, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, release=1766032510, container_name=nova_vnc_proxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, maintainer=OpenStack TripleO Team, build-date=2026-01-12T23:32:22Z, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-novncproxy-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, url=https://www.redhat.com, batch=17.1_20260112.1, io.openshift.expose-services=, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, tcib_managed=true, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:20:09 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Deactivated successfully. Feb 2 08:20:10 np0005604725 systemd[1]: tmp-crun.lrLhoh.mount: Deactivated successfully. Feb 2 08:20:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:20:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:20:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:20:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:20:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:20:11 np0005604725 podman[153521]: 2026-02-02 08:20:11.382879717 +0000 UTC m=+0.110622291 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=healthy, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, com.redhat.component=openstack-glance-api-container, architecture=x86_64, vcs-type=git, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, vendor=Red Hat, Inc., config_id=tripleo_step4, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 glance-api, build-date=2026-01-12T22:34:42Z, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:34:42Z, container_name=glance_api, name=rhosp-rhel9/openstack-glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:20:11 np0005604725 podman[153513]: 2026-02-02 08:20:11.437061023 +0000 UTC m=+0.177368793 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=healthy, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, vcs-type=git, vendor=Red Hat, Inc., architecture=x86_64, config_id=tripleo_step4, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, summary=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, com.redhat.component=openstack-glance-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=glance_api_cron, name=rhosp-rhel9/openstack-glance-api, batch=17.1_20260112.1, build-date=2026-01-12T22:34:42Z, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:20:11 np0005604725 podman[153513]: 2026-02-02 08:20:11.448889047 +0000 UTC m=+0.189196827 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, config_id=tripleo_step4, io.buildah.version=1.41.5, container_name=glance_api_cron, vcs-type=git, managed_by=tripleo_ansible, architecture=x86_64, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:34:42Z, build-date=2026-01-12T22:34:42Z, release=1766032510, url=https://www.redhat.com, version=17.1.13, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true) Feb 2 08:20:11 np0005604725 systemd[1]: tmp-crun.h4fSEU.mount: Deactivated successfully. Feb 2 08:20:11 np0005604725 podman[153515]: 2026-02-02 08:20:11.497661596 +0000 UTC m=+0.229707022 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, url=https://www.redhat.com, vendor=Red Hat, Inc., tcib_managed=true, name=rhosp-rhel9/openstack-qdrouterd, container_name=metrics_qdr, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, io.openshift.expose-services=, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step1, version=17.1.13, batch=17.1_20260112.1, build-date=2026-01-12T22:10:14Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 qdrouterd, release=1766032510, vcs-type=git, com.redhat.component=openstack-qdrouterd-container, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:14Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:20:11 np0005604725 podman[153532]: 2026-02-02 08:20:11.544375842 +0000 UTC m=+0.262814400 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=healthy, url=https://www.redhat.com, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:50:56Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, batch=17.1_20260112.1, tcib_managed=true, build-date=2026-01-12T22:50:56Z, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, container_name=swift_rsync, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, com.redhat.component=openstack-swift-object-container, distribution-scope=public, vcs-type=git, architecture=x86_64, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, config_id=tripleo_step4, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:20:11 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:20:11 np0005604725 podman[153521]: 2026-02-02 08:20:11.604822121 +0000 UTC m=+0.332564685 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, com.redhat.component=openstack-glance-api-container, architecture=x86_64, managed_by=tripleo_ansible, vcs-type=git, version=17.1.13, description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, build-date=2026-01-12T22:34:42Z, container_name=glance_api, io.buildah.version=1.41.5, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, batch=17.1_20260112.1, distribution-scope=public, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:20:11 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Deactivated successfully. Feb 2 08:20:11 np0005604725 podman[153514]: 2026-02-02 08:20:11.680383513 +0000 UTC m=+0.416671629 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=healthy, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, config_id=tripleo_step4, vcs-ref=705339545363fec600102567c4e923938e0f43b3, release=1766032510, architecture=x86_64, tcib_managed=true, io.openshift.expose-services=, build-date=2026-01-12T22:34:42Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, version=17.1.13, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, distribution-scope=public, com.redhat.component=openstack-glance-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp-rhel9/openstack-glance-api, vendor=Red Hat, Inc., container_name=glance_api_internal, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible) Feb 2 08:20:11 np0005604725 podman[153515]: 2026-02-02 08:20:11.735795186 +0000 UTC m=+0.467840562 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, batch=17.1_20260112.1, config_id=tripleo_step1, io.openshift.expose-services=, distribution-scope=public, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, build-date=2026-01-12T22:10:14Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5, release=1766032510, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, architecture=x86_64, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-qdrouterd, container_name=metrics_qdr) Feb 2 08:20:11 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:20:11 np0005604725 podman[153514]: 2026-02-02 08:20:11.84979496 +0000 UTC m=+0.586083076 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, container_name=glance_api_internal, batch=17.1_20260112.1, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, vcs-type=git, config_id=tripleo_step4, release=1766032510, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:34:42Z, distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.openshift.expose-services=, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, build-date=2026-01-12T22:34:42Z, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, url=https://www.redhat.com, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-glance-api-container, description=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:20:11 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Deactivated successfully. Feb 2 08:20:11 np0005604725 podman[153532]: 2026-02-02 08:20:11.924059064 +0000 UTC m=+0.642497662 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, vcs-type=git, description=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, build-date=2026-01-12T22:50:56Z, config_id=tripleo_step4, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, io.openshift.expose-services=, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.created=2026-01-12T22:50:56Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, managed_by=tripleo_ansible, container_name=swift_rsync, tcib_managed=true, com.redhat.component=openstack-swift-object-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:20:11 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:20:12 np0005604725 systemd[1]: tmp-crun.KtvgDs.mount: Deactivated successfully. Feb 2 08:20:15 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:20:15 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:20:15 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:20:15 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:20:15 np0005604725 systemd[1]: tmp-crun.OeEzwi.mount: Deactivated successfully. Feb 2 08:20:15 np0005604725 podman[153949]: 2026-02-02 08:20:15.371595328 +0000 UTC m=+0.098428537 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=healthy, vendor=Red Hat, Inc., org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, maintainer=OpenStack TripleO Team, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_api, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, tcib_managed=true, com.redhat.component=openstack-nova-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.13, build-date=2026-01-12T23:31:50Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:20:15 np0005604725 podman[153934]: 2026-02-02 08:20:15.402146407 +0000 UTC m=+0.142458220 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=healthy, url=https://www.redhat.com, release=1766032510, io.openshift.expose-services=, batch=17.1_20260112.1, managed_by=tripleo_ansible, tcib_managed=true, org.opencontainers.image.created=2026-01-12T23:31:50Z, com.redhat.component=openstack-nova-api-container, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T23:31:50Z, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-nova-api, architecture=x86_64, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_api_cron, vcs-type=git, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:20:15 np0005604725 podman[153939]: 2026-02-02 08:20:15.462075019 +0000 UTC m=+0.199045860 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=healthy, vcs-type=git, name=rhosp-rhel9/openstack-nova-api, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1, container_name=nova_metadata, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, config_id=tripleo_step4, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, com.redhat.component=openstack-nova-api-container, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, version=17.1.13, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:20:15 np0005604725 podman[153949]: 2026-02-02 08:20:15.468521738 +0000 UTC m=+0.195354957 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, name=rhosp-rhel9/openstack-nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-nova-api-container, io.buildah.version=1.41.5, release=1766032510, summary=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:31:50Z, url=https://www.redhat.com, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, config_id=tripleo_step4, container_name=nova_api, batch=17.1_20260112.1, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, distribution-scope=public, vendor=Red Hat, Inc., tcib_managed=true, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T23:31:50Z) Feb 2 08:20:15 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:20:15 np0005604725 podman[153954]: 2026-02-02 08:20:15.507534627 +0000 UTC m=+0.227800394 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=healthy, build-date=2026-01-12T22:50:51Z, io.buildah.version=1.41.5, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, distribution-scope=public, vcs-type=git, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:50:51Z, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=swift_proxy, name=rhosp-rhel9/openstack-swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, url=https://www.redhat.com) Feb 2 08:20:15 np0005604725 podman[153939]: 2026-02-02 08:20:15.521329661 +0000 UTC m=+0.258300512 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=nova_metadata, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T23:31:50Z, version=17.1.13, com.redhat.component=openstack-nova-api-container, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, tcib_managed=true, architecture=x86_64, build-date=2026-01-12T23:31:50Z, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_step4, io.buildah.version=1.41.5, distribution-scope=public, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}) Feb 2 08:20:15 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:20:15 np0005604725 podman[153934]: 2026-02-02 08:20:15.538389945 +0000 UTC m=+0.278701778 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, managed_by=tripleo_ansible, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, url=https://www.redhat.com, container_name=nova_api_cron, config_id=tripleo_step4, vcs-type=git, tcib_managed=true, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, summary=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.created=2026-01-12T23:31:50Z, release=1766032510, io.openshift.expose-services=, build-date=2026-01-12T23:31:50Z, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-nova-api, distribution-scope=public, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:20:15 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:20:15 np0005604725 podman[153954]: 2026-02-02 08:20:15.691847452 +0000 UTC m=+0.412113229 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, container_name=swift_proxy, tcib_managed=true, build-date=2026-01-12T22:50:51Z, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:51Z, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1766032510, com.redhat.component=openstack-swift-proxy-server-container, config_id=tripleo_step4, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:20:15 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Deactivated successfully. Feb 2 08:20:16 np0005604725 systemd[1]: tmp-crun.9vuz1P.mount: Deactivated successfully. Feb 2 08:20:16 np0005604725 sshd[154116]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:20:16 np0005604725 systemd[1]: Starting User Manager for UID 1000... Feb 2 08:20:16 np0005604725 systemd-logind[36465]: New session 20 of user zuul. Feb 2 08:20:16 np0005604725 systemd[154134]: Queued start job for default target Main User Target. Feb 2 08:20:16 np0005604725 systemd[154134]: Created slice User Application Slice. Feb 2 08:20:16 np0005604725 systemd[154134]: Started Mark boot as successful after the user session has run 2 minutes. Feb 2 08:20:16 np0005604725 systemd[154134]: Started Daily Cleanup of User's Temporary Directories. Feb 2 08:20:16 np0005604725 systemd[154134]: Reached target Paths. Feb 2 08:20:16 np0005604725 systemd[154134]: Reached target Timers. Feb 2 08:20:16 np0005604725 systemd[154134]: Starting D-Bus User Message Bus Socket... Feb 2 08:20:16 np0005604725 systemd[154134]: Starting Create User's Volatile Files and Directories... Feb 2 08:20:16 np0005604725 systemd[154134]: Listening on D-Bus User Message Bus Socket. Feb 2 08:20:16 np0005604725 systemd[154134]: Reached target Sockets. Feb 2 08:20:16 np0005604725 systemd[154134]: Finished Create User's Volatile Files and Directories. Feb 2 08:20:16 np0005604725 systemd[154134]: Reached target Basic System. Feb 2 08:20:16 np0005604725 systemd[154134]: Reached target Main User Target. Feb 2 08:20:16 np0005604725 systemd[154134]: Startup finished in 184ms. Feb 2 08:20:16 np0005604725 systemd[1]: Started User Manager for UID 1000. Feb 2 08:20:16 np0005604725 systemd[1]: Started Session 20 of User zuul. Feb 2 08:20:17 np0005604725 python3[154280]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 2 08:20:22 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:20:22 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:20:22 np0005604725 systemd[1]: tmp-crun.3RmgMP.mount: Deactivated successfully. Feb 2 08:20:22 np0005604725 podman[154606]: 2026-02-02 08:20:22.419416744 +0000 UTC m=+0.158324509 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, name=rhosp-rhel9/openstack-collectd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:15Z, container_name=collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, com.redhat.component=openstack-collectd-container, build-date=2026-01-12T22:10:15Z, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, tcib_managed=true, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, version=17.1.13, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 collectd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, distribution-scope=public, io.buildah.version=1.41.5, config_id=tripleo_step3, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 collectd) Feb 2 08:20:22 np0005604725 podman[154607]: 2026-02-02 08:20:22.37699923 +0000 UTC m=+0.115973007 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, url=https://www.redhat.com, batch=17.1_20260112.1, config_id=tripleo_step3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 horizon, distribution-scope=public, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-horizon-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, release=1766032510, vcs-type=git, build-date=2026-01-12T22:34:41Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, summary=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, name=rhosp-rhel9/openstack-horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, vendor=Red Hat, Inc., managed_by=tripleo_ansible, version=17.1.13, container_name=horizon) Feb 2 08:20:22 np0005604725 podman[154606]: 2026-02-02 08:20:22.437911852 +0000 UTC m=+0.176819597 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, com.redhat.component=openstack-collectd-container, vendor=Red Hat, Inc., url=https://www.redhat.com, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:15Z, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:15Z, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 collectd, summary=Red Hat OpenStack Platform 17.1 collectd, config_id=tripleo_step3, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, architecture=x86_64, maintainer=OpenStack TripleO Team, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=collectd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, vcs-type=git, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd) Feb 2 08:20:22 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:20:22 np0005604725 podman[154607]: 2026-02-02 08:20:22.461024973 +0000 UTC m=+0.199998710 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, com.redhat.component=openstack-horizon-container, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-horizon, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, build-date=2026-01-12T22:34:41Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 horizon, tcib_managed=true, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, config_id=tripleo_step3, io.buildah.version=1.41.5, managed_by=tripleo_ansible, io.openshift.expose-services=, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, container_name=horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 horizon, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon) Feb 2 08:20:22 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:20:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:20:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:20:25 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:20:25 np0005604725 podman[154920]: 2026-02-02 08:20:25.278614483 +0000 UTC m=+0.063940816 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, distribution-scope=public, name=rhosp-rhel9/openstack-iscsid, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:43Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, build-date=2026-01-12T22:34:43Z, io.openshift.expose-services=, com.redhat.component=openstack-iscsid-container, summary=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, container_name=iscsid, release=1766032510, description=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, url=https://www.redhat.com, tcib_managed=true, version=17.1.13, managed_by=tripleo_ansible, config_id=tripleo_step3) Feb 2 08:20:25 np0005604725 podman[154920]: 2026-02-02 08:20:25.286480854 +0000 UTC m=+0.071807177 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, com.redhat.component=openstack-iscsid-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, batch=17.1_20260112.1, io.buildah.version=1.41.5, config_id=tripleo_step3, vendor=Red Hat, Inc., release=1766032510, description=Red Hat OpenStack Platform 17.1 iscsid, distribution-scope=public, container_name=iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:34:43Z, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, name=rhosp-rhel9/openstack-iscsid, managed_by=tripleo_ansible, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 iscsid) Feb 2 08:20:25 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:20:25 np0005604725 podman[154919]: 2026-02-02 08:20:25.334210562 +0000 UTC m=+0.119308278 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, managed_by=tripleo_ansible, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, batch=17.1_20260112.1, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, container_name=keystone_cron, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:33:53Z, com.redhat.component=openstack-keystone-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, config_id=tripleo_step3, build-date=2026-01-12T22:33:53Z, name=rhosp-rhel9/openstack-keystone, distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:20:25 np0005604725 systemd[1]: tmp-crun.j4j9JV.mount: Deactivated successfully. Feb 2 08:20:25 np0005604725 podman[154917]: 2026-02-02 08:20:25.388183311 +0000 UTC m=+0.174185075 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, container_name=keystone, release=1766032510, tcib_managed=true, build-date=2026-01-12T22:33:53Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, version=17.1.13, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-keystone, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vendor=Red Hat, Inc., batch=17.1_20260112.1, com.redhat.component=openstack-keystone-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git) Feb 2 08:20:25 np0005604725 podman[154919]: 2026-02-02 08:20:25.415199531 +0000 UTC m=+0.200297267 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, vendor=Red Hat, Inc., config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-keystone, build-date=2026-01-12T22:33:53Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_step3, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:33:53Z, maintainer=OpenStack TripleO Team, release=1766032510, tcib_managed=true, io.buildah.version=1.41.5, io.openshift.expose-services=, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, com.redhat.component=openstack-keystone-container, container_name=keystone_cron) Feb 2 08:20:25 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:20:25 np0005604725 python3[154918]: ansible-ansible.legacy.dnf Invoked with name=['iptables'] allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None state=None Feb 2 08:20:25 np0005604725 podman[154917]: 2026-02-02 08:20:25.467570461 +0000 UTC m=+0.253572245 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, description=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, name=rhosp-rhel9/openstack-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-keystone-container, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:33:53Z, vendor=Red Hat, Inc., build-date=2026-01-12T22:33:53Z, io.openshift.expose-services=, config_id=tripleo_step3, managed_by=tripleo_ansible, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, distribution-scope=public) Feb 2 08:20:25 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:20:26 np0005604725 systemd[1]: tmp-crun.wXruRR.mount: Deactivated successfully. Feb 2 08:20:26 np0005604725 podman[155136]: 2026-02-02 08:20:26.90479931 +0000 UTC m=+0.074377856 container exec c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-cinder-volume, io.buildah.version=1.41.5, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 cinder-volume, url=https://www.redhat.com, architecture=x86_64, distribution-scope=public, vendor=Red Hat, Inc., batch=17.1_20260112.1, com.redhat.component=openstack-cinder-volume-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cinder-volume, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, tcib_managed=true, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, build-date=2026-01-12T22:58:35Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, version=17.1.13, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:58:35Z, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume) Feb 2 08:20:26 np0005604725 podman[155136]: 2026-02-02 08:20:26.933358828 +0000 UTC m=+0.102937374 container exec_died c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, summary=Red Hat OpenStack Platform 17.1 cinder-volume, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, release=1766032510, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:58:35Z, io.buildah.version=1.41.5, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vendor=Red Hat, Inc., vcs-type=git, com.redhat.component=openstack-cinder-volume-container, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-volume, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 cinder-volume, io.openshift.expose-services=, url=https://www.redhat.com, build-date=2026-01-12T22:58:35Z, version=17.1.13, maintainer=OpenStack TripleO Team) Feb 2 08:20:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:20:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:20:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:20:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:20:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:20:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:20:32 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:20:32 np0005604725 podman[155552]: 2026-02-02 08:20:32.393149357 +0000 UTC m=+0.128990036 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=heat_api_cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, build-date=2026-01-12T22:53:19Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=, io.buildah.version=1.41.5, release=1766032510, version=17.1.13, description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:53:19Z, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible) Feb 2 08:20:32 np0005604725 podman[155552]: 2026-02-02 08:20:32.401851085 +0000 UTC m=+0.137691774 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, architecture=x86_64, container_name=heat_api_cron, version=17.1.13, tcib_managed=true, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:53:19Z, io.buildah.version=1.41.5, url=https://www.redhat.com, distribution-scope=public, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, release=1766032510, com.redhat.component=openstack-heat-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:53:19Z, name=rhosp-rhel9/openstack-heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845) Feb 2 08:20:32 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:20:32 np0005604725 podman[155553]: 2026-02-02 08:20:32.449785858 +0000 UTC m=+0.175121373 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=healthy, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, com.redhat.component=openstack-cinder-scheduler-container, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:58:47Z, container_name=cinder_scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:58:47Z, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, name=rhosp-rhel9/openstack-cinder-scheduler, distribution-scope=public, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, tcib_managed=true, url=https://www.redhat.com, config_id=tripleo_step4, batch=17.1_20260112.1, architecture=x86_64, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, managed_by=tripleo_ansible) Feb 2 08:20:32 np0005604725 podman[155564]: 2026-02-02 08:20:32.491837431 +0000 UTC m=+0.205617651 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=healthy, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, managed_by=tripleo_ansible, build-date=2026-01-12T22:53:38Z, vcs-type=git, version=17.1.13, com.redhat.component=openstack-heat-engine-container, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:53:38Z, maintainer=OpenStack TripleO Team, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-engine, vcs-ref=755001522886c265e88561b4997cab642504a845, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, container_name=heat_engine, config_id=tripleo_step4, tcib_managed=true, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 heat-engine, name=rhosp-rhel9/openstack-heat-engine, io.openshift.expose-services=) Feb 2 08:20:32 np0005604725 podman[155564]: 2026-02-02 08:20:32.527802716 +0000 UTC m=+0.241582936 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, com.redhat.component=openstack-heat-engine-container, vendor=Red Hat, Inc., vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:53:38Z, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, description=Red Hat OpenStack Platform 17.1 heat-engine, distribution-scope=public, build-date=2026-01-12T22:53:38Z, maintainer=OpenStack TripleO Team, container_name=heat_engine, io.buildah.version=1.41.5, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, vcs-ref=755001522886c265e88561b4997cab642504a845, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, url=https://www.redhat.com, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 heat-engine, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, name=rhosp-rhel9/openstack-heat-engine, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845) Feb 2 08:20:32 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:20:32 np0005604725 podman[155573]: 2026-02-02 08:20:32.543023095 +0000 UTC m=+0.252786071 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, url=https://www.redhat.com, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=clustercheck, version=17.1.13, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, release=1766032510, io.buildah.version=1.41.5, com.redhat.component=openstack-mariadb-container, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, maintainer=OpenStack TripleO Team, architecture=x86_64, name=rhosp-rhel9/openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, build-date=2026-01-12T22:10:18Z, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step2, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:20:32 np0005604725 podman[155551]: 2026-02-02 08:20:32.494999039 +0000 UTC m=+0.231601861 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=healthy, name=rhosp-rhel9/openstack-ceilometer-central, description=Red Hat OpenStack Platform 17.1 ceilometer-central, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T23:07:24Z, batch=17.1_20260112.1, vcs-type=git, com.redhat.component=openstack-ceilometer-central-container, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, distribution-scope=public, container_name=ceilometer_agent_central, release=1766032510, url=https://www.redhat.com, build-date=2026-01-12T23:07:24Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, architecture=x86_64, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., io.buildah.version=1.41.5, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, maintainer=OpenStack TripleO Team) Feb 2 08:20:32 np0005604725 podman[155553]: 2026-02-02 08:20:32.571855751 +0000 UTC m=+0.297191256 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, com.redhat.component=openstack-cinder-scheduler-container, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-cinder-scheduler, vcs-type=git, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, build-date=2026-01-12T22:58:47Z, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, tcib_managed=true, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, release=1766032510, io.openshift.expose-services=, vendor=Red Hat, Inc., container_name=cinder_scheduler, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:58:47Z) Feb 2 08:20:32 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:20:32 np0005604725 podman[155573]: 2026-02-02 08:20:32.593729293 +0000 UTC m=+0.303492249 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, config_id=tripleo_step2, org.opencontainers.image.created=2026-01-12T22:10:18Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, architecture=x86_64, container_name=clustercheck, distribution-scope=public, url=https://www.redhat.com, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:18Z, batch=17.1_20260112.1, tcib_managed=true, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:20:32 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:20:32 np0005604725 podman[155585]: 2026-02-02 08:20:32.608973282 +0000 UTC m=+0.302582103 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=healthy, container_name=ceilometer_agent_notification, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.buildah.version=1.41.5, io.openshift.expose-services=, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, architecture=x86_64, tcib_managed=true, org.opencontainers.image.created=2026-01-12T23:07:25Z, build-date=2026-01-12T23:07:25Z, managed_by=tripleo_ansible, vendor=Red Hat, Inc., release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-ceilometer-notification, maintainer=OpenStack TripleO Team, version=17.1.13, config_id=tripleo_step4, batch=17.1_20260112.1, com.redhat.component=openstack-ceilometer-notification-container, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, vcs-type=git) Feb 2 08:20:32 np0005604725 podman[155551]: 2026-02-02 08:20:32.624340714 +0000 UTC m=+0.360943556 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, build-date=2026-01-12T23:07:24Z, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, version=17.1.13, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, url=https://www.redhat.com, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, batch=17.1_20260112.1, com.redhat.component=openstack-ceilometer-central-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, container_name=ceilometer_agent_central, release=1766032510, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-ceilometer-central, io.buildah.version=1.41.5, io.openshift.expose-services=, architecture=x86_64, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, description=Red Hat OpenStack Platform 17.1 ceilometer-central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T23:07:24Z, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:20:32 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:20:32 np0005604725 python3[155691]: ansible-ansible.builtin.iptables Invoked with action=insert chain=INPUT comment=allow ssh access for zuul executor in_interface=eth0 jump=ACCEPT protocol=tcp source=38.102.83.114 table=filter state=present ip_version=ipv4 match=[] destination_ports=[] ctstate=[] syn=ignore flush=False chain_management=False numeric=False rule_num=None wait=None to_source=None destination=None to_destination=None tcp_flags=None gateway=None log_prefix=None log_level=None goto=None out_interface=None fragment=None set_counters=None source_port=None destination_port=None to_ports=None set_dscp_mark=None set_dscp_mark_class=None src_range=None dst_range=None match_set=None match_set_flags=None limit=None limit_burst=None uid_owner=None gid_owner=None reject_with=None icmp_type=None policy=None Feb 2 08:20:32 np0005604725 podman[155577]: 2026-02-02 08:20:32.591172135 +0000 UTC m=+0.294582346 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, managed_by=tripleo_ansible, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, org.opencontainers.image.created=2026-01-12T22:58:44Z, vendor=Red Hat, Inc., config_id=tripleo_step4, com.redhat.component=openstack-cinder-api-container, build-date=2026-01-12T22:58:44Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, version=17.1.13, io.openshift.expose-services=, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-api, container_name=cinder_api_cron, batch=17.1_20260112.1, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, url=https://www.redhat.com, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 cinder-api, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}) Feb 2 08:20:32 np0005604725 systemd-journald[617]: Field hash table of /run/log/journal/48447b9b8976f23a3b4b319f2b01dfe5/system.journal has a fill level at 79.3 (264 of 333 items), suggesting rotation. Feb 2 08:20:32 np0005604725 systemd-journald[617]: /run/log/journal/48447b9b8976f23a3b4b319f2b01dfe5/system.journal: Journal header limits reached or header out-of-date, rotating. Feb 2 08:20:32 np0005604725 rsyslogd[48053]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Feb 2 08:20:32 np0005604725 kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Feb 2 08:20:32 np0005604725 podman[155585]: 2026-02-02 08:20:32.659296758 +0000 UTC m=+0.352905589 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, config_id=tripleo_step4, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, com.redhat.component=openstack-ceilometer-notification-container, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, org.opencontainers.image.created=2026-01-12T23:07:25Z, vendor=Red Hat, Inc., release=1766032510, build-date=2026-01-12T23:07:25Z, vcs-type=git, container_name=ceilometer_agent_notification, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, distribution-scope=public, name=rhosp-rhel9/openstack-ceilometer-notification, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, url=https://www.redhat.com) Feb 2 08:20:32 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:20:32 np0005604725 podman[155577]: 2026-02-02 08:20:32.677798607 +0000 UTC m=+0.381208818 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, io.openshift.expose-services=, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, batch=17.1_20260112.1, release=1766032510, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-cinder-api-container, summary=Red Hat OpenStack Platform 17.1 cinder-api, architecture=x86_64, config_id=tripleo_step4, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.buildah.version=1.41.5, distribution-scope=public, name=rhosp-rhel9/openstack-cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:58:44Z, org.opencontainers.image.created=2026-01-12T22:58:44Z, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, container_name=cinder_api_cron, version=17.1.13, description=Red Hat OpenStack Platform 17.1 cinder-api, url=https://www.redhat.com, vcs-type=git) Feb 2 08:20:32 np0005604725 rsyslogd[48053]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Feb 2 08:20:32 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:20:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:20:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:20:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:20:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:20:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:20:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:20:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:20:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:20:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:20:34 np0005604725 systemd[1]: tmp-crun.EHcvFw.mount: Deactivated successfully. Feb 2 08:20:34 np0005604725 podman[155928]: 2026-02-02 08:20:34.387245105 +0000 UTC m=+0.099771019 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=healthy, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, vcs-type=git, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, build-date=2026-01-12T22:57:35Z, tcib_managed=true, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, container_name=neutron_api, name=rhosp-rhel9/openstack-neutron-server, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_step4, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 neutron-server, release=1766032510, vendor=Red Hat, Inc., com.redhat.component=openstack-neutron-server-container, description=Red Hat OpenStack Platform 17.1 neutron-server, batch=17.1_20260112.1, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:57:35Z, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}) Feb 2 08:20:34 np0005604725 podman[155919]: 2026-02-02 08:20:34.400633016 +0000 UTC m=+0.117927776 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 manila-scheduler, container_name=manila_scheduler, vcs-type=git, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, maintainer=OpenStack TripleO Team, architecture=x86_64, com.redhat.component=openstack-manila-scheduler-container, url=https://www.redhat.com, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, distribution-scope=public, io.openshift.expose-services=, build-date=2026-01-12T22:52:54Z, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, vendor=Red Hat, Inc., io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-manila-scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:52:54Z, release=1766032510, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler) Feb 2 08:20:34 np0005604725 podman[155909]: 2026-02-02 08:20:34.449143907 +0000 UTC m=+0.155519511 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, architecture=x86_64, vcs-ref=755001522886c265e88561b4997cab642504a845, container_name=heat_api_cfn, url=https://www.redhat.com, io.openshift.expose-services=, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, distribution-scope=public, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:54:02Z, org.opencontainers.image.created=2026-01-12T22:54:02Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, managed_by=tripleo_ansible, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-heat-api-cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.buildah.version=1.41.5, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, com.redhat.component=openstack-heat-api-cfn-container, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, batch=17.1_20260112.1, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team) Feb 2 08:20:34 np0005604725 podman[155900]: 2026-02-02 08:20:34.368774616 +0000 UTC m=+0.101787259 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, maintainer=OpenStack TripleO Team, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, container_name=heat_api, com.redhat.component=openstack-heat-api-container, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., config_id=tripleo_step4, version=17.1.13, io.buildah.version=1.41.5, url=https://www.redhat.com, name=rhosp-rhel9/openstack-heat-api, architecture=x86_64, build-date=2026-01-12T22:53:19Z, summary=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, io.openshift.expose-services=, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:53:19Z, tcib_managed=true) Feb 2 08:20:34 np0005604725 podman[155903]: 2026-02-02 08:20:34.47981597 +0000 UTC m=+0.206825419 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=healthy, description=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, io.buildah.version=1.41.5, container_name=manila_api_cron, build-date=2026-01-12T22:52:22Z, vcs-type=git, distribution-scope=public, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, com.redhat.component=openstack-manila-api-container, summary=Red Hat OpenStack Platform 17.1 manila-api, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, release=1766032510, name=rhosp-rhel9/openstack-manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, config_id=tripleo_step4, version=17.1.13, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, org.opencontainers.image.created=2026-01-12T22:52:22Z) Feb 2 08:20:34 np0005604725 podman[155903]: 2026-02-02 08:20:34.486693942 +0000 UTC m=+0.213703381 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:52:22Z, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, batch=17.1_20260112.1, architecture=x86_64, tcib_managed=true, url=https://www.redhat.com, container_name=manila_api_cron, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, org.opencontainers.image.created=2026-01-12T22:52:22Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, vendor=Red Hat, Inc., config_id=tripleo_step4, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, name=rhosp-rhel9/openstack-manila-api, com.redhat.component=openstack-manila-api-container) Feb 2 08:20:34 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:20:34 np0005604725 podman[155909]: 2026-02-02 08:20:34.530595971 +0000 UTC m=+0.236971595 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, version=17.1.13, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, vendor=Red Hat, Inc., tcib_managed=true, name=rhosp-rhel9/openstack-heat-api-cfn, vcs-ref=755001522886c265e88561b4997cab642504a845, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.openshift.expose-services=, config_id=tripleo_step4, vcs-type=git, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:54:02Z, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:54:02Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, managed_by=tripleo_ansible, com.redhat.component=openstack-heat-api-cfn-container, container_name=heat_api_cfn) Feb 2 08:20:34 np0005604725 podman[155919]: 2026-02-02 08:20:34.545663115 +0000 UTC m=+0.262957895 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, managed_by=tripleo_ansible, tcib_managed=true, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-manila-scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, org.opencontainers.image.created=2026-01-12T22:52:54Z, release=1766032510, version=17.1.13, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, architecture=x86_64, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, description=Red Hat OpenStack Platform 17.1 manila-scheduler, vendor=Red Hat, Inc., distribution-scope=public, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, config_id=tripleo_step4, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, url=https://www.redhat.com, build-date=2026-01-12T22:52:54Z, container_name=manila_scheduler, com.redhat.component=openstack-manila-scheduler-container) Feb 2 08:20:34 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:20:34 np0005604725 podman[155900]: 2026-02-02 08:20:34.559037925 +0000 UTC m=+0.292050568 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, vcs-type=git, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 heat-api, container_name=heat_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, release=1766032510, com.redhat.component=openstack-heat-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, managed_by=tripleo_ansible, io.openshift.expose-services=, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:53:19Z, distribution-scope=public, batch=17.1_20260112.1, io.buildah.version=1.41.5, url=https://www.redhat.com, config_id=tripleo_step4, vcs-ref=755001522886c265e88561b4997cab642504a845, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, build-date=2026-01-12T22:53:19Z, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc.) Feb 2 08:20:34 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:20:34 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:20:34 np0005604725 podman[155899]: 2026-02-02 08:20:34.573356266 +0000 UTC m=+0.307952297 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=healthy, build-date=2026-01-12T23:32:18Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, name=rhosp-rhel9/openstack-nova-conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, description=Red Hat OpenStack Platform 17.1 nova-conductor, maintainer=OpenStack TripleO Team, tcib_managed=true, batch=17.1_20260112.1, url=https://www.redhat.com, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T23:32:18Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, architecture=x86_64, com.redhat.component=openstack-nova-conductor-container, container_name=nova_conductor, summary=Red Hat OpenStack Platform 17.1 nova-conductor, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.openshift.expose-services=, vcs-type=git, distribution-scope=public, release=1766032510, config_id=tripleo_step4, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:20:34 np0005604725 podman[155921]: 2026-02-02 08:20:34.603961226 +0000 UTC m=+0.302186009 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=healthy, io.openshift.expose-services=, batch=17.1_20260112.1, release=1766032510, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, maintainer=OpenStack TripleO Team, container_name=nova_scheduler, vcs-type=git, url=https://www.redhat.com, distribution-scope=public, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-scheduler-container, architecture=x86_64, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-nova-scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 nova-scheduler, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, org.opencontainers.image.created=2026-01-12T23:32:05Z, build-date=2026-01-12T23:32:05Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:20:34 np0005604725 podman[155901]: 2026-02-02 08:20:34.657730649 +0000 UTC m=+0.376286658 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, release=1766032510, config_id=tripleo_step4, name=rhosp-rhel9/openstack-cron, org.opencontainers.image.created=2026-01-12T22:10:15Z, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 cron, container_name=logrotate_crond, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cron, vendor=Red Hat, Inc., vcs-type=git, version=17.1.13, com.redhat.component=openstack-cron-container, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, build-date=2026-01-12T22:10:15Z, io.openshift.expose-services=, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron) Feb 2 08:20:34 np0005604725 podman[155928]: 2026-02-02 08:20:34.683705828 +0000 UTC m=+0.396231762 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, io.buildah.version=1.41.5, distribution-scope=public, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, summary=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z, description=Red Hat OpenStack Platform 17.1 neutron-server, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-neutron-server, build-date=2026-01-12T22:57:35Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, config_id=tripleo_step4, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, version=17.1.13, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, release=1766032510, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=neutron_api, managed_by=tripleo_ansible, com.redhat.component=openstack-neutron-server-container, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.openshift.expose-services=) Feb 2 08:20:34 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:20:34 np0005604725 podman[155901]: 2026-02-02 08:20:34.699862444 +0000 UTC m=+0.418418383 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, summary=Red Hat OpenStack Platform 17.1 cron, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, managed_by=tripleo_ansible, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:15Z, build-date=2026-01-12T22:10:15Z, vcs-type=git, com.redhat.component=openstack-cron-container, description=Red Hat OpenStack Platform 17.1 cron, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., batch=17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, name=rhosp-rhel9/openstack-cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, container_name=logrotate_crond, architecture=x86_64, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, distribution-scope=public, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:20:34 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:20:34 np0005604725 podman[155898]: 2026-02-02 08:20:34.532331745 +0000 UTC m=+0.269767504 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, summary=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.buildah.version=1.41.5, config_id=tripleo_step4, io.openshift.expose-services=, batch=17.1_20260112.1, container_name=cinder_api, version=17.1.13, description=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, distribution-scope=public, com.redhat.component=openstack-cinder-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, build-date=2026-01-12T22:58:44Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, maintainer=OpenStack TripleO Team, architecture=x86_64, vcs-type=git, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e) Feb 2 08:20:34 np0005604725 podman[155899]: 2026-02-02 08:20:34.759857228 +0000 UTC m=+0.494453289 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, container_name=nova_conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 nova-conductor, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 nova-conductor, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, tcib_managed=true, batch=17.1_20260112.1, com.redhat.component=openstack-nova-conductor-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, vcs-type=git, build-date=2026-01-12T23:32:18Z, org.opencontainers.image.created=2026-01-12T23:32:18Z, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-nova-conductor, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, vendor=Red Hat, Inc., architecture=x86_64, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, distribution-scope=public) Feb 2 08:20:34 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:20:34 np0005604725 podman[155921]: 2026-02-02 08:20:34.787517949 +0000 UTC m=+0.485742752 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, distribution-scope=public, vcs-type=git, architecture=x86_64, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-nova-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, description=Red Hat OpenStack Platform 17.1 nova-scheduler, build-date=2026-01-12T23:32:05Z, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, release=1766032510, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, container_name=nova_scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, com.redhat.component=openstack-nova-scheduler-container, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, org.opencontainers.image.created=2026-01-12T23:32:05Z, managed_by=tripleo_ansible, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:20:34 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:20:34 np0005604725 podman[155898]: 2026-02-02 08:20:34.817460449 +0000 UTC m=+0.554896168 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, url=https://www.redhat.com, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., com.redhat.component=openstack-cinder-api-container, name=rhosp-rhel9/openstack-cinder-api, batch=17.1_20260112.1, architecture=x86_64, io.openshift.expose-services=, distribution-scope=public, maintainer=OpenStack TripleO Team, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, release=1766032510, container_name=cinder_api, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, managed_by=tripleo_ansible, tcib_managed=true, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, build-date=2026-01-12T22:58:44Z, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:58:44Z) Feb 2 08:20:34 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:20:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:20:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:20:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:20:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:20:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:20:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:20:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:20:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:20:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:20:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:20:40 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:20:40 np0005604725 podman[156340]: 2026-02-02 08:20:40.371788725 +0000 UTC m=+0.103675098 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=healthy, build-date=2026-01-12T22:50:57Z, io.buildah.version=1.41.5, managed_by=tripleo_ansible, url=https://www.redhat.com, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, distribution-scope=public, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, release=1766032510, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, name=rhosp-rhel9/openstack-swift-container, batch=17.1_20260112.1, com.redhat.component=openstack-swift-container-container, container_name=swift_container_server, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, description=Red Hat OpenStack Platform 17.1 swift-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:50:57Z, architecture=x86_64, io.openshift.expose-services=, version=17.1.13, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:20:40 np0005604725 podman[156375]: 2026-02-02 08:20:40.38916531 +0000 UTC m=+0.097338764 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=healthy, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, distribution-scope=public, build-date=2026-01-12T22:50:44Z, batch=17.1_20260112.1, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:44Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-account, architecture=x86_64, container_name=swift_account_server, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.component=openstack-swift-account-container, version=17.1.13, vcs-type=git) Feb 2 08:20:40 np0005604725 systemd[1]: tmp-crun.cwrDuB.mount: Deactivated successfully. Feb 2 08:20:40 np0005604725 podman[156364]: 2026-02-02 08:20:40.433828893 +0000 UTC m=+0.148929360 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, version=17.1.13, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, io.openshift.expose-services=, vcs-type=git, batch=17.1_20260112.1, tcib_managed=true, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, architecture=x86_64, build-date=2026-01-12T23:32:22Z, name=rhosp-rhel9/openstack-nova-novncproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, com.redhat.component=openstack-nova-novncproxy-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, container_name=nova_vnc_proxy, url=https://www.redhat.com, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, release=1766032510, managed_by=tripleo_ansible, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, maintainer=OpenStack TripleO Team) Feb 2 08:20:40 np0005604725 podman[156365]: 2026-02-02 08:20:40.483587771 +0000 UTC m=+0.190274090 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=healthy, description=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, com.redhat.component=openstack-swift-object-container, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, vendor=Red Hat, Inc., io.buildah.version=1.41.5, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, tcib_managed=true, maintainer=OpenStack TripleO Team, version=17.1.13, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_object_replicator, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, build-date=2026-01-12T22:50:56Z) Feb 2 08:20:40 np0005604725 podman[156382]: 2026-02-02 08:20:40.441526318 +0000 UTC m=+0.138158287 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.buildah.version=1.41.5, vcs-type=git, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 ovn-northd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, config_id=ovn_cluster_northd, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, tcib_managed=true, distribution-scope=public, architecture=x86_64, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-ovn-northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, version=17.1.13, container_name=ovn_cluster_northd, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 ovn-northd, managed_by=tripleo_ansible, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:06Z, com.redhat.component=openstack-ovn-northd-container, url=https://www.redhat.com, build-date=2026-01-12T22:34:06Z) Feb 2 08:20:40 np0005604725 podman[156382]: 2026-02-02 08:20:40.526320526 +0000 UTC m=+0.222952495 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, com.redhat.component=openstack-ovn-northd-container, description=Red Hat OpenStack Platform 17.1 ovn-northd, build-date=2026-01-12T22:34:06Z, url=https://www.redhat.com, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, summary=Red Hat OpenStack Platform 17.1 ovn-northd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, config_id=ovn_cluster_northd, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, version=17.1.13, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:34:06Z, container_name=ovn_cluster_northd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, maintainer=OpenStack TripleO Team, tcib_managed=true, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-ovn-northd, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, distribution-scope=public, io.buildah.version=1.41.5, batch=17.1_20260112.1) Feb 2 08:20:40 np0005604725 podman[156338]: 2026-02-02 08:20:40.537780488 +0000 UTC m=+0.273408026 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=healthy, maintainer=OpenStack TripleO Team, release=1766032510, url=https://www.redhat.com, container_name=ovn_controller, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, build-date=2026-01-12T22:36:40Z, distribution-scope=public, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-type=git, description=Red Hat OpenStack Platform 17.1 ovn-controller, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, name=rhosp-rhel9/openstack-ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:36:40Z, architecture=x86_64, batch=17.1_20260112.1, managed_by=tripleo_ansible, com.redhat.component=openstack-ovn-controller-container, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, config_id=tripleo_step4, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, summary=Red Hat OpenStack Platform 17.1 ovn-controller) Feb 2 08:20:40 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:20:40 np0005604725 podman[156340]: 2026-02-02 08:20:40.552997555 +0000 UTC m=+0.284883918 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, name=rhosp-rhel9/openstack-swift-container, managed_by=tripleo_ansible, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:50:57Z, vcs-type=git, version=17.1.13, config_id=tripleo_step4, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, container_name=swift_container_server, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-swift-container-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, batch=17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, description=Red Hat OpenStack Platform 17.1 swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, release=1766032510, build-date=2026-01-12T22:50:57Z) Feb 2 08:20:40 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Deactivated successfully. Feb 2 08:20:40 np0005604725 podman[156375]: 2026-02-02 08:20:40.575051273 +0000 UTC m=+0.283224737 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, com.redhat.component=openstack-swift-account-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, name=rhosp-rhel9/openstack-swift-account, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:50:44Z, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_account_server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, batch=17.1_20260112.1, vendor=Red Hat, Inc., version=17.1.13, release=1766032510, build-date=2026-01-12T22:50:44Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, io.openshift.expose-services=) Feb 2 08:20:40 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Deactivated successfully. Feb 2 08:20:40 np0005604725 podman[156387]: 2026-02-02 08:20:40.58601909 +0000 UTC m=+0.287098957 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, io.openshift.expose-services=, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 placement-api, build-date=2026-01-12T22:34:35Z, vendor=Red Hat, Inc., architecture=x86_64, com.redhat.component=openstack-placement-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, name=rhosp-rhel9/openstack-placement-api, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:34:35Z, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 placement-api, batch=17.1_20260112.1, io.buildah.version=1.41.5, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, container_name=placement_api, maintainer=OpenStack TripleO Team, vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:20:40 np0005604725 podman[156341]: 2026-02-02 08:20:40.62861059 +0000 UTC m=+0.347287747 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=healthy, tcib_managed=true, io.buildah.version=1.41.5, container_name=swift_container_replicator, managed_by=tripleo_ansible, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, config_id=tripleo_step4, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, name=rhosp-rhel9/openstack-swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-swift-container-container, version=17.1.13, url=https://www.redhat.com, vendor=Red Hat, Inc., io.openshift.expose-services=, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 swift-container, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:57Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:50:57Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:20:40 np0005604725 podman[156387]: 2026-02-02 08:20:40.644798077 +0000 UTC m=+0.345877933 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, summary=Red Hat OpenStack Platform 17.1 placement-api, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, distribution-scope=public, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, release=1766032510, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:35Z, tcib_managed=true, name=rhosp-rhel9/openstack-placement-api, architecture=x86_64, com.redhat.component=openstack-placement-api-container, io.openshift.expose-services=, io.buildah.version=1.41.5, vendor=Red Hat, Inc., vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 placement-api, version=17.1.13, config_id=tripleo_step4, container_name=placement_api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:35Z, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}) Feb 2 08:20:40 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:20:40 np0005604725 podman[156339]: 2026-02-02 08:20:40.656913819 +0000 UTC m=+0.390936367 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, managed_by=tripleo_ansible, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 memcached, name=rhosp-rhel9/openstack-memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, tcib_managed=true, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, vendor=Red Hat, Inc., container_name=memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, io.openshift.expose-services=, version=17.1.13, architecture=x86_64, com.redhat.component=openstack-memcached-container, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, summary=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:12:26Z, config_id=tripleo_step1) Feb 2 08:20:40 np0005604725 podman[156338]: 2026-02-02 08:20:40.663210603 +0000 UTC m=+0.398838131 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, com.redhat.component=openstack-ovn-controller-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, build-date=2026-01-12T22:36:40Z, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.expose-services=, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, summary=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, managed_by=tripleo_ansible, container_name=ovn_controller, org.opencontainers.image.created=2026-01-12T22:36:40Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., distribution-scope=public, io.buildah.version=1.41.5, release=1766032510, architecture=x86_64, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, vcs-type=git, url=https://www.redhat.com, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-ovn-controller) Feb 2 08:20:40 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Deactivated successfully. Feb 2 08:20:40 np0005604725 podman[156352]: 2026-02-02 08:20:40.520379742 +0000 UTC m=+0.246613461 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=healthy, tcib_managed=true, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, description=Red Hat OpenStack Platform 17.1 swift-account, build-date=2026-01-12T22:50:44Z, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:50:44Z, name=rhosp-rhel9/openstack-swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-account, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, distribution-scope=public, io.buildah.version=1.41.5, release=1766032510, container_name=swift_account_replicator, com.redhat.component=openstack-swift-account-container, io.openshift.expose-services=, url=https://www.redhat.com, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, vcs-type=git, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account) Feb 2 08:20:40 np0005604725 podman[156365]: 2026-02-02 08:20:40.688931294 +0000 UTC m=+0.395617633 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, org.opencontainers.image.created=2026-01-12T22:50:56Z, com.redhat.component=openstack-swift-object-container, tcib_managed=true, distribution-scope=public, batch=17.1_20260112.1, container_name=swift_object_replicator, io.openshift.expose-services=, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-object, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:50:56Z, name=rhosp-rhel9/openstack-swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, managed_by=tripleo_ansible, architecture=x86_64, vendor=Red Hat, Inc., io.buildah.version=1.41.5, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, maintainer=OpenStack TripleO Team) Feb 2 08:20:40 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Deactivated successfully. Feb 2 08:20:40 np0005604725 podman[156339]: 2026-02-02 08:20:40.700730457 +0000 UTC m=+0.434753005 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, batch=17.1_20260112.1, config_id=tripleo_step1, summary=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.buildah.version=1.41.5, container_name=memcached, vendor=Red Hat, Inc., build-date=2026-01-12T22:12:26Z, name=rhosp-rhel9/openstack-memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, vcs-type=git, architecture=x86_64, distribution-scope=public, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:12:26Z, managed_by=tripleo_ansible, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-memcached-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, tcib_managed=true) Feb 2 08:20:40 np0005604725 podman[156352]: 2026-02-02 08:20:40.708938399 +0000 UTC m=+0.435172128 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:50:44Z, container_name=swift_account_replicator, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-account-container, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, architecture=x86_64, maintainer=OpenStack TripleO Team, release=1766032510, vcs-type=git, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true, batch=17.1_20260112.1, build-date=2026-01-12T22:50:44Z, description=Red Hat OpenStack Platform 17.1 swift-account, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, name=rhosp-rhel9/openstack-swift-account, vendor=Red Hat, Inc.) Feb 2 08:20:40 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:20:40 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:20:40 np0005604725 podman[156341]: 2026-02-02 08:20:40.741898181 +0000 UTC m=+0.460575368 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.component=openstack-swift-container-container, name=rhosp-rhel9/openstack-swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, version=17.1.13, url=https://www.redhat.com, container_name=swift_container_replicator, release=1766032510, io.openshift.expose-services=, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:50:57Z, description=Red Hat OpenStack Platform 17.1 swift-container, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:50:57Z, tcib_managed=true, architecture=x86_64, batch=17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, managed_by=tripleo_ansible) Feb 2 08:20:40 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Deactivated successfully. Feb 2 08:20:40 np0005604725 podman[156364]: 2026-02-02 08:20:40.763190606 +0000 UTC m=+0.478291123 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, distribution-scope=public, io.openshift.expose-services=, version=17.1.13, architecture=x86_64, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, container_name=nova_vnc_proxy, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, release=1766032510, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, batch=17.1_20260112.1, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T23:32:22Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, build-date=2026-01-12T23:32:22Z, name=rhosp-rhel9/openstack-nova-novncproxy, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, com.redhat.component=openstack-nova-novncproxy-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:20:40 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Deactivated successfully. Feb 2 08:20:40 np0005604725 podman[156358]: 2026-02-02 08:20:40.853982027 +0000 UTC m=+0.570790606 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=healthy, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:56Z, tcib_managed=true, com.redhat.component=openstack-swift-object-container, url=https://www.redhat.com, distribution-scope=public, architecture=x86_64, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, maintainer=OpenStack TripleO Team, version=17.1.13, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, batch=17.1_20260112.1, managed_by=tripleo_ansible, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, description=Red Hat OpenStack Platform 17.1 swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=swift_object_server) Feb 2 08:20:41 np0005604725 podman[156358]: 2026-02-02 08:20:41.050730796 +0000 UTC m=+0.767539335 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-swift-object, io.openshift.expose-services=, distribution-scope=public, managed_by=tripleo_ansible, tcib_managed=true, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-swift-object-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, batch=17.1_20260112.1, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, summary=Red Hat OpenStack Platform 17.1 swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, url=https://www.redhat.com, version=17.1.13, release=1766032510, build-date=2026-01-12T22:50:56Z, description=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_object_server, architecture=x86_64) Feb 2 08:20:41 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Deactivated successfully. Feb 2 08:20:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:20:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:20:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:20:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:20:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:20:42 np0005604725 podman[156819]: 2026-02-02 08:20:42.371653199 +0000 UTC m=+0.106711631 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=healthy, io.buildah.version=1.41.5, managed_by=tripleo_ansible, distribution-scope=public, build-date=2026-01-12T22:34:42Z, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp-rhel9/openstack-glance-api, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-type=git, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:34:42Z, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, com.redhat.component=openstack-glance-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, container_name=glance_api_cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, maintainer=OpenStack TripleO Team) Feb 2 08:20:42 np0005604725 podman[156822]: 2026-02-02 08:20:42.428718494 +0000 UTC m=+0.144234665 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=healthy, batch=17.1_20260112.1, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:34:42Z, config_id=tripleo_step4, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=glance_api, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, name=rhosp-rhel9/openstack-glance-api, io.openshift.expose-services=, com.redhat.component=openstack-glance-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:34:42Z, url=https://www.redhat.com, vendor=Red Hat, Inc., vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:20:42 np0005604725 podman[156821]: 2026-02-02 08:20:42.330561887 +0000 UTC m=+0.065893377 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, io.openshift.expose-services=, name=rhosp-rhel9/openstack-qdrouterd, architecture=x86_64, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, com.redhat.component=openstack-qdrouterd-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, release=1766032510, vcs-type=git, build-date=2026-01-12T22:10:14Z, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, url=https://www.redhat.com, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, config_id=tripleo_step1, container_name=metrics_qdr, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible) Feb 2 08:20:42 np0005604725 podman[156820]: 2026-02-02 08:20:42.402973492 +0000 UTC m=+0.138223290 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-type=git, url=https://www.redhat.com, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:34:42Z, build-date=2026-01-12T22:34:42Z, summary=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., com.redhat.component=openstack-glance-api-container, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-glance-api, container_name=glance_api_internal, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, tcib_managed=true, config_id=tripleo_step4, architecture=x86_64, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, batch=17.1_20260112.1, release=1766032510, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:20:42 np0005604725 podman[156819]: 2026-02-02 08:20:42.506393591 +0000 UTC m=+0.241452023 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, build-date=2026-01-12T22:34:42Z, io.buildah.version=1.41.5, com.redhat.component=openstack-glance-api-container, org.opencontainers.image.created=2026-01-12T22:34:42Z, version=17.1.13, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, vcs-ref=705339545363fec600102567c4e923938e0f43b3, container_name=glance_api_cron, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, description=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:20:42 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:20:42 np0005604725 podman[156838]: 2026-02-02 08:20:42.52263774 +0000 UTC m=+0.239644936 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=healthy, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, container_name=swift_rsync, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.openshift.expose-services=, vcs-type=git, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, config_id=tripleo_step4, name=rhosp-rhel9/openstack-swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:56Z, build-date=2026-01-12T22:50:56Z, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, vendor=Red Hat, Inc., tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:20:42 np0005604725 podman[156821]: 2026-02-02 08:20:42.538742946 +0000 UTC m=+0.274074416 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, vcs-type=git, name=rhosp-rhel9/openstack-qdrouterd, build-date=2026-01-12T22:10:14Z, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:14Z, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, container_name=metrics_qdr, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, config_id=tripleo_step1, vendor=Red Hat, Inc., io.buildah.version=1.41.5, version=17.1.13, com.redhat.component=openstack-qdrouterd-container, batch=17.1_20260112.1, managed_by=tripleo_ansible, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, summary=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:20:42 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:20:42 np0005604725 podman[156820]: 2026-02-02 08:20:42.574816165 +0000 UTC m=+0.310066013 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, release=1766032510, container_name=glance_api_internal, summary=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., architecture=x86_64, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, name=rhosp-rhel9/openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, build-date=2026-01-12T22:34:42Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-glance-api-container, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, description=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20260112.1) Feb 2 08:20:42 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Deactivated successfully. Feb 2 08:20:42 np0005604725 podman[156822]: 2026-02-02 08:20:42.641769773 +0000 UTC m=+0.357285934 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, io.buildah.version=1.41.5, distribution-scope=public, io.openshift.expose-services=, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, container_name=glance_api, com.redhat.component=openstack-glance-api-container, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, architecture=x86_64, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step4, name=rhosp-rhel9/openstack-glance-api, release=1766032510, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:42Z, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:34:42Z, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:20:42 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Deactivated successfully. Feb 2 08:20:42 np0005604725 podman[156838]: 2026-02-02 08:20:42.877954343 +0000 UTC m=+0.594961559 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, distribution-scope=public, name=rhosp-rhel9/openstack-swift-object, url=https://www.redhat.com, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, summary=Red Hat OpenStack Platform 17.1 swift-object, vcs-type=git, tcib_managed=true, config_id=tripleo_step4, com.redhat.component=openstack-swift-object-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:56Z, version=17.1.13, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_rsync, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, vendor=Red Hat, Inc., vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:56Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, release=1766032510, description=Red Hat OpenStack Platform 17.1 swift-object) Feb 2 08:20:42 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:20:46 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:20:46 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:20:46 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:20:46 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:20:46 np0005604725 podman[157151]: 2026-02-02 08:20:46.34215068 +0000 UTC m=+0.084582622 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=healthy, description=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_metadata, org.opencontainers.image.created=2026-01-12T23:31:50Z, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T23:31:50Z, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, io.openshift.expose-services=, com.redhat.component=openstack-nova-api-container, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, release=1766032510, batch=17.1_20260112.1, url=https://www.redhat.com, tcib_managed=true, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-nova-api, architecture=x86_64, io.buildah.version=1.41.5, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api) Feb 2 08:20:46 np0005604725 systemd[1]: tmp-crun.ClpsCs.mount: Deactivated successfully. Feb 2 08:20:46 np0005604725 podman[157152]: 2026-02-02 08:20:46.404635011 +0000 UTC m=+0.139587483 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, container_name=nova_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, build-date=2026-01-12T23:31:50Z, io.openshift.expose-services=, distribution-scope=public, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.created=2026-01-12T23:31:50Z, name=rhosp-rhel9/openstack-nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, io.buildah.version=1.41.5, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step4, release=1766032510, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team) Feb 2 08:20:46 np0005604725 podman[157151]: 2026-02-02 08:20:46.41794884 +0000 UTC m=+0.160380792 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, version=17.1.13, com.redhat.component=openstack-nova-api-container, container_name=nova_metadata, url=https://www.redhat.com, batch=17.1_20260112.1, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, release=1766032510, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, build-date=2026-01-12T23:31:50Z, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp-rhel9/openstack-nova-api, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public) Feb 2 08:20:46 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:20:46 np0005604725 podman[157150]: 2026-02-02 08:20:46.402406732 +0000 UTC m=+0.144566086 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=healthy, name=rhosp-rhel9/openstack-nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, build-date=2026-01-12T23:31:50Z, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, version=17.1.13, container_name=nova_api_cron, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T23:31:50Z, com.redhat.component=openstack-nova-api-container, architecture=x86_64, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, io.openshift.expose-services=, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:20:46 np0005604725 podman[157152]: 2026-02-02 08:20:46.470853406 +0000 UTC m=+0.205805888 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, tcib_managed=true, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, description=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp-rhel9/openstack-nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, batch=17.1_20260112.1, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, architecture=x86_64, version=17.1.13, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=nova_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, release=1766032510, com.redhat.component=openstack-nova-api-container, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5) Feb 2 08:20:46 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:20:46 np0005604725 podman[157150]: 2026-02-02 08:20:46.486887278 +0000 UTC m=+0.229046662 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, com.redhat.component=openstack-nova-api-container, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, release=1766032510, batch=17.1_20260112.1, io.openshift.expose-services=, name=rhosp-rhel9/openstack-nova-api, distribution-scope=public, architecture=x86_64, org.opencontainers.image.created=2026-01-12T23:31:50Z, url=https://www.redhat.com, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, vcs-type=git, io.buildah.version=1.41.5, config_id=tripleo_step4, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_api_cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true) Feb 2 08:20:46 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:20:46 np0005604725 podman[157153]: 2026-02-02 08:20:46.423384567 +0000 UTC m=+0.154160630 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=healthy, io.openshift.expose-services=, batch=17.1_20260112.1, container_name=swift_proxy, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, config_id=tripleo_step4, com.redhat.component=openstack-swift-proxy-server-container, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vendor=Red Hat, Inc., url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, version=17.1.13, release=1766032510, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:51Z, name=rhosp-rhel9/openstack-swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, build-date=2026-01-12T22:50:51Z, architecture=x86_64, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, tcib_managed=true) Feb 2 08:20:46 np0005604725 podman[157153]: 2026-02-02 08:20:46.603991448 +0000 UTC m=+0.334767581 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, build-date=2026-01-12T22:50:51Z, version=17.1.13, io.openshift.expose-services=, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:51Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-proxy-server-container, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp-rhel9/openstack-swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=swift_proxy, io.buildah.version=1.41.5, managed_by=tripleo_ansible, distribution-scope=public, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, tcib_managed=true) Feb 2 08:20:46 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Deactivated successfully. Feb 2 08:20:47 np0005604725 systemd[1]: tmp-crun.uRQD7k.mount: Deactivated successfully. Feb 2 08:20:53 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:20:53 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:20:53 np0005604725 podman[157503]: 2026-02-02 08:20:53.355335789 +0000 UTC m=+0.098804278 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, managed_by=tripleo_ansible, container_name=horizon, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, batch=17.1_20260112.1, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step3, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, name=rhosp-rhel9/openstack-horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 horizon, build-date=2026-01-12T22:34:41Z, org.opencontainers.image.created=2026-01-12T22:34:41Z, release=1766032510, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-horizon-container, io.openshift.expose-services=) Feb 2 08:20:53 np0005604725 podman[157503]: 2026-02-02 08:20:53.385846627 +0000 UTC m=+0.129315096 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, distribution-scope=public, com.redhat.component=openstack-horizon-container, vendor=Red Hat, Inc., version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:34:41Z, tcib_managed=true, container_name=horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 horizon, config_id=tripleo_step3, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:34:41Z, architecture=x86_64, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, name=rhosp-rhel9/openstack-horizon, release=1766032510, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 horizon, vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:20:53 np0005604725 systemd[1]: tmp-crun.pNlgzl.mount: Deactivated successfully. Feb 2 08:20:53 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:20:53 np0005604725 podman[157501]: 2026-02-02 08:20:53.41032431 +0000 UTC m=+0.153463039 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:15Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 collectd, com.redhat.component=openstack-collectd-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, name=rhosp-rhel9/openstack-collectd, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, distribution-scope=public, io.buildah.version=1.41.5, container_name=collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, batch=17.1_20260112.1, io.openshift.expose-services=, config_id=tripleo_step3, build-date=2026-01-12T22:10:15Z, version=17.1.13, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, release=1766032510, url=https://www.redhat.com, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:20:53 np0005604725 podman[157501]: 2026-02-02 08:20:53.422979348 +0000 UTC m=+0.166118117 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, org.opencontainers.image.created=2026-01-12T22:10:15Z, vendor=Red Hat, Inc., architecture=x86_64, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-collectd-container, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 collectd, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 collectd, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, build-date=2026-01-12T22:10:15Z, config_id=tripleo_step3, release=1766032510, container_name=collectd, vcs-type=git) Feb 2 08:20:53 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:20:56 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:20:56 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:20:56 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:20:56 np0005604725 podman[157728]: 2026-02-02 08:20:56.326692167 +0000 UTC m=+0.071882811 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, summary=Red Hat OpenStack Platform 17.1 iscsid, name=rhosp-rhel9/openstack-iscsid, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.13, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=iscsid, maintainer=OpenStack TripleO Team, architecture=x86_64, config_id=tripleo_step3, com.redhat.component=openstack-iscsid-container, org.opencontainers.image.created=2026-01-12T22:34:43Z, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, release=1766032510, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, managed_by=tripleo_ansible, vcs-type=git, build-date=2026-01-12T22:34:43Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:20:56 np0005604725 podman[157728]: 2026-02-02 08:20:56.370056549 +0000 UTC m=+0.115247243 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-iscsid-container, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 iscsid, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-iscsid, description=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.expose-services=, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, io.buildah.version=1.41.5, tcib_managed=true, managed_by=tripleo_ansible, url=https://www.redhat.com, container_name=iscsid, architecture=x86_64, build-date=2026-01-12T22:34:43Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, vcs-type=git) Feb 2 08:20:56 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:20:56 np0005604725 podman[157727]: 2026-02-02 08:20:56.377798297 +0000 UTC m=+0.121539286 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, vcs-type=git, com.redhat.component=openstack-keystone-container, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20260112.1, container_name=keystone_cron, config_id=tripleo_step3, io.openshift.expose-services=, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 keystone, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, managed_by=tripleo_ansible, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-keystone, tcib_managed=true, url=https://www.redhat.com, build-date=2026-01-12T22:33:53Z, architecture=x86_64, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:20:56 np0005604725 podman[157725]: 2026-02-02 08:20:56.440484034 +0000 UTC m=+0.182547302 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, architecture=x86_64, url=https://www.redhat.com, com.redhat.component=openstack-keystone-container, description=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, batch=17.1_20260112.1, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, vcs-type=git, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, build-date=2026-01-12T22:33:53Z, vendor=Red Hat, Inc., io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:33:53Z, name=rhosp-rhel9/openstack-keystone) Feb 2 08:20:56 np0005604725 podman[157727]: 2026-02-02 08:20:56.457049173 +0000 UTC m=+0.200790132 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone_cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-keystone-container, architecture=x86_64, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:33:53Z, build-date=2026-01-12T22:33:53Z, managed_by=tripleo_ansible, config_id=tripleo_step3, vendor=Red Hat, Inc., version=17.1.13, distribution-scope=public, url=https://www.redhat.com, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vcs-type=git) Feb 2 08:20:56 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:20:56 np0005604725 podman[157725]: 2026-02-02 08:20:56.506548855 +0000 UTC m=+0.248612133 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20260112.1, com.redhat.component=openstack-keystone-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T22:33:53Z, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, name=rhosp-rhel9/openstack-keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, vcs-type=git, managed_by=tripleo_ansible, tcib_managed=true, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, release=1766032510, vendor=Red Hat, Inc., container_name=keystone, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:33:53Z, description=Red Hat OpenStack Platform 17.1 keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:20:56 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:21:03 np0005604725 podman[158164]: 2026-02-02 08:21:03.117863272 +0000 UTC m=+0.091297558 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, name=rhosp-rhel9/openstack-mariadb, tcib_managed=true, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., architecture=x86_64, description=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, version=17.1.13, build-date=2026-01-12T22:10:18Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, com.redhat.component=openstack-mariadb-container, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:21:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:21:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:21:03 np0005604725 podman[158164]: 2026-02-02 08:21:03.151999591 +0000 UTC m=+0.125433957 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, tcib_managed=true, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:10:18Z, org.opencontainers.image.created=2026-01-12T22:10:18Z, release=1766032510, architecture=x86_64, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.component=openstack-mariadb-container, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, vendor=Red Hat, Inc., distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:21:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:21:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:21:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:21:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:21:03 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:21:03 np0005604725 systemd[1]: tmp-crun.rcZURa.mount: Deactivated successfully. Feb 2 08:21:03 np0005604725 podman[158193]: 2026-02-02 08:21:03.325910927 +0000 UTC m=+0.163670641 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=healthy, name=rhosp-rhel9/openstack-cinder-scheduler, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, vcs-type=git, architecture=x86_64, maintainer=OpenStack TripleO Team, container_name=cinder_scheduler, build-date=2026-01-12T22:58:47Z, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., tcib_managed=true, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:58:47Z, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.buildah.version=1.41.5, batch=17.1_20260112.1, com.redhat.component=openstack-cinder-scheduler-container, distribution-scope=public, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:21:03 np0005604725 podman[158189]: 2026-02-02 08:21:03.290497909 +0000 UTC m=+0.130684548 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, io.openshift.expose-services=, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-type=git, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, org.opencontainers.image.created=2026-01-12T22:53:19Z, summary=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-heat-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, version=17.1.13, architecture=x86_64, tcib_managed=true, distribution-scope=public, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, build-date=2026-01-12T22:53:19Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, maintainer=OpenStack TripleO Team, container_name=heat_api_cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, name=rhosp-rhel9/openstack-heat-api) Feb 2 08:21:03 np0005604725 podman[158183]: 2026-02-02 08:21:03.368250989 +0000 UTC m=+0.216205157 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, org.opencontainers.image.created=2026-01-12T23:07:24Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, com.redhat.component=openstack-ceilometer-central-container, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, vcs-type=git, io.buildah.version=1.41.5, vendor=Red Hat, Inc., build-date=2026-01-12T23:07:24Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, container_name=ceilometer_agent_central, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 ceilometer-central, url=https://www.redhat.com, version=17.1.13, managed_by=tripleo_ansible, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-ceilometer-central, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central) Feb 2 08:21:03 np0005604725 podman[158193]: 2026-02-02 08:21:03.395086934 +0000 UTC m=+0.232846688 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, distribution-scope=public, container_name=cinder_scheduler, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, com.redhat.component=openstack-cinder-scheduler-container, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, architecture=x86_64, version=17.1.13, tcib_managed=true, managed_by=tripleo_ansible, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, org.opencontainers.image.created=2026-01-12T22:58:47Z, config_id=tripleo_step4, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, vcs-type=git, name=rhosp-rhel9/openstack-cinder-scheduler, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, build-date=2026-01-12T22:58:47Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc.) Feb 2 08:21:03 np0005604725 podman[158183]: 2026-02-02 08:21:03.412794228 +0000 UTC m=+0.260748416 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, build-date=2026-01-12T23:07:24Z, container_name=ceilometer_agent_central, tcib_managed=true, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, distribution-scope=public, org.opencontainers.image.created=2026-01-12T23:07:24Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, name=rhosp-rhel9/openstack-ceilometer-central, version=17.1.13, io.openshift.expose-services=, batch=17.1_20260112.1, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, config_id=tripleo_step4, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, managed_by=tripleo_ansible, com.redhat.component=openstack-ceilometer-central-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, url=https://www.redhat.com) Feb 2 08:21:03 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:21:03 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:21:03 np0005604725 podman[158196]: 2026-02-02 08:21:03.420435853 +0000 UTC m=+0.248993625 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-heat-engine, io.buildah.version=1.41.5, config_id=tripleo_step4, vcs-type=git, version=17.1.13, build-date=2026-01-12T22:53:38Z, release=1766032510, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 heat-engine, vcs-ref=755001522886c265e88561b4997cab642504a845, org.opencontainers.image.created=2026-01-12T22:53:38Z, container_name=heat_engine, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, summary=Red Hat OpenStack Platform 17.1 heat-engine, url=https://www.redhat.com, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, com.redhat.component=openstack-heat-engine-container) Feb 2 08:21:03 np0005604725 podman[158210]: 2026-02-02 08:21:03.494540941 +0000 UTC m=+0.316336515 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, build-date=2026-01-12T22:10:18Z, container_name=clustercheck, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20260112.1, vcs-type=git, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step2, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:18Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-mariadb-container, tcib_managed=true, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, name=rhosp-rhel9/openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, architecture=x86_64) Feb 2 08:21:03 np0005604725 podman[158189]: 2026-02-02 08:21:03.525845504 +0000 UTC m=+0.366032173 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, version=17.1.13, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, name=rhosp-rhel9/openstack-heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, container_name=heat_api_cron, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, vcs-ref=755001522886c265e88561b4997cab642504a845, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:53:19Z, io.buildah.version=1.41.5, url=https://www.redhat.com, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, distribution-scope=public, batch=17.1_20260112.1, com.redhat.component=openstack-heat-api-container, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:53:19Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api) Feb 2 08:21:03 np0005604725 podman[158218]: 2026-02-02 08:21:03.53776306 +0000 UTC m=+0.356518520 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=healthy, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, container_name=ceilometer_agent_notification, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, url=https://www.redhat.com, distribution-scope=public, com.redhat.component=openstack-ceilometer-notification-container, architecture=x86_64, name=rhosp-rhel9/openstack-ceilometer-notification, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, build-date=2026-01-12T23:07:25Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T23:07:25Z, release=1766032510, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.openshift.expose-services=, config_id=tripleo_step4, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06) Feb 2 08:21:03 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:21:03 np0005604725 podman[158196]: 2026-02-02 08:21:03.552778811 +0000 UTC m=+0.381336603 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, com.redhat.component=openstack-heat-engine-container, release=1766032510, vendor=Red Hat, Inc., io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:53:38Z, build-date=2026-01-12T22:53:38Z, distribution-scope=public, config_id=tripleo_step4, managed_by=tripleo_ansible, io.openshift.expose-services=, version=17.1.13, vcs-ref=755001522886c265e88561b4997cab642504a845, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-heat-engine, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, summary=Red Hat OpenStack Platform 17.1 heat-engine, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, vcs-type=git, description=Red Hat OpenStack Platform 17.1 heat-engine, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, tcib_managed=true, container_name=heat_engine, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:21:03 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:21:03 np0005604725 podman[158210]: 2026-02-02 08:21:03.567025869 +0000 UTC m=+0.388821383 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, build-date=2026-01-12T22:10:18Z, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, architecture=x86_64, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:18Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step2, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-mariadb, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, container_name=clustercheck, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, url=https://www.redhat.com, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:21:03 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:21:03 np0005604725 podman[158218]: 2026-02-02 08:21:03.59504029 +0000 UTC m=+0.413795750 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, org.opencontainers.image.created=2026-01-12T23:07:25Z, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=ceilometer_agent_notification, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-ceilometer-notification-container, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, name=rhosp-rhel9/openstack-ceilometer-notification, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, distribution-scope=public, tcib_managed=true, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, vendor=Red Hat, Inc., version=17.1.13, vcs-type=git, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, maintainer=OpenStack TripleO Team, architecture=x86_64, build-date=2026-01-12T23:07:25Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification) Feb 2 08:21:03 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:21:03 np0005604725 podman[158211]: 2026-02-02 08:21:03.624151295 +0000 UTC m=+0.443437062 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, vcs-type=git, io.buildah.version=1.41.5, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, architecture=x86_64, com.redhat.component=openstack-cinder-api-container, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, url=https://www.redhat.com, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:58:44Z, org.opencontainers.image.created=2026-01-12T22:58:44Z, tcib_managed=true, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, config_id=tripleo_step4, batch=17.1_20260112.1, version=17.1.13, container_name=cinder_api_cron, description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api) Feb 2 08:21:03 np0005604725 podman[158387]: 2026-02-02 08:21:03.662908066 +0000 UTC m=+0.058953493 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, maintainer=OpenStack TripleO Team, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, name=rhosp-rhel9/openstack-redis, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, io.openshift.expose-services=, tcib_managed=true, batch=17.1_20260112.1, com.redhat.component=openstack-redis-container, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, description=Red Hat OpenStack Platform 17.1 redis, org.opencontainers.image.created=2026-01-12T22:10:16Z, summary=Red Hat OpenStack Platform 17.1 redis, build-date=2026-01-12T22:10:16Z, vcs-type=git, distribution-scope=public, vendor=Red Hat, Inc.) Feb 2 08:21:03 np0005604725 podman[158211]: 2026-02-02 08:21:03.68546315 +0000 UTC m=+0.504748927 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, batch=17.1_20260112.1, architecture=x86_64, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-cinder-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, version=17.1.13, build-date=2026-01-12T22:58:44Z, io.openshift.expose-services=, tcib_managed=true, vendor=Red Hat, Inc., org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, description=Red Hat OpenStack Platform 17.1 cinder-api, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, url=https://www.redhat.com, container_name=cinder_api_cron, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-cinder-api, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:58:44Z, release=1766032510, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api) Feb 2 08:21:03 np0005604725 podman[158398]: 2026-02-02 08:21:03.687159662 +0000 UTC m=+0.066122633 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, name=rhosp-rhel9/openstack-haproxy, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.expose-services=, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 haproxy, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, batch=17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, vcs-type=git, vendor=Red Hat, Inc., com.redhat.component=openstack-haproxy-container, build-date=2026-01-12T22:10:12Z, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 haproxy) Feb 2 08:21:03 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:21:03 np0005604725 podman[158429]: 2026-02-02 08:21:03.747777566 +0000 UTC m=+0.075411260 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, summary=Red Hat OpenStack Platform 17.1 redis, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:16Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:16Z, version=17.1.13, vcs-type=git, release=1766032510, architecture=x86_64, batch=17.1_20260112.1, tcib_managed=true, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-redis-container, description=Red Hat OpenStack Platform 17.1 redis, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, name=rhosp-rhel9/openstack-redis) Feb 2 08:21:03 np0005604725 podman[158444]: 2026-02-02 08:21:03.781859363 +0000 UTC m=+0.080212037 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, name=rhosp-rhel9/openstack-haproxy, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, tcib_managed=true, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, version=17.1.13, vcs-type=git, io.buildah.version=1.41.5, io.openshift.expose-services=, architecture=x86_64, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, build-date=2026-01-12T22:10:12Z, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy) Feb 2 08:21:03 np0005604725 podman[158398]: 2026-02-02 08:21:03.784961408 +0000 UTC m=+0.163924399 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:12Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, org.opencontainers.image.created=2026-01-12T22:10:12Z, io.openshift.expose-services=, io.buildah.version=1.41.5, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, maintainer=OpenStack TripleO Team, architecture=x86_64, com.redhat.component=openstack-haproxy-container, vendor=Red Hat, Inc., vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, version=17.1.13, release=1766032510, summary=Red Hat OpenStack Platform 17.1 haproxy, name=rhosp-rhel9/openstack-haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 haproxy, url=https://www.redhat.com, batch=17.1_20260112.1) Feb 2 08:21:03 np0005604725 sshd[158460]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:21:03 np0005604725 podman[158387]: 2026-02-02 08:21:03.800978441 +0000 UTC m=+0.197023838 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, summary=Red Hat OpenStack Platform 17.1 redis, description=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-redis, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:10:16Z, distribution-scope=public, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, com.redhat.component=openstack-redis-container, io.buildah.version=1.41.5, vendor=Red Hat, Inc., architecture=x86_64, tcib_managed=true, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:16Z, batch=17.1_20260112.1, url=https://www.redhat.com, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee) Feb 2 08:21:03 np0005604725 podman[158473]: 2026-02-02 08:21:03.958659428 +0000 UTC m=+0.070974613 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:14Z, com.redhat.component=openstack-rabbitmq-container, tcib_managed=true, vendor=Red Hat, Inc., vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20260112.1, architecture=x86_64, release=1766032510, name=rhosp-rhel9/openstack-rabbitmq, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:21:03 np0005604725 podman[158473]: 2026-02-02 08:21:03.966888251 +0000 UTC m=+0.079203456 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, build-date=2026-01-12T22:10:14Z, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-rabbitmq-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, distribution-scope=public, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, release=1766032510, description=Red Hat OpenStack Platform 17.1 rabbitmq, version=17.1.13, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, architecture=x86_64, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:14Z, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq) Feb 2 08:21:04 np0005604725 systemd-logind[36465]: New session 22 of user zuul. Feb 2 08:21:04 np0005604725 systemd[1]: Started Session 22 of User zuul. Feb 2 08:21:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:21:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:21:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:21:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:21:04 np0005604725 podman[158591]: 2026-02-02 08:21:04.668574689 +0000 UTC m=+0.099429167 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:54:02Z, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, url=https://www.redhat.com, name=rhosp-rhel9/openstack-heat-api-cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, com.redhat.component=openstack-heat-api-cfn-container, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, io.openshift.expose-services=, batch=17.1_20260112.1, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=heat_api_cfn, tcib_managed=true, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-ref=755001522886c265e88561b4997cab642504a845, vendor=Red Hat, Inc., vcs-type=git, org.opencontainers.image.created=2026-01-12T22:54:02Z, managed_by=tripleo_ansible) Feb 2 08:21:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:21:04 np0005604725 podman[158621]: 2026-02-02 08:21:04.769847053 +0000 UTC m=+0.093761913 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=healthy, vcs-type=git, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, url=https://www.redhat.com, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 manila-scheduler, config_id=tripleo_step4, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:52:54Z, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, container_name=manila_scheduler, build-date=2026-01-12T22:52:54Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, managed_by=tripleo_ansible, tcib_managed=true, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, com.redhat.component=openstack-manila-scheduler-container, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, name=rhosp-rhel9/openstack-manila-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}) Feb 2 08:21:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:21:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:21:04 np0005604725 python3[158588]: ansible-ansible.legacy.dnf Invoked with name=['systemd-container'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 08:21:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:21:04 np0005604725 podman[158591]: 2026-02-02 08:21:04.835742808 +0000 UTC m=+0.266597256 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, vcs-ref=755001522886c265e88561b4997cab642504a845, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:54:02Z, vendor=Red Hat, Inc., org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, distribution-scope=public, release=1766032510, vcs-type=git, version=17.1.13, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, build-date=2026-01-12T22:54:02Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-heat-api-cfn-container, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, container_name=heat_api_cfn, name=rhosp-rhel9/openstack-heat-api-cfn, batch=17.1_20260112.1, io.buildah.version=1.41.5, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}) Feb 2 08:21:04 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:21:04 np0005604725 podman[158659]: 2026-02-02 08:21:04.882733333 +0000 UTC m=+0.104930697 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-neutron-server, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 neutron-server, vcs-type=git, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, tcib_managed=true, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, build-date=2026-01-12T22:57:35Z, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, container_name=neutron_api, maintainer=OpenStack TripleO Team, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, url=https://www.redhat.com, com.redhat.component=openstack-neutron-server-container, io.openshift.expose-services=, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:57:35Z, managed_by=tripleo_ansible) Feb 2 08:21:04 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:21:04 np0005604725 podman[158621]: 2026-02-02 08:21:04.901902402 +0000 UTC m=+0.225817262 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, container_name=manila_scheduler, distribution-scope=public, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, com.redhat.component=openstack-manila-scheduler-container, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, managed_by=tripleo_ansible, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, release=1766032510, build-date=2026-01-12T22:52:54Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, architecture=x86_64, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-manila-scheduler, config_id=tripleo_step4, batch=17.1_20260112.1, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:52:54Z, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 manila-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git) Feb 2 08:21:04 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:21:04 np0005604725 podman[158619]: 2026-02-02 08:21:04.918165903 +0000 UTC m=+0.248353706 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, org.opencontainers.image.created=2026-01-12T22:53:19Z, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, vcs-type=git, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-heat-api-container, tcib_managed=true, release=1766032510, distribution-scope=public, batch=17.1_20260112.1, config_id=tripleo_step4, managed_by=tripleo_ansible, io.buildah.version=1.41.5, container_name=heat_api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:53:19Z, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp-rhel9/openstack-heat-api) Feb 2 08:21:04 np0005604725 podman[158587]: 2026-02-02 08:21:04.837709359 +0000 UTC m=+0.270169886 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=healthy, container_name=manila_api_cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, build-date=2026-01-12T22:52:22Z, summary=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.component=openstack-manila-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, release=1766032510, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, version=17.1.13, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, name=rhosp-rhel9/openstack-manila-api, vcs-type=git, managed_by=tripleo_ansible, tcib_managed=true, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:52:22Z) Feb 2 08:21:04 np0005604725 podman[158658]: 2026-02-02 08:21:04.989598548 +0000 UTC m=+0.209382008 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, com.redhat.component=openstack-cron-container, distribution-scope=public, container_name=logrotate_crond, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, config_id=tripleo_step4, version=17.1.13, io.openshift.expose-services=, batch=17.1_20260112.1, io.buildah.version=1.41.5, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 cron, build-date=2026-01-12T22:10:15Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, org.opencontainers.image.created=2026-01-12T22:10:15Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, url=https://www.redhat.com, name=rhosp-rhel9/openstack-cron, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 cron) Feb 2 08:21:05 np0005604725 podman[158587]: 2026-02-02 08:21:05.01764431 +0000 UTC m=+0.450104867 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, description=Red Hat OpenStack Platform 17.1 manila-api, vendor=Red Hat, Inc., architecture=x86_64, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, tcib_managed=true, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, io.openshift.expose-services=, release=1766032510, summary=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.component=openstack-manila-api-container, managed_by=tripleo_ansible, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:52:22Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, container_name=manila_api_cron, name=rhosp-rhel9/openstack-manila-api, vcs-type=git, build-date=2026-01-12T22:52:22Z, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public) Feb 2 08:21:05 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:21:05 np0005604725 podman[158659]: 2026-02-02 08:21:05.062260202 +0000 UTC m=+0.284457566 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 neutron-server, summary=Red Hat OpenStack Platform 17.1 neutron-server, architecture=x86_64, build-date=2026-01-12T22:57:35Z, com.redhat.component=openstack-neutron-server-container, org.opencontainers.image.created=2026-01-12T22:57:35Z, vcs-type=git, io.openshift.expose-services=, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, name=rhosp-rhel9/openstack-neutron-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.buildah.version=1.41.5, container_name=neutron_api, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, tcib_managed=true, release=1766032510, url=https://www.redhat.com) Feb 2 08:21:05 np0005604725 podman[158658]: 2026-02-02 08:21:05.069757792 +0000 UTC m=+0.289541122 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, container_name=logrotate_crond, summary=Red Hat OpenStack Platform 17.1 cron, io.openshift.expose-services=, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, release=1766032510, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 cron, io.buildah.version=1.41.5, build-date=2026-01-12T22:10:15Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:10:15Z, name=rhosp-rhel9/openstack-cron, batch=17.1_20260112.1, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, version=17.1.13, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-cron-container) Feb 2 08:21:05 np0005604725 podman[158619]: 2026-02-02 08:21:05.070067072 +0000 UTC m=+0.400254955 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, vendor=Red Hat, Inc., io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, release=1766032510, summary=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 heat-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:53:19Z, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, architecture=x86_64, config_id=tripleo_step4, container_name=heat_api, name=rhosp-rhel9/openstack-heat-api, com.redhat.component=openstack-heat-api-container, distribution-scope=public, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:21:05 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:21:05 np0005604725 podman[158711]: 2026-02-02 08:21:05.082577986 +0000 UTC m=+0.221657595 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, url=https://www.redhat.com, com.redhat.component=openstack-cinder-api-container, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:58:44Z, container_name=cinder_api, architecture=x86_64, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, maintainer=OpenStack TripleO Team, tcib_managed=true, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:58:44Z, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, batch=17.1_20260112.1) Feb 2 08:21:05 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:21:05 np0005604725 systemd[1]: tmp-crun.o2pzqI.mount: Deactivated successfully. Feb 2 08:21:05 np0005604725 podman[158687]: 2026-02-02 08:21:05.163977278 +0000 UTC m=+0.330237802 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, managed_by=tripleo_ansible, url=https://www.redhat.com, com.redhat.component=openstack-nova-scheduler-container, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, architecture=x86_64, maintainer=OpenStack TripleO Team, build-date=2026-01-12T23:32:05Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:32:05Z, description=Red Hat OpenStack Platform 17.1 nova-scheduler, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, batch=17.1_20260112.1, distribution-scope=public, release=1766032510, config_id=tripleo_step4, container_name=nova_scheduler, name=rhosp-rhel9/openstack-nova-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, version=17.1.13, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, io.openshift.expose-services=, io.buildah.version=1.41.5) Feb 2 08:21:05 np0005604725 podman[158687]: 2026-02-02 08:21:05.191138523 +0000 UTC m=+0.357398997 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, build-date=2026-01-12T23:32:05Z, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, com.redhat.component=openstack-nova-scheduler-container, batch=17.1_20260112.1, architecture=x86_64, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-nova-scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, version=17.1.13, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.created=2026-01-12T23:32:05Z, description=Red Hat OpenStack Platform 17.1 nova-scheduler, io.openshift.expose-services=, io.buildah.version=1.41.5, managed_by=tripleo_ansible, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., container_name=nova_scheduler, maintainer=OpenStack TripleO Team, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public) Feb 2 08:21:05 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:21:05 np0005604725 podman[158711]: 2026-02-02 08:21:05.196978613 +0000 UTC m=+0.336058212 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, com.redhat.component=openstack-cinder-api-container, summary=Red Hat OpenStack Platform 17.1 cinder-api, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, architecture=x86_64, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 cinder-api, batch=17.1_20260112.1, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=cinder_api, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, build-date=2026-01-12T22:58:44Z, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:58:44Z, url=https://www.redhat.com) Feb 2 08:21:05 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:21:05 np0005604725 sshd[158807]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:21:05 np0005604725 podman[158662]: 2026-02-02 08:21:05.130615132 +0000 UTC m=+0.346420969 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, name=rhosp-rhel9/openstack-nova-conductor, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, version=17.1.13, build-date=2026-01-12T23:32:18Z, config_id=tripleo_step4, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, release=1766032510, container_name=nova_conductor, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T23:32:18Z, maintainer=OpenStack TripleO Team, distribution-scope=public, io.buildah.version=1.41.5, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-conductor, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 nova-conductor, tcib_managed=true, com.redhat.component=openstack-nova-conductor-container) Feb 2 08:21:05 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:21:05 np0005604725 podman[158662]: 2026-02-02 08:21:05.260498705 +0000 UTC m=+0.476304582 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, container_name=nova_conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, summary=Red Hat OpenStack Platform 17.1 nova-conductor, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 nova-conductor, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, tcib_managed=true, distribution-scope=public, io.buildah.version=1.41.5, build-date=2026-01-12T23:32:18Z, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:32:18Z, io.openshift.expose-services=, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, name=rhosp-rhel9/openstack-nova-conductor, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-nova-conductor-container, config_id=tripleo_step4) Feb 2 08:21:05 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:21:09 np0005604725 dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Feb 2 08:21:09 np0005604725 dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Feb 2 08:21:09 np0005604725 dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Feb 2 08:21:09 np0005604725 systemd[1]: Reexecuting. Feb 2 08:21:09 np0005604725 systemd[1]: systemd 252-14.el9_2.8 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 2 08:21:09 np0005604725 systemd[1]: Detected virtualization kvm. Feb 2 08:21:09 np0005604725 systemd[1]: Detected architecture x86-64. Feb 2 08:21:09 np0005604725 systemd-sysv-generator[159056]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:21:09 np0005604725 systemd-rc-local-generator[159050]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:21:09 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:21:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:21:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:21:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:21:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:21:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:21:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:21:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:21:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:21:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:21:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:21:11 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:21:11 np0005604725 systemd[1]: tmp-crun.Amieaj.mount: Deactivated successfully. Feb 2 08:21:11 np0005604725 podman[159315]: 2026-02-02 08:21:11.416348081 +0000 UTC m=+0.118090701 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, io.openshift.expose-services=, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, summary=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, config_id=tripleo_step4, tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:50:44Z, name=rhosp-rhel9/openstack-swift-account, com.redhat.component=openstack-swift-account-container, container_name=swift_account_server, version=17.1.13, distribution-scope=public, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, architecture=x86_64, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account) Feb 2 08:21:11 np0005604725 podman[159287]: 2026-02-02 08:21:11.458101955 +0000 UTC m=+0.182679117 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=healthy, com.redhat.component=openstack-swift-account-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true, name=rhosp-rhel9/openstack-swift-account, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, version=17.1.13, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, managed_by=tripleo_ansible, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:50:44Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, distribution-scope=public, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-account, container_name=swift_account_replicator, io.openshift.expose-services=, architecture=x86_64, build-date=2026-01-12T22:50:44Z, release=1766032510, url=https://www.redhat.com, io.buildah.version=1.41.5, batch=17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:21:11 np0005604725 podman[159327]: 2026-02-02 08:21:11.497409183 +0000 UTC m=+0.186366039 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=healthy, org.opencontainers.image.created=2026-01-12T22:34:35Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, container_name=placement_api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, config_id=tripleo_step4, distribution-scope=public, com.redhat.component=openstack-placement-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-placement-api, io.openshift.expose-services=, release=1766032510, io.buildah.version=1.41.5, url=https://www.redhat.com, build-date=2026-01-12T22:34:35Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api) Feb 2 08:21:11 np0005604725 podman[159283]: 2026-02-02 08:21:11.560530174 +0000 UTC m=+0.287777108 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=healthy, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, distribution-scope=public, url=https://www.redhat.com, build-date=2026-01-12T22:36:40Z, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=ovn_controller, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, org.opencontainers.image.created=2026-01-12T22:36:40Z, io.openshift.expose-services=, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 ovn-controller, architecture=x86_64, name=rhosp-rhel9/openstack-ovn-controller, vendor=Red Hat, Inc., tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, config_id=tripleo_step4, com.redhat.component=openstack-ovn-controller-container, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c) Feb 2 08:21:11 np0005604725 podman[159287]: 2026-02-02 08:21:11.603864185 +0000 UTC m=+0.328441327 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, io.buildah.version=1.41.5, tcib_managed=true, container_name=swift_account_replicator, org.opencontainers.image.created=2026-01-12T22:50:44Z, vendor=Red Hat, Inc., distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-swift-account-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, build-date=2026-01-12T22:50:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, name=rhosp-rhel9/openstack-swift-account, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, summary=Red Hat OpenStack Platform 17.1 swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible) Feb 2 08:21:11 np0005604725 podman[159327]: 2026-02-02 08:21:11.61248738 +0000 UTC m=+0.301444256 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, name=rhosp-rhel9/openstack-placement-api, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, build-date=2026-01-12T22:34:35Z, managed_by=tripleo_ansible, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.component=openstack-placement-api-container, container_name=placement_api, io.buildah.version=1.41.5, architecture=x86_64, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:34:35Z, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, version=17.1.13) Feb 2 08:21:11 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:21:11 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:21:11 np0005604725 podman[159284]: 2026-02-02 08:21:11.65053716 +0000 UTC m=+0.376163163 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, io.openshift.expose-services=, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, release=1766032510, org.opencontainers.image.created=2026-01-12T22:12:26Z, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, url=https://www.redhat.com, version=17.1.13, architecture=x86_64, batch=17.1_20260112.1, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:12:26Z, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=memcached, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, distribution-scope=public, vendor=Red Hat, Inc., com.redhat.component=openstack-memcached-container, vcs-type=git, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, name=rhosp-rhel9/openstack-memcached, summary=Red Hat OpenStack Platform 17.1 memcached) Feb 2 08:21:11 np0005604725 podman[159283]: 2026-02-02 08:21:11.663357044 +0000 UTC m=+0.390603978 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, com.redhat.component=openstack-ovn-controller-container, release=1766032510, distribution-scope=public, config_id=tripleo_step4, vcs-type=git, name=rhosp-rhel9/openstack-ovn-controller, vendor=Red Hat, Inc., version=17.1.13, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, summary=Red Hat OpenStack Platform 17.1 ovn-controller, build-date=2026-01-12T22:36:40Z, url=https://www.redhat.com, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, io.buildah.version=1.41.5, io.openshift.expose-services=, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:36:40Z, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, managed_by=tripleo_ansible, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=ovn_controller, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}) Feb 2 08:21:11 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Deactivated successfully. Feb 2 08:21:11 np0005604725 podman[159322]: 2026-02-02 08:21:11.471187487 +0000 UTC m=+0.173249617 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:34:06Z, description=Red Hat OpenStack Platform 17.1 ovn-northd, summary=Red Hat OpenStack Platform 17.1 ovn-northd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, container_name=ovn_cluster_northd, vcs-type=git, io.openshift.expose-services=, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=ovn_cluster_northd, maintainer=OpenStack TripleO Team, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-ovn-northd, io.buildah.version=1.41.5, url=https://www.redhat.com, com.redhat.component=openstack-ovn-northd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, architecture=x86_64, build-date=2026-01-12T22:34:06Z, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, version=17.1.13, distribution-scope=public) Feb 2 08:21:11 np0005604725 podman[159285]: 2026-02-02 08:21:11.603608698 +0000 UTC m=+0.333380109 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=healthy, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, container_name=swift_container_server, vcs-type=git, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.component=openstack-swift-container-container, build-date=2026-01-12T22:50:57Z, url=https://www.redhat.com, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, version=17.1.13, io.openshift.expose-services=, tcib_managed=true, managed_by=tripleo_ansible, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, name=rhosp-rhel9/openstack-swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, maintainer=OpenStack TripleO Team, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4) Feb 2 08:21:11 np0005604725 podman[159322]: 2026-02-02 08:21:11.709853873 +0000 UTC m=+0.411915993 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, build-date=2026-01-12T22:34:06Z, com.redhat.component=openstack-ovn-northd-container, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, summary=Red Hat OpenStack Platform 17.1 ovn-northd, architecture=x86_64, distribution-scope=public, url=https://www.redhat.com, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, maintainer=OpenStack TripleO Team, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-ovn-northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:34:06Z, io.openshift.expose-services=, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, config_id=ovn_cluster_northd, container_name=ovn_cluster_northd, description=Red Hat OpenStack Platform 17.1 ovn-northd, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, io.buildah.version=1.41.5, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c) Feb 2 08:21:11 np0005604725 podman[159284]: 2026-02-02 08:21:11.719837581 +0000 UTC m=+0.445463574 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, name=rhosp-rhel9/openstack-memcached, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public, batch=17.1_20260112.1, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:12:26Z, architecture=x86_64, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, com.redhat.component=openstack-memcached-container, vcs-type=git, config_id=tripleo_step1, tcib_managed=true, container_name=memcached, version=17.1.13) Feb 2 08:21:11 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:21:11 np0005604725 podman[159305]: 2026-02-02 08:21:11.725403762 +0000 UTC m=+0.422069346 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=healthy, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, build-date=2026-01-12T23:32:22Z, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, tcib_managed=true, config_id=tripleo_step4, container_name=nova_vnc_proxy, vcs-type=git, release=1766032510, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, name=rhosp-rhel9/openstack-nova-novncproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-nova-novncproxy-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, io.openshift.expose-services=, version=17.1.13, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1) Feb 2 08:21:11 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:21:11 np0005604725 podman[159311]: 2026-02-02 08:21:11.767084352 +0000 UTC m=+0.476125037 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=healthy, io.openshift.expose-services=, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, url=https://www.redhat.com, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:50:56Z, managed_by=tripleo_ansible, version=17.1.13, architecture=x86_64, name=rhosp-rhel9/openstack-swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, batch=17.1_20260112.1, container_name=swift_object_replicator, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, description=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:50:56Z) Feb 2 08:21:11 np0005604725 podman[159289]: 2026-02-02 08:21:11.822756614 +0000 UTC m=+0.525903806 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=healthy, managed_by=tripleo_ansible, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, distribution-scope=public, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:56Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_object_server, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, com.redhat.component=openstack-swift-object-container, description=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, name=rhosp-rhel9/openstack-swift-object, vcs-type=git, tcib_managed=true, config_id=tripleo_step4, build-date=2026-01-12T22:50:56Z, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, url=https://www.redhat.com) Feb 2 08:21:11 np0005604725 podman[159285]: 2026-02-02 08:21:11.831925246 +0000 UTC m=+0.561696657 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, summary=Red Hat OpenStack Platform 17.1 swift-container, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-swift-container, distribution-scope=public, container_name=swift_container_server, tcib_managed=true, batch=17.1_20260112.1, vcs-type=git, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:50:57Z, io.openshift.expose-services=, build-date=2026-01-12T22:50:57Z, managed_by=tripleo_ansible, config_id=tripleo_step4, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-container, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.component=openstack-swift-container-container, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container) Feb 2 08:21:11 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Deactivated successfully. Feb 2 08:21:11 np0005604725 podman[159315]: 2026-02-02 08:21:11.874075092 +0000 UTC m=+0.575817772 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, name=rhosp-rhel9/openstack-swift-account, release=1766032510, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.buildah.version=1.41.5, config_id=tripleo_step4, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-account-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:50:44Z, container_name=swift_account_server, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, url=https://www.redhat.com, distribution-scope=public, batch=17.1_20260112.1) Feb 2 08:21:11 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Deactivated successfully. Feb 2 08:21:11 np0005604725 podman[159286]: 2026-02-02 08:21:11.918196767 +0000 UTC m=+0.637250149 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, name=rhosp-rhel9/openstack-swift-container, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:50:57Z, summary=Red Hat OpenStack Platform 17.1 swift-container, managed_by=tripleo_ansible, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, build-date=2026-01-12T22:50:57Z, architecture=x86_64, container_name=swift_container_replicator, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., version=17.1.13, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, io.openshift.expose-services=, distribution-scope=public, com.redhat.component=openstack-swift-container-container, maintainer=OpenStack TripleO Team, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:21:11 np0005604725 podman[159311]: 2026-02-02 08:21:11.939179633 +0000 UTC m=+0.648220338 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, build-date=2026-01-12T22:50:56Z, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_object_replicator, name=rhosp-rhel9/openstack-swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, release=1766032510, com.redhat.component=openstack-swift-object-container, version=17.1.13, description=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, io.openshift.expose-services=, distribution-scope=public, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1) Feb 2 08:21:11 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Deactivated successfully. Feb 2 08:21:11 np0005604725 podman[159286]: 2026-02-02 08:21:11.989647044 +0000 UTC m=+0.708700456 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-container, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, version=17.1.13, config_id=tripleo_step4, build-date=2026-01-12T22:50:57Z, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.buildah.version=1.41.5, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, distribution-scope=public, com.redhat.component=openstack-swift-container-container, container_name=swift_container_replicator) Feb 2 08:21:12 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Deactivated successfully. Feb 2 08:21:12 np0005604725 podman[159289]: 2026-02-02 08:21:12.045889013 +0000 UTC m=+0.749036205 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, architecture=x86_64, batch=17.1_20260112.1, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, io.openshift.expose-services=, build-date=2026-01-12T22:50:56Z, summary=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:56Z, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, vendor=Red Hat, Inc., container_name=swift_object_server, maintainer=OpenStack TripleO Team, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 swift-object, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, distribution-scope=public, com.redhat.component=openstack-swift-object-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, name=rhosp-rhel9/openstack-swift-object, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:21:12 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Deactivated successfully. Feb 2 08:21:12 np0005604725 podman[159305]: 2026-02-02 08:21:12.107809686 +0000 UTC m=+0.804475280 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-nova-novncproxy-container, version=17.1.13, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, name=rhosp-rhel9/openstack-nova-novncproxy, build-date=2026-01-12T23:32:22Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., vcs-type=git, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, release=1766032510, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, url=https://www.redhat.com, container_name=nova_vnc_proxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, config_id=tripleo_step4, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.buildah.version=1.41.5, distribution-scope=public) Feb 2 08:21:12 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Deactivated successfully. Feb 2 08:21:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:21:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:21:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:21:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:21:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:21:13 np0005604725 systemd[1]: tmp-crun.Ea5QvZ.mount: Deactivated successfully. Feb 2 08:21:13 np0005604725 podman[159683]: 2026-02-02 08:21:13.343604334 +0000 UTC m=+0.083770317 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:10:14Z, distribution-scope=public, com.redhat.component=openstack-qdrouterd-container, architecture=x86_64, tcib_managed=true, batch=17.1_20260112.1, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.13, release=1766032510, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, config_id=tripleo_step1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:14Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=metrics_qdr, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-qdrouterd) Feb 2 08:21:13 np0005604725 podman[159684]: 2026-02-02 08:21:13.349207856 +0000 UTC m=+0.082456135 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, container_name=glance_api, batch=17.1_20260112.1, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, release=1766032510, com.redhat.component=openstack-glance-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:34:42Z, build-date=2026-01-12T22:34:42Z, description=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, name=rhosp-rhel9/openstack-glance-api, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, io.buildah.version=1.41.5, distribution-scope=public) Feb 2 08:21:13 np0005604725 podman[159685]: 2026-02-02 08:21:13.399707068 +0000 UTC m=+0.137021253 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=healthy, com.redhat.component=openstack-swift-object-container, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 swift-object, maintainer=OpenStack TripleO Team, release=1766032510, distribution-scope=public, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_rsync, url=https://www.redhat.com, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:50:56Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, io.openshift.expose-services=, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, name=rhosp-rhel9/openstack-swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, version=17.1.13, vendor=Red Hat, Inc., build-date=2026-01-12T22:50:56Z) Feb 2 08:21:13 np0005604725 podman[159681]: 2026-02-02 08:21:13.381625153 +0000 UTC m=+0.123737785 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, release=1766032510, description=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-glance-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, architecture=x86_64, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, url=https://www.redhat.com, build-date=2026-01-12T22:34:42Z, container_name=glance_api_cron, io.openshift.expose-services=, distribution-scope=public, managed_by=tripleo_ansible, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true) Feb 2 08:21:13 np0005604725 podman[159682]: 2026-02-02 08:21:13.446009832 +0000 UTC m=+0.188903658 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=healthy, version=17.1.13, architecture=x86_64, name=rhosp-rhel9/openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vcs-type=git, container_name=glance_api_internal, summary=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, release=1766032510, tcib_managed=true, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, url=https://www.redhat.com, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:34:42Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, com.redhat.component=openstack-glance-api-container, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:42Z, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible) Feb 2 08:21:13 np0005604725 podman[159681]: 2026-02-02 08:21:13.465920544 +0000 UTC m=+0.208033166 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, release=1766032510, name=rhosp-rhel9/openstack-glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, vcs-type=git, build-date=2026-01-12T22:34:42Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, distribution-scope=public, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=glance_api_cron, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-glance-api-container, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, architecture=x86_64, io.buildah.version=1.41.5, config_id=tripleo_step4, managed_by=tripleo_ansible, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:21:13 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:21:13 np0005604725 podman[159683]: 2026-02-02 08:21:13.570048004 +0000 UTC m=+0.310213967 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, tcib_managed=true, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-qdrouterd-container, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2026-01-12T22:10:14Z, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:14Z, distribution-scope=public, vcs-type=git, architecture=x86_64, container_name=metrics_qdr, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-qdrouterd, config_id=tripleo_step1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., release=1766032510, io.openshift.expose-services=, url=https://www.redhat.com, maintainer=OpenStack TripleO Team) Feb 2 08:21:13 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:21:13 np0005604725 podman[159684]: 2026-02-02 08:21:13.579800084 +0000 UTC m=+0.313048353 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., com.redhat.component=openstack-glance-api-container, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:34:42Z, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, container_name=glance_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.buildah.version=1.41.5, distribution-scope=public, name=rhosp-rhel9/openstack-glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, io.openshift.expose-services=, version=17.1.13, batch=17.1_20260112.1, url=https://www.redhat.com, architecture=x86_64, managed_by=tripleo_ansible, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git) Feb 2 08:21:13 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Deactivated successfully. Feb 2 08:21:13 np0005604725 podman[159682]: 2026-02-02 08:21:13.65483723 +0000 UTC m=+0.397731056 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., com.redhat.component=openstack-glance-api-container, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, batch=17.1_20260112.1, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, build-date=2026-01-12T22:34:42Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=glance_api_internal, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:34:42Z, name=rhosp-rhel9/openstack-glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, managed_by=tripleo_ansible) Feb 2 08:21:13 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Deactivated successfully. Feb 2 08:21:13 np0005604725 podman[159685]: 2026-02-02 08:21:13.783385642 +0000 UTC m=+0.520699817 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, vendor=Red Hat, Inc., config_id=tripleo_step4, container_name=swift_rsync, architecture=x86_64, vcs-type=git, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-object, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, name=rhosp-rhel9/openstack-swift-object, url=https://www.redhat.com, build-date=2026-01-12T22:50:56Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-object-container, org.opencontainers.image.created=2026-01-12T22:50:56Z, release=1766032510) Feb 2 08:21:13 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:21:17 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:21:17 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:21:17 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:21:17 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:21:17 np0005604725 podman[159993]: 2026-02-02 08:21:17.360943913 +0000 UTC m=+0.097054113 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, tcib_managed=true, name=rhosp-rhel9/openstack-nova-api, batch=17.1_20260112.1, io.openshift.expose-services=, vcs-type=git, release=1766032510, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, config_id=tripleo_step4, com.redhat.component=openstack-nova-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, architecture=x86_64, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, build-date=2026-01-12T23:31:50Z, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible) Feb 2 08:21:17 np0005604725 systemd[1]: tmp-crun.JM4P0u.mount: Deactivated successfully. Feb 2 08:21:17 np0005604725 podman[159999]: 2026-02-02 08:21:17.379666079 +0000 UTC m=+0.112433267 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-proxy-server, version=17.1.13, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, vendor=Red Hat, Inc., distribution-scope=public, io.openshift.expose-services=, batch=17.1_20260112.1, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:50:51Z, build-date=2026-01-12T22:50:51Z, tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, config_id=tripleo_step4, url=https://www.redhat.com, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, container_name=swift_proxy, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-swift-proxy-server-container) Feb 2 08:21:17 np0005604725 podman[159991]: 2026-02-02 08:21:17.449986361 +0000 UTC m=+0.198444901 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, release=1766032510, org.opencontainers.image.created=2026-01-12T23:31:50Z, description=Red Hat OpenStack Platform 17.1 nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, managed_by=tripleo_ansible, vendor=Red Hat, Inc., distribution-scope=public, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, tcib_managed=true, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, build-date=2026-01-12T23:31:50Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, url=https://www.redhat.com, architecture=x86_64, com.redhat.component=openstack-nova-api-container, container_name=nova_api_cron, config_id=tripleo_step4) Feb 2 08:21:17 np0005604725 podman[159993]: 2026-02-02 08:21:17.458851823 +0000 UTC m=+0.194962073 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T23:31:50Z, com.redhat.component=openstack-nova-api-container, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, container_name=nova_api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.expose-services=, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-nova-api, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, build-date=2026-01-12T23:31:50Z, release=1766032510, maintainer=OpenStack TripleO Team, distribution-scope=public, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible) Feb 2 08:21:17 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:21:17 np0005604725 podman[159992]: 2026-02-02 08:21:17.421776624 +0000 UTC m=+0.160977790 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, name=rhosp-rhel9/openstack-nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, config_id=tripleo_step4, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., build-date=2026-01-12T23:31:50Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, url=https://www.redhat.com, tcib_managed=true, vcs-type=git, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, org.opencontainers.image.created=2026-01-12T23:31:50Z, container_name=nova_metadata, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, architecture=x86_64, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=) Feb 2 08:21:17 np0005604725 podman[159991]: 2026-02-02 08:21:17.481311654 +0000 UTC m=+0.229770184 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, batch=17.1_20260112.1, url=https://www.redhat.com, version=17.1.13, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, distribution-scope=public, com.redhat.component=openstack-nova-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp-rhel9/openstack-nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, vendor=Red Hat, Inc., container_name=nova_api_cron, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, io.buildah.version=1.41.5, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, config_id=tripleo_step4) Feb 2 08:21:17 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:21:17 np0005604725 podman[159992]: 2026-02-02 08:21:17.495930213 +0000 UTC m=+0.235131399 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, version=17.1.13, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, name=rhosp-rhel9/openstack-nova-api, com.redhat.component=openstack-nova-api-container, description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_metadata, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, url=https://www.redhat.com, managed_by=tripleo_ansible, build-date=2026-01-12T23:31:50Z, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, release=1766032510, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, distribution-scope=public, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:31:50Z, summary=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., io.openshift.expose-services=) Feb 2 08:21:17 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:21:17 np0005604725 podman[159999]: 2026-02-02 08:21:17.584701532 +0000 UTC m=+0.317468750 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, batch=17.1_20260112.1, managed_by=tripleo_ansible, com.redhat.component=openstack-swift-proxy-server-container, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=swift_proxy, build-date=2026-01-12T22:50:51Z, org.opencontainers.image.created=2026-01-12T22:50:51Z, distribution-scope=public, name=rhosp-rhel9/openstack-swift-proxy-server, tcib_managed=true, vcs-type=git, io.openshift.expose-services=, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, architecture=x86_64, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, release=1766032510, version=17.1.13, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:21:17 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Deactivated successfully. Feb 2 08:21:19 np0005604725 kernel: SELinux: Converting 2955 SID table entries... Feb 2 08:21:19 np0005604725 kernel: SELinux: policy capability network_peer_controls=1 Feb 2 08:21:19 np0005604725 kernel: SELinux: policy capability open_perms=1 Feb 2 08:21:19 np0005604725 kernel: SELinux: policy capability extended_socket_class=1 Feb 2 08:21:19 np0005604725 kernel: SELinux: policy capability always_check_network=0 Feb 2 08:21:19 np0005604725 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 2 08:21:19 np0005604725 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 2 08:21:19 np0005604725 kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 2 08:21:19 np0005604725 dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Feb 2 08:21:19 np0005604725 dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=16 res=1 Feb 2 08:21:19 np0005604725 dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Feb 2 08:21:20 np0005604725 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 2 08:21:20 np0005604725 systemd[1]: Starting man-db-cache-update.service... Feb 2 08:21:20 np0005604725 systemd[1]: Reloading. Feb 2 08:21:20 np0005604725 systemd-sysv-generator[160422]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:21:20 np0005604725 systemd-rc-local-generator[160417]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:21:20 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:21:20 np0005604725 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 2 08:21:20 np0005604725 systemd[1]: Queuing reload/restart jobs for marked units… Feb 2 08:21:20 np0005604725 systemd-journald[617]: Journal stopped Feb 2 08:21:21 np0005604725 systemd-journald[617]: Received SIGTERM from PID 1 (systemd). Feb 2 08:21:21 np0005604725 systemd[1]: Stopping Journal Service... Feb 2 08:21:21 np0005604725 systemd[1]: Stopping Rule-based Manager for Device Events and Files... Feb 2 08:21:21 np0005604725 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 2 08:21:21 np0005604725 systemd[1]: Stopped Journal Service. Feb 2 08:21:21 np0005604725 systemd[1]: systemd-journald.service: Consumed 6.183s CPU time. Feb 2 08:21:21 np0005604725 systemd[1]: Starting Journal Service... Feb 2 08:21:21 np0005604725 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 2 08:21:21 np0005604725 systemd[1]: Stopped Rule-based Manager for Device Events and Files. Feb 2 08:21:21 np0005604725 systemd[1]: systemd-udevd.service: Consumed 2.712s CPU time. Feb 2 08:21:21 np0005604725 systemd[1]: Starting Rule-based Manager for Device Events and Files... Feb 2 08:21:21 np0005604725 systemd-journald[161366]: Journal started Feb 2 08:21:21 np0005604725 systemd-journald[161366]: Runtime Journal (/run/log/journal/48447b9b8976f23a3b4b319f2b01dfe5) is 31.3M, max 314.7M, 283.4M free. Feb 2 08:21:21 np0005604725 systemd[1]: Started Journal Service. Feb 2 08:21:21 np0005604725 systemd-udevd[161379]: Using default interface naming scheme 'rhel-9.0'. Feb 2 08:21:21 np0005604725 systemd[1]: Started Rule-based Manager for Device Events and Files. Feb 2 08:21:21 np0005604725 systemd[1]: Reloading. Feb 2 08:21:21 np0005604725 systemd-rc-local-generator[161711]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 2 08:21:21 np0005604725 systemd-sysv-generator[161714]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 2 08:21:21 np0005604725 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 2 08:21:21 np0005604725 systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 2 08:21:21 np0005604725 systemd[1]: Finished man-db-cache-update.service. Feb 2 08:21:21 np0005604725 systemd[1]: man-db-cache-update.service: Consumed 1.017s CPU time. Feb 2 08:21:21 np0005604725 systemd[1]: run-r66ead330d1a94a2598d9af27d36e690c.service: Deactivated successfully. Feb 2 08:21:21 np0005604725 systemd[1]: run-r56bafa093a4f47b8bf8fd11f46ff166f.service: Deactivated successfully. Feb 2 08:21:21 np0005604725 systemd[1]: Queuing reload/restart jobs for marked units… Feb 2 08:21:24 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:21:24 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:21:24 np0005604725 systemd[1]: tmp-crun.sDWbsH.mount: Deactivated successfully. Feb 2 08:21:24 np0005604725 podman[161874]: 2026-02-02 08:21:24.351601752 +0000 UTC m=+0.093254128 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, managed_by=tripleo_ansible, container_name=horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:41Z, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, distribution-scope=public, config_id=tripleo_step3, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, tcib_managed=true, vendor=Red Hat, Inc., com.redhat.component=openstack-horizon-container, maintainer=OpenStack TripleO Team, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 horizon, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 horizon, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:34:41Z, name=rhosp-rhel9/openstack-horizon, io.openshift.expose-services=, architecture=x86_64) Feb 2 08:21:24 np0005604725 podman[161874]: 2026-02-02 08:21:24.378716685 +0000 UTC m=+0.120369031 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, com.redhat.component=openstack-horizon-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:41Z, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, managed_by=tripleo_ansible, container_name=horizon, io.buildah.version=1.41.5, architecture=x86_64, vcs-type=git, version=17.1.13, io.openshift.expose-services=, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 horizon, summary=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, name=rhosp-rhel9/openstack-horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, batch=17.1_20260112.1, release=1766032510, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}) Feb 2 08:21:24 np0005604725 systemd[1]: tmp-crun.fWsin9.mount: Deactivated successfully. Feb 2 08:21:24 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:21:24 np0005604725 podman[161867]: 2026-02-02 08:21:24.403553698 +0000 UTC m=+0.144490082 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, config_id=tripleo_step3, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:15Z, container_name=collectd, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 collectd, maintainer=OpenStack TripleO Team, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, version=17.1.13, tcib_managed=true, url=https://www.redhat.com, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 collectd, com.redhat.component=openstack-collectd-container, architecture=x86_64, managed_by=tripleo_ansible, build-date=2026-01-12T22:10:15Z, name=rhosp-rhel9/openstack-collectd, distribution-scope=public, io.buildah.version=1.41.5) Feb 2 08:21:24 np0005604725 podman[161867]: 2026-02-02 08:21:24.419893141 +0000 UTC m=+0.160829525 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-collectd, com.redhat.component=openstack-collectd-container, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, distribution-scope=public, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 collectd, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., io.openshift.expose-services=, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, url=https://www.redhat.com, config_id=tripleo_step3, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:15Z, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, container_name=collectd, summary=Red Hat OpenStack Platform 17.1 collectd, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:15Z) Feb 2 08:21:24 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:21:27 np0005604725 systemd[1]: tmp-crun.D79rot.mount: Deactivated successfully. Feb 2 08:21:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:21:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:21:27 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:21:27 np0005604725 podman[162135]: 2026-02-02 08:21:27.108193988 +0000 UTC m=+0.137420156 container exec c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, maintainer=OpenStack TripleO Team, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:58:35Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., com.redhat.component=openstack-cinder-volume-container, name=rhosp-rhel9/openstack-cinder-volume, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 cinder-volume, url=https://www.redhat.com, build-date=2026-01-12T22:58:35Z, io.buildah.version=1.41.5, distribution-scope=public, release=1766032510, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, description=Red Hat OpenStack Platform 17.1 cinder-volume, architecture=x86_64, vcs-type=git, batch=17.1_20260112.1) Feb 2 08:21:27 np0005604725 podman[162135]: 2026-02-02 08:21:27.147677791 +0000 UTC m=+0.176903839 container exec_died c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, url=https://www.redhat.com, build-date=2026-01-12T22:58:35Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:58:35Z, io.buildah.version=1.41.5, architecture=x86_64, vendor=Red Hat, Inc., version=17.1.13, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, vcs-type=git, com.redhat.component=openstack-cinder-volume-container, description=Red Hat OpenStack Platform 17.1 cinder-volume, summary=Red Hat OpenStack Platform 17.1 cinder-volume, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-cinder-volume, maintainer=OpenStack TripleO Team, release=1766032510, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:21:27 np0005604725 podman[162252]: 2026-02-02 08:21:27.228213406 +0000 UTC m=+0.117583505 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, com.redhat.component=openstack-iscsid-container, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, managed_by=tripleo_ansible, release=1766032510, org.opencontainers.image.created=2026-01-12T22:34:43Z, url=https://www.redhat.com, vcs-type=git, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, io.openshift.expose-services=, container_name=iscsid, vcs-ref=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, build-date=2026-01-12T22:34:43Z, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-iscsid, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc.) Feb 2 08:21:27 np0005604725 podman[162241]: 2026-02-02 08:21:27.290346017 +0000 UTC m=+0.183505703 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, vendor=Red Hat, Inc., architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:33:53Z, container_name=keystone, vcs-type=git, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, name=rhosp-rhel9/openstack-keystone, release=1766032510, managed_by=tripleo_ansible, distribution-scope=public, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T22:33:53Z) Feb 2 08:21:27 np0005604725 podman[162246]: 2026-02-02 08:21:27.345638466 +0000 UTC m=+0.238038029 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, container_name=keystone_cron, managed_by=tripleo_ansible, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 keystone, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:33:53Z, distribution-scope=public, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, config_id=tripleo_step3, architecture=x86_64, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, release=1766032510, name=rhosp-rhel9/openstack-keystone, com.redhat.component=openstack-keystone-container, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:33:53Z) Feb 2 08:21:27 np0005604725 podman[162246]: 2026-02-02 08:21:27.357757679 +0000 UTC m=+0.250157282 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, container_name=keystone_cron, build-date=2026-01-12T22:33:53Z, maintainer=OpenStack TripleO Team, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, config_id=tripleo_step3, vendor=Red Hat, Inc., tcib_managed=true, release=1766032510, distribution-scope=public, name=rhosp-rhel9/openstack-keystone) Feb 2 08:21:27 np0005604725 podman[162241]: 2026-02-02 08:21:27.372721368 +0000 UTC m=+0.265881054 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, vendor=Red Hat, Inc., distribution-scope=public, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.component=openstack-keystone-container, vcs-type=git, version=17.1.13, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-keystone, io.buildah.version=1.41.5, architecture=x86_64, build-date=2026-01-12T22:33:53Z, url=https://www.redhat.com, container_name=keystone) Feb 2 08:21:27 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:21:27 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:21:27 np0005604725 podman[162252]: 2026-02-02 08:21:27.417953419 +0000 UTC m=+0.307323548 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, managed_by=tripleo_ansible, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, io.buildah.version=1.41.5, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, org.opencontainers.image.created=2026-01-12T22:34:43Z, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=iscsid, architecture=x86_64, build-date=2026-01-12T22:34:43Z, summary=Red Hat OpenStack Platform 17.1 iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, config_id=tripleo_step3, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-iscsid, vcs-type=git, batch=17.1_20260112.1, com.redhat.component=openstack-iscsid-container, description=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.13, tcib_managed=true, vcs-ref=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public) Feb 2 08:21:27 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:21:32 np0005604725 systemd[1]: session-20.scope: Deactivated successfully. Feb 2 08:21:32 np0005604725 systemd[1]: session-20.scope: Consumed 6.103s CPU time. Feb 2 08:21:32 np0005604725 systemd-logind[36465]: Session 20 logged out. Waiting for processes to exit. Feb 2 08:21:32 np0005604725 systemd-logind[36465]: Removed session 20. Feb 2 08:21:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:21:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:21:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:21:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:21:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:21:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:21:34 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:21:34 np0005604725 podman[162553]: 2026-02-02 08:21:34.376575142 +0000 UTC m=+0.107915630 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=healthy, io.openshift.expose-services=, vcs-type=git, container_name=cinder_scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, batch=17.1_20260112.1, managed_by=tripleo_ansible, architecture=x86_64, build-date=2026-01-12T22:58:47Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, io.buildah.version=1.41.5, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, org.opencontainers.image.created=2026-01-12T22:58:47Z, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, tcib_managed=true, distribution-scope=public, name=rhosp-rhel9/openstack-cinder-scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-cinder-scheduler-container, config_id=tripleo_step4, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e) Feb 2 08:21:34 np0005604725 podman[162551]: 2026-02-02 08:21:34.425656612 +0000 UTC m=+0.161588362 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, vcs-type=git, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, io.openshift.expose-services=, managed_by=tripleo_ansible, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, batch=17.1_20260112.1, com.redhat.component=openstack-ceilometer-central-container, config_id=tripleo_step4, name=rhosp-rhel9/openstack-ceilometer-central, release=1766032510, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, build-date=2026-01-12T23:07:24Z, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, container_name=ceilometer_agent_central, tcib_managed=true, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 ceilometer-central, org.opencontainers.image.created=2026-01-12T23:07:24Z, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, summary=Red Hat OpenStack Platform 17.1 ceilometer-central) Feb 2 08:21:34 np0005604725 podman[162553]: 2026-02-02 08:21:34.437915631 +0000 UTC m=+0.169256119 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, name=rhosp-rhel9/openstack-cinder-scheduler, org.opencontainers.image.created=2026-01-12T22:58:47Z, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, build-date=2026-01-12T22:58:47Z, io.openshift.expose-services=, container_name=cinder_scheduler, version=17.1.13, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, managed_by=tripleo_ansible, config_id=tripleo_step4, distribution-scope=public, vcs-type=git, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, batch=17.1_20260112.1, tcib_managed=true, com.redhat.component=openstack-cinder-scheduler-container, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler) Feb 2 08:21:34 np0005604725 podman[162554]: 2026-02-02 08:21:34.478536038 +0000 UTC m=+0.206684737 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=healthy, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, io.buildah.version=1.41.5, tcib_managed=true, vcs-ref=755001522886c265e88561b4997cab642504a845, container_name=heat_engine, version=17.1.13, com.redhat.component=openstack-heat-engine-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-heat-engine, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 heat-engine, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, release=1766032510, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:53:38Z, architecture=x86_64, config_id=tripleo_step4, url=https://www.redhat.com, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:53:38Z, summary=Red Hat OpenStack Platform 17.1 heat-engine, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:21:34 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:21:34 np0005604725 podman[162572]: 2026-02-02 08:21:34.44920688 +0000 UTC m=+0.167306709 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 cinder-api, maintainer=OpenStack TripleO Team, version=17.1.13, distribution-scope=public, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:58:44Z, container_name=cinder_api_cron, vcs-type=git, name=rhosp-rhel9/openstack-cinder-api, config_id=tripleo_step4, build-date=2026-01-12T22:58:44Z, io.buildah.version=1.41.5, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, batch=17.1_20260112.1, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.expose-services=, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-cinder-api-container, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e) Feb 2 08:21:34 np0005604725 podman[162551]: 2026-02-02 08:21:34.510095634 +0000 UTC m=+0.246027424 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, container_name=ceilometer_agent_central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, version=17.1.13, io.openshift.expose-services=, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, url=https://www.redhat.com, architecture=x86_64, config_id=tripleo_step4, build-date=2026-01-12T23:07:24Z, tcib_managed=true, vendor=Red Hat, Inc., release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-ceilometer-central-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, name=rhosp-rhel9/openstack-ceilometer-central, description=Red Hat OpenStack Platform 17.1 ceilometer-central, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:07:24Z, managed_by=tripleo_ansible) Feb 2 08:21:34 np0005604725 podman[162554]: 2026-02-02 08:21:34.525872532 +0000 UTC m=+0.254021241 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, vendor=Red Hat, Inc., io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 heat-engine, name=rhosp-rhel9/openstack-heat-engine, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, summary=Red Hat OpenStack Platform 17.1 heat-engine, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, release=1766032510, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, version=17.1.13, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, org.opencontainers.image.created=2026-01-12T22:53:38Z, config_id=tripleo_step4, io.buildah.version=1.41.5, vcs-ref=755001522886c265e88561b4997cab642504a845, architecture=x86_64, container_name=heat_engine, com.redhat.component=openstack-heat-engine-container, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, build-date=2026-01-12T22:53:38Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine) Feb 2 08:21:34 np0005604725 podman[162572]: 2026-02-02 08:21:34.533800328 +0000 UTC m=+0.251900117 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, architecture=x86_64, distribution-scope=public, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-cinder-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.13, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, build-date=2026-01-12T22:58:44Z, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, io.openshift.expose-services=, name=rhosp-rhel9/openstack-cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, container_name=cinder_api_cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., managed_by=tripleo_ansible, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vcs-type=git, release=1766032510) Feb 2 08:21:34 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:21:34 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:21:34 np0005604725 podman[162560]: 2026-02-02 08:21:34.581172683 +0000 UTC m=+0.299970793 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, io.buildah.version=1.41.5, version=17.1.13, description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:18Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, maintainer=OpenStack TripleO Team, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, container_name=clustercheck, com.redhat.component=openstack-mariadb-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, tcib_managed=true, build-date=2026-01-12T22:10:18Z, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step2) Feb 2 08:21:34 np0005604725 podman[162579]: 2026-02-02 08:21:34.539103562 +0000 UTC m=+0.249118500 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-ceilometer-notification-container, managed_by=tripleo_ansible, batch=17.1_20260112.1, container_name=ceilometer_agent_notification, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, distribution-scope=public, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, org.opencontainers.image.created=2026-01-12T23:07:25Z, architecture=x86_64, name=rhosp-rhel9/openstack-ceilometer-notification, tcib_managed=true, url=https://www.redhat.com, config_id=tripleo_step4, io.buildah.version=1.41.5, build-date=2026-01-12T23:07:25Z, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, io.openshift.expose-services=, release=1766032510, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, vendor=Red Hat, Inc., org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06) Feb 2 08:21:34 np0005604725 podman[162579]: 2026-02-02 08:21:34.622854934 +0000 UTC m=+0.332869912 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, config_id=tripleo_step4, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, container_name=ceilometer_agent_notification, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, tcib_managed=true, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, name=rhosp-rhel9/openstack-ceilometer-notification, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, org.opencontainers.image.created=2026-01-12T23:07:25Z, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, io.openshift.expose-services=, build-date=2026-01-12T23:07:25Z, release=1766032510, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-ceilometer-notification-container, io.buildah.version=1.41.5, distribution-scope=public, version=17.1.13, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 ceilometer-notification) Feb 2 08:21:34 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:21:34 np0005604725 podman[162560]: 2026-02-02 08:21:34.644000888 +0000 UTC m=+0.362799058 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, config_id=tripleo_step2, com.redhat.component=openstack-mariadb-container, name=rhosp-rhel9/openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=clustercheck, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, build-date=2026-01-12T22:10:18Z, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:10:18Z, release=1766032510, maintainer=OpenStack TripleO Team, vcs-type=git, version=17.1.13) Feb 2 08:21:34 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:21:34 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:21:34 np0005604725 podman[162552]: 2026-02-02 08:21:34.643760751 +0000 UTC m=+0.378037459 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, url=https://www.redhat.com, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-api, container_name=heat_api_cron, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:53:19Z, build-date=2026-01-12T22:53:19Z, architecture=x86_64, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-heat-api, vendor=Red Hat, Inc., vcs-type=git, tcib_managed=true, distribution-scope=public, release=1766032510, io.openshift.expose-services=, vcs-ref=755001522886c265e88561b4997cab642504a845, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_step4) Feb 2 08:21:34 np0005604725 podman[162552]: 2026-02-02 08:21:34.725360776 +0000 UTC m=+0.459637474 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, name=rhosp-rhel9/openstack-heat-api, container_name=heat_api_cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, release=1766032510, vcs-ref=755001522886c265e88561b4997cab642504a845, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.openshift.expose-services=, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, url=https://www.redhat.com, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, batch=17.1_20260112.1, architecture=x86_64, vcs-type=git, com.redhat.component=openstack-heat-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 heat-api, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:53:19Z, build-date=2026-01-12T22:53:19Z, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_step4) Feb 2 08:21:34 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:21:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:21:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:21:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:21:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:21:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:21:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:21:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:21:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:21:35 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:21:35 np0005604725 systemd[1]: tmp-crun.MIyZgS.mount: Deactivated successfully. Feb 2 08:21:35 np0005604725 podman[162818]: 2026-02-02 08:21:35.375044221 +0000 UTC m=+0.103022209 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=healthy, container_name=manila_api_cron, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:52:22Z, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 manila-api, version=17.1.13, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-manila-api, build-date=2026-01-12T22:52:22Z, architecture=x86_64, com.redhat.component=openstack-manila-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., vcs-type=git, io.openshift.expose-services=, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, tcib_managed=true, release=1766032510) Feb 2 08:21:35 np0005604725 podman[162818]: 2026-02-02 08:21:35.386790244 +0000 UTC m=+0.114768232 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.expose-services=, distribution-scope=public, architecture=x86_64, container_name=manila_api_cron, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-manila-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, build-date=2026-01-12T22:52:22Z, tcib_managed=true, com.redhat.component=openstack-manila-api-container, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, org.opencontainers.image.created=2026-01-12T22:52:22Z, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, url=https://www.redhat.com, release=1766032510, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, description=Red Hat OpenStack Platform 17.1 manila-api, maintainer=OpenStack TripleO Team, version=17.1.13) Feb 2 08:21:35 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:21:35 np0005604725 podman[162824]: 2026-02-02 08:21:35.417520565 +0000 UTC m=+0.146256527 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, container_name=heat_api_cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, version=17.1.13, batch=17.1_20260112.1, vcs-ref=755001522886c265e88561b4997cab642504a845, vcs-type=git, vendor=Red Hat, Inc., architecture=x86_64, build-date=2026-01-12T22:54:02Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-heat-api-cfn, release=1766032510, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, url=https://www.redhat.com, com.redhat.component=openstack-heat-api-cfn-container, org.opencontainers.image.created=2026-01-12T22:54:02Z, managed_by=tripleo_ansible) Feb 2 08:21:35 np0005604725 podman[162806]: 2026-02-02 08:21:35.47357506 +0000 UTC m=+0.217662937 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, architecture=x86_64, name=rhosp-rhel9/openstack-heat-api, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_step4, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=755001522886c265e88561b4997cab642504a845, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.openshift.expose-services=, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:53:19Z, com.redhat.component=openstack-heat-api-container, vendor=Red Hat, Inc., container_name=heat_api, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 heat-api) Feb 2 08:21:35 np0005604725 podman[162804]: 2026-02-02 08:21:35.481602178 +0000 UTC m=+0.226301774 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, batch=17.1_20260112.1, container_name=cinder_api, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:58:44Z, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, architecture=x86_64, distribution-scope=public, com.redhat.component=openstack-cinder-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, io.openshift.expose-services=, version=17.1.13, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, managed_by=tripleo_ansible, build-date=2026-01-12T22:58:44Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., io.buildah.version=1.41.5, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:21:35 np0005604725 podman[162825]: 2026-02-02 08:21:35.463746185 +0000 UTC m=+0.186023707 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=healthy, batch=17.1_20260112.1, architecture=x86_64, config_id=tripleo_step4, vcs-type=git, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, description=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, release=1766032510, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-neutron-server-container, tcib_managed=true, managed_by=tripleo_ansible, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, container_name=neutron_api, io.buildah.version=1.41.5, build-date=2026-01-12T22:57:35Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, org.opencontainers.image.created=2026-01-12T22:57:35Z, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, vendor=Red Hat, Inc.) Feb 2 08:21:35 np0005604725 podman[162852]: 2026-02-02 08:21:35.521181863 +0000 UTC m=+0.232037222 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=healthy, version=17.1.13, tcib_managed=true, vendor=Red Hat, Inc., release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, container_name=nova_conductor, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-nova-conductor, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T23:32:18Z, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 nova-conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-nova-conductor-container, io.openshift.expose-services=, config_id=tripleo_step4, io.buildah.version=1.41.5, architecture=x86_64, org.opencontainers.image.created=2026-01-12T23:32:18Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, managed_by=tripleo_ansible, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 nova-conductor) Feb 2 08:21:35 np0005604725 podman[162804]: 2026-02-02 08:21:35.551851472 +0000 UTC m=+0.296551068 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.openshift.expose-services=, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, managed_by=tripleo_ansible, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 cinder-api, distribution-scope=public, version=17.1.13, container_name=cinder_api, batch=17.1_20260112.1, com.redhat.component=openstack-cinder-api-container, vendor=Red Hat, Inc., tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, build-date=2026-01-12T22:58:44Z, org.opencontainers.image.created=2026-01-12T22:58:44Z, description=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-cinder-api) Feb 2 08:21:35 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:21:35 np0005604725 podman[162852]: 2026-02-02 08:21:35.575879975 +0000 UTC m=+0.286735314 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, build-date=2026-01-12T23:32:18Z, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, com.redhat.component=openstack-nova-conductor-container, tcib_managed=true, vcs-type=git, name=rhosp-rhel9/openstack-nova-conductor, distribution-scope=public, managed_by=tripleo_ansible, container_name=nova_conductor, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 nova-conductor, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.created=2026-01-12T23:32:18Z, description=Red Hat OpenStack Platform 17.1 nova-conductor, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, batch=17.1_20260112.1, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:21:35 np0005604725 podman[162807]: 2026-02-02 08:21:35.576115222 +0000 UTC m=+0.316057730 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, com.redhat.component=openstack-cron-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, summary=Red Hat OpenStack Platform 17.1 cron, name=rhosp-rhel9/openstack-cron, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 cron, batch=17.1_20260112.1, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, vcs-type=git, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:15Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, url=https://www.redhat.com, version=17.1.13, container_name=logrotate_crond, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, org.opencontainers.image.created=2026-01-12T22:10:15Z, managed_by=tripleo_ansible, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, release=1766032510) Feb 2 08:21:35 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:21:35 np0005604725 podman[162806]: 2026-02-02 08:21:35.606882524 +0000 UTC m=+0.350970421 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, version=17.1.13, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, vcs-ref=755001522886c265e88561b4997cab642504a845, container_name=heat_api, org.opencontainers.image.created=2026-01-12T22:53:19Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.openshift.expose-services=, name=rhosp-rhel9/openstack-heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, vendor=Red Hat, Inc., config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, distribution-scope=public, com.redhat.component=openstack-heat-api-container, tcib_managed=true, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}) Feb 2 08:21:35 np0005604725 podman[162825]: 2026-02-02 08:21:35.616933566 +0000 UTC m=+0.339211098 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, org.opencontainers.image.created=2026-01-12T22:57:35Z, summary=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 neutron-server, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=neutron_api, vendor=Red Hat, Inc., distribution-scope=public, com.redhat.component=openstack-neutron-server-container, io.buildah.version=1.41.5, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, build-date=2026-01-12T22:57:35Z, release=1766032510, architecture=x86_64, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.expose-services=, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-neutron-server, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f) Feb 2 08:21:35 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:21:35 np0005604725 podman[162845]: 2026-02-02 08:21:35.623775407 +0000 UTC m=+0.337905347 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=healthy, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, distribution-scope=public, io.buildah.version=1.41.5, version=17.1.13, description=Red Hat OpenStack Platform 17.1 manila-scheduler, com.redhat.component=openstack-manila-scheduler-container, container_name=manila_scheduler, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:52:54Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:52:54Z, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-manila-scheduler, release=1766032510, managed_by=tripleo_ansible, url=https://www.redhat.com, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, vendor=Red Hat, Inc., architecture=x86_64) Feb 2 08:21:35 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:21:35 np0005604725 podman[162845]: 2026-02-02 08:21:35.671917978 +0000 UTC m=+0.386047928 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, name=rhosp-rhel9/openstack-manila-scheduler, vendor=Red Hat, Inc., architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, version=17.1.13, tcib_managed=true, url=https://www.redhat.com, com.redhat.component=openstack-manila-scheduler-container, io.buildah.version=1.41.5, build-date=2026-01-12T22:52:54Z, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:52:54Z, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, container_name=manila_scheduler, managed_by=tripleo_ansible, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, maintainer=OpenStack TripleO Team, vcs-type=git, io.openshift.expose-services=, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, description=Red Hat OpenStack Platform 17.1 manila-scheduler, distribution-scope=public) Feb 2 08:21:35 np0005604725 podman[162856]: 2026-02-02 08:21:35.683475465 +0000 UTC m=+0.389630618 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=healthy, distribution-scope=public, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-scheduler, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, managed_by=tripleo_ansible, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, url=https://www.redhat.com, io.buildah.version=1.41.5, container_name=nova_scheduler, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T23:32:05Z, name=rhosp-rhel9/openstack-nova-scheduler, tcib_managed=true, com.redhat.component=openstack-nova-scheduler-container, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., build-date=2026-01-12T23:32:05Z, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, io.openshift.expose-services=, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler) Feb 2 08:21:35 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:21:35 np0005604725 podman[162824]: 2026-02-02 08:21:35.701798592 +0000 UTC m=+0.430534594 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, tcib_managed=true, build-date=2026-01-12T22:54:02Z, com.redhat.component=openstack-heat-api-cfn-container, release=1766032510, architecture=x86_64, url=https://www.redhat.com, vcs-ref=755001522886c265e88561b4997cab642504a845, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, batch=17.1_20260112.1, vcs-type=git, managed_by=tripleo_ansible, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, name=rhosp-rhel9/openstack-heat-api-cfn, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:54:02Z, config_id=tripleo_step4, container_name=heat_api_cfn) Feb 2 08:21:35 np0005604725 podman[162807]: 2026-02-02 08:21:35.711665917 +0000 UTC m=+0.451608415 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:15Z, name=rhosp-rhel9/openstack-cron, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, vcs-type=git, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, container_name=logrotate_crond, summary=Red Hat OpenStack Platform 17.1 cron, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:15Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, tcib_managed=true, com.redhat.component=openstack-cron-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, config_id=tripleo_step4, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible) Feb 2 08:21:35 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:21:35 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:21:35 np0005604725 podman[162856]: 2026-02-02 08:21:35.734771402 +0000 UTC m=+0.440926565 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, container_name=nova_scheduler, config_id=tripleo_step4, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-scheduler-container, tcib_managed=true, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.created=2026-01-12T23:32:05Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, build-date=2026-01-12T23:32:05Z, architecture=x86_64, vcs-type=git, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-nova-scheduler, description=Red Hat OpenStack Platform 17.1 nova-scheduler, url=https://www.redhat.com, vendor=Red Hat, Inc., io.buildah.version=1.41.5, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:21:35 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:21:36 np0005604725 systemd[1]: tmp-crun.3cuS7M.mount: Deactivated successfully. Feb 2 08:21:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:21:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:21:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:21:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:21:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:21:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:21:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:21:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:21:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:21:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:21:42 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:21:42 np0005604725 podman[163457]: 2026-02-02 08:21:42.44309224 +0000 UTC m=+0.168389142 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=healthy, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, version=17.1.13, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:50:57Z, io.openshift.expose-services=, io.buildah.version=1.41.5, vcs-type=git, vendor=Red Hat, Inc., managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, container_name=swift_container_replicator, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:57Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.component=openstack-swift-container-container, maintainer=OpenStack TripleO Team, tcib_managed=true, url=https://www.redhat.com, batch=17.1_20260112.1) Feb 2 08:21:42 np0005604725 podman[163479]: 2026-02-02 08:21:42.512756626 +0000 UTC m=+0.213961753 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=healthy, vcs-type=git, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, version=17.1.13, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, com.redhat.component=openstack-nova-novncproxy-container, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:32:22Z, release=1766032510, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, managed_by=tripleo_ansible, build-date=2026-01-12T23:32:22Z, name=rhosp-rhel9/openstack-nova-novncproxy, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, batch=17.1_20260112.1, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, container_name=nova_vnc_proxy, tcib_managed=true, distribution-scope=public, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy) Feb 2 08:21:42 np0005604725 podman[163489]: 2026-02-02 08:21:42.472305254 +0000 UTC m=+0.170353293 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, distribution-scope=public, managed_by=tripleo_ansible, vendor=Red Hat, Inc., org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, architecture=x86_64, name=rhosp-rhel9/openstack-ovn-northd, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, build-date=2026-01-12T22:34:06Z, tcib_managed=true, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, vcs-type=git, com.redhat.component=openstack-ovn-northd-container, config_id=ovn_cluster_northd, org.opencontainers.image.created=2026-01-12T22:34:06Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, container_name=ovn_cluster_northd, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, description=Red Hat OpenStack Platform 17.1 ovn-northd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 ovn-northd, version=17.1.13, release=1766032510, io.buildah.version=1.41.5, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd) Feb 2 08:21:42 np0005604725 podman[163461]: 2026-02-02 08:21:42.607070754 +0000 UTC m=+0.321835771 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=healthy, com.redhat.component=openstack-swift-account-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:50:44Z, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:50:44Z, io.openshift.expose-services=, release=1766032510, vendor=Red Hat, Inc., version=17.1.13, container_name=swift_account_replicator, name=rhosp-rhel9/openstack-swift-account, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 swift-account, config_id=tripleo_step4, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 swift-account, vcs-type=git, distribution-scope=public, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account) Feb 2 08:21:42 np0005604725 podman[163489]: 2026-02-02 08:21:42.607948651 +0000 UTC m=+0.305996680 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, name=rhosp-rhel9/openstack-ovn-northd, build-date=2026-01-12T22:34:06Z, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, release=1766032510, org.opencontainers.image.created=2026-01-12T22:34:06Z, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 ovn-northd, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, architecture=x86_64, com.redhat.component=openstack-ovn-northd-container, tcib_managed=true, vcs-type=git, description=Red Hat OpenStack Platform 17.1 ovn-northd, version=17.1.13, config_id=ovn_cluster_northd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=ovn_cluster_northd, distribution-scope=public, batch=17.1_20260112.1, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd) Feb 2 08:21:42 np0005604725 podman[163455]: 2026-02-02 08:21:42.559862063 +0000 UTC m=+0.287806387 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, io.openshift.expose-services=, vcs-type=git, release=1766032510, distribution-scope=public, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20260112.1, version=17.1.13, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:12:26Z, description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-memcached, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, config_id=tripleo_step1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, build-date=2026-01-12T22:12:26Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.component=openstack-memcached-container, container_name=memcached, maintainer=OpenStack TripleO Team) Feb 2 08:21:42 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:21:42 np0005604725 podman[163456]: 2026-02-02 08:21:42.413970918 +0000 UTC m=+0.132151700 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:50:57Z, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:50:57Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, architecture=x86_64, com.redhat.component=openstack-swift-container-container, summary=Red Hat OpenStack Platform 17.1 swift-container, description=Red Hat OpenStack Platform 17.1 swift-container, distribution-scope=public, url=https://www.redhat.com, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, container_name=swift_container_server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-swift-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, config_id=tripleo_step4, managed_by=tripleo_ansible) Feb 2 08:21:42 np0005604725 podman[163454]: 2026-02-02 08:21:42.580662497 +0000 UTC m=+0.311854172 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=healthy, container_name=ovn_controller, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, io.openshift.expose-services=, build-date=2026-01-12T22:36:40Z, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:36:40Z, com.redhat.component=openstack-ovn-controller-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 ovn-controller, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-ovn-controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, release=1766032510, tcib_managed=true, url=https://www.redhat.com, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, vcs-type=git, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller) Feb 2 08:21:42 np0005604725 podman[163455]: 2026-02-02 08:21:42.642829221 +0000 UTC m=+0.370773625 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-memcached, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, org.opencontainers.image.created=2026-01-12T22:12:26Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, tcib_managed=true, managed_by=tripleo_ansible, container_name=memcached, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, com.redhat.component=openstack-memcached-container, build-date=2026-01-12T22:12:26Z, config_id=tripleo_step1) Feb 2 08:21:42 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:21:42 np0005604725 podman[163456]: 2026-02-02 08:21:42.656156163 +0000 UTC m=+0.374336955 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, architecture=x86_64, container_name=swift_container_server, url=https://www.redhat.com, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:57Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, vcs-type=git, release=1766032510, build-date=2026-01-12T22:50:57Z, summary=Red Hat OpenStack Platform 17.1 swift-container, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, com.redhat.component=openstack-swift-container-container, description=Red Hat OpenStack Platform 17.1 swift-container, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-swift-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vendor=Red Hat, Inc., io.openshift.expose-services=, io.buildah.version=1.41.5) Feb 2 08:21:42 np0005604725 podman[163454]: 2026-02-02 08:21:42.662770868 +0000 UTC m=+0.393962533 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, vcs-type=git, config_id=tripleo_step4, version=17.1.13, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 ovn-controller, build-date=2026-01-12T22:36:40Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, release=1766032510, org.opencontainers.image.created=2026-01-12T22:36:40Z, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, name=rhosp-rhel9/openstack-ovn-controller, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, summary=Red Hat OpenStack Platform 17.1 ovn-controller, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-ovn-controller-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, managed_by=tripleo_ansible, vendor=Red Hat, Inc., container_name=ovn_controller, distribution-scope=public, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, io.openshift.expose-services=, batch=17.1_20260112.1, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:21:42 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Deactivated successfully. Feb 2 08:21:42 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Deactivated successfully. Feb 2 08:21:42 np0005604725 podman[163457]: 2026-02-02 08:21:42.709220355 +0000 UTC m=+0.434517537 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-swift-container, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 swift-container, com.redhat.component=openstack-swift-container-container, description=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, container_name=swift_container_replicator, batch=17.1_20260112.1, io.openshift.expose-services=, vendor=Red Hat, Inc., release=1766032510, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, config_id=tripleo_step4, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, build-date=2026-01-12T22:50:57Z, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container) Feb 2 08:21:42 np0005604725 podman[163469]: 2026-02-02 08:21:42.71974658 +0000 UTC m=+0.423810355 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, architecture=x86_64, vcs-type=git, managed_by=tripleo_ansible, com.redhat.component=openstack-swift-object-container, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:50:56Z, version=17.1.13, distribution-scope=public, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, io.buildah.version=1.41.5, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, config_id=tripleo_step4, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_object_server, tcib_managed=true) Feb 2 08:21:42 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Deactivated successfully. Feb 2 08:21:42 np0005604725 podman[163490]: 2026-02-02 08:21:42.53196834 +0000 UTC m=+0.226035095 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=healthy, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, architecture=x86_64, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:34:35Z, com.redhat.component=openstack-placement-api-container, io.buildah.version=1.41.5, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:34:35Z, description=Red Hat OpenStack Platform 17.1 placement-api, container_name=placement_api, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, name=rhosp-rhel9/openstack-placement-api, vcs-type=git, io.openshift.expose-services=, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, config_id=tripleo_step4, tcib_managed=true, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, summary=Red Hat OpenStack Platform 17.1 placement-api, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc.) Feb 2 08:21:42 np0005604725 podman[163490]: 2026-02-02 08:21:42.767897611 +0000 UTC m=+0.461964386 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, distribution-scope=public, build-date=2026-01-12T22:34:35Z, vendor=Red Hat, Inc., version=17.1.13, vcs-type=git, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, name=rhosp-rhel9/openstack-placement-api, config_id=tripleo_step4, url=https://www.redhat.com, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, architecture=x86_64, io.openshift.expose-services=, com.redhat.component=openstack-placement-api-container, org.opencontainers.image.created=2026-01-12T22:34:35Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=placement_api, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 placement-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api) Feb 2 08:21:42 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:21:42 np0005604725 podman[163461]: 2026-02-02 08:21:42.792856503 +0000 UTC m=+0.507621530 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, io.buildah.version=1.41.5, batch=17.1_20260112.1, io.openshift.expose-services=, release=1766032510, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, container_name=swift_account_replicator, summary=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:50:44Z, vendor=Red Hat, Inc., version=17.1.13, vcs-type=git, build-date=2026-01-12T22:50:44Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, distribution-scope=public, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, name=rhosp-rhel9/openstack-swift-account, com.redhat.component=openstack-swift-account-container, url=https://www.redhat.com) Feb 2 08:21:42 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:21:42 np0005604725 podman[163481]: 2026-02-02 08:21:42.772808092 +0000 UTC m=+0.470382817 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=healthy, name=rhosp-rhel9/openstack-swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, description=Red Hat OpenStack Platform 17.1 swift-object, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, config_id=tripleo_step4, container_name=swift_object_replicator, vendor=Red Hat, Inc., io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, architecture=x86_64) Feb 2 08:21:42 np0005604725 podman[163484]: 2026-02-02 08:21:42.881402473 +0000 UTC m=+0.582130885 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=healthy, com.redhat.component=openstack-swift-account-container, vcs-type=git, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:50:44Z, build-date=2026-01-12T22:50:44Z, io.buildah.version=1.41.5, version=17.1.13, vendor=Red Hat, Inc., io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-swift-account, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 swift-account, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_account_server, description=Red Hat OpenStack Platform 17.1 swift-account, release=1766032510, tcib_managed=true, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, config_id=tripleo_step4, managed_by=tripleo_ansible) Feb 2 08:21:42 np0005604725 podman[163481]: 2026-02-02 08:21:42.887042738 +0000 UTC m=+0.584617493 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, config_id=tripleo_step4, io.openshift.expose-services=, name=rhosp-rhel9/openstack-swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:50:56Z, com.redhat.component=openstack-swift-object-container, vendor=Red Hat, Inc., distribution-scope=public, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=swift_object_replicator, managed_by=tripleo_ansible, version=17.1.13, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, build-date=2026-01-12T22:50:56Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 swift-object, batch=17.1_20260112.1, tcib_managed=true) Feb 2 08:21:42 np0005604725 podman[163479]: 2026-02-02 08:21:42.899123691 +0000 UTC m=+0.600328838 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, io.buildah.version=1.41.5, distribution-scope=public, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, org.opencontainers.image.created=2026-01-12T23:32:22Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, name=rhosp-rhel9/openstack-nova-novncproxy, release=1766032510, vcs-type=git, build-date=2026-01-12T23:32:22Z, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-nova-novncproxy-container, io.openshift.expose-services=, managed_by=tripleo_ansible, container_name=nova_vnc_proxy, version=17.1.13, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}) Feb 2 08:21:42 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Deactivated successfully. Feb 2 08:21:42 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Deactivated successfully. Feb 2 08:21:42 np0005604725 podman[163469]: 2026-02-02 08:21:42.923041612 +0000 UTC m=+0.627105397 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, description=Red Hat OpenStack Platform 17.1 swift-object, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:50:56Z, architecture=x86_64, release=1766032510, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, build-date=2026-01-12T22:50:56Z, tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, version=17.1.13, io.buildah.version=1.41.5, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, batch=17.1_20260112.1, url=https://www.redhat.com, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, container_name=swift_object_server, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, distribution-scope=public) Feb 2 08:21:42 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Deactivated successfully. Feb 2 08:21:43 np0005604725 podman[163484]: 2026-02-02 08:21:43.128163049 +0000 UTC m=+0.828891531 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, release=1766032510, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:50:44Z, summary=Red Hat OpenStack Platform 17.1 swift-account, name=rhosp-rhel9/openstack-swift-account, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, version=17.1.13, container_name=swift_account_server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:44Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, managed_by=tripleo_ansible, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 swift-account, io.buildah.version=1.41.5, tcib_managed=true, architecture=x86_64, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-swift-account-container, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:21:43 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Deactivated successfully. Feb 2 08:21:44 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:21:44 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:21:44 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:21:44 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:21:44 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:21:44 np0005604725 systemd[1]: tmp-crun.wPgBbK.mount: Deactivated successfully. Feb 2 08:21:44 np0005604725 podman[163799]: 2026-02-02 08:21:44.353838888 +0000 UTC m=+0.099821540 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, maintainer=OpenStack TripleO Team, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, release=1766032510, url=https://www.redhat.com, distribution-scope=public, batch=17.1_20260112.1, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-qdrouterd, container_name=metrics_qdr, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, config_id=tripleo_step1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13) Feb 2 08:21:44 np0005604725 podman[163800]: 2026-02-02 08:21:44.403679371 +0000 UTC m=+0.139115067 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=healthy, name=rhosp-rhel9/openstack-glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, distribution-scope=public, config_id=tripleo_step4, release=1766032510, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, build-date=2026-01-12T22:34:42Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, description=Red Hat OpenStack Platform 17.1 glance-api, container_name=glance_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:42Z, url=https://www.redhat.com, architecture=x86_64, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-glance-api-container, io.buildah.version=1.41.5, vendor=Red Hat, Inc.) Feb 2 08:21:44 np0005604725 systemd[1]: tmp-crun.znIAIy.mount: Deactivated successfully. Feb 2 08:21:44 np0005604725 podman[163798]: 2026-02-02 08:21:44.369196873 +0000 UTC m=+0.112718379 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=healthy, build-date=2026-01-12T22:34:42Z, vcs-type=git, architecture=x86_64, distribution-scope=public, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, release=1766032510, batch=17.1_20260112.1, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, summary=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, version=17.1.13, container_name=glance_api_internal, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-glance-api, org.opencontainers.image.created=2026-01-12T22:34:42Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., com.redhat.component=openstack-glance-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:21:44 np0005604725 podman[163815]: 2026-02-02 08:21:44.461104417 +0000 UTC m=+0.190459395 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=healthy, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, build-date=2026-01-12T22:50:56Z, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-object, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, config_id=tripleo_step4, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.component=openstack-swift-object-container, version=17.1.13, container_name=swift_rsync, io.openshift.expose-services=, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z) Feb 2 08:21:44 np0005604725 podman[163797]: 2026-02-02 08:21:44.423397831 +0000 UTC m=+0.168786165 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=healthy, distribution-scope=public, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-glance-api, release=1766032510, vcs-ref=705339545363fec600102567c4e923938e0f43b3, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.13, io.openshift.expose-services=, container_name=glance_api_cron, tcib_managed=true, config_id=tripleo_step4, build-date=2026-01-12T22:34:42Z, url=https://www.redhat.com, managed_by=tripleo_ansible, com.redhat.component=openstack-glance-api-container, org.opencontainers.image.created=2026-01-12T22:34:42Z, architecture=x86_64, vendor=Red Hat, Inc., org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api) Feb 2 08:21:44 np0005604725 podman[163797]: 2026-02-02 08:21:44.503769457 +0000 UTC m=+0.249157771 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=705339545363fec600102567c4e923938e0f43b3, release=1766032510, build-date=2026-01-12T22:34:42Z, org.opencontainers.image.created=2026-01-12T22:34:42Z, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, tcib_managed=true, com.redhat.component=openstack-glance-api-container, io.openshift.expose-services=, container_name=glance_api_cron, architecture=x86_64, distribution-scope=public, vendor=Red Hat, Inc., batch=17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp-rhel9/openstack-glance-api) Feb 2 08:21:44 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:21:44 np0005604725 podman[163799]: 2026-02-02 08:21:44.552905848 +0000 UTC m=+0.298888870 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-qdrouterd, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, container_name=metrics_qdr, batch=17.1_20260112.1, vcs-type=git, io.openshift.expose-services=, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_step1, vendor=Red Hat, Inc., com.redhat.component=openstack-qdrouterd-container, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, managed_by=tripleo_ansible, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:14Z, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2026-01-12T22:10:14Z, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd) Feb 2 08:21:44 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:21:44 np0005604725 podman[163800]: 2026-02-02 08:21:44.574772885 +0000 UTC m=+0.310208591 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:34:42Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, container_name=glance_api, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-glance-api, io.buildah.version=1.41.5, version=17.1.13, com.redhat.component=openstack-glance-api-container, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, tcib_managed=true, architecture=x86_64, managed_by=tripleo_ansible, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, build-date=2026-01-12T22:34:42Z, io.openshift.expose-services=, vendor=Red Hat, Inc., vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team) Feb 2 08:21:44 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Deactivated successfully. Feb 2 08:21:44 np0005604725 podman[163798]: 2026-02-02 08:21:44.598796688 +0000 UTC m=+0.342318154 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, tcib_managed=true, version=17.1.13, architecture=x86_64, config_id=tripleo_step4, com.redhat.component=openstack-glance-api-container, release=1766032510, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, container_name=glance_api_internal, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:34:42Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-glance-api, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:34:42Z, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git) Feb 2 08:21:44 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Deactivated successfully. Feb 2 08:21:44 np0005604725 podman[163815]: 2026-02-02 08:21:44.838884718 +0000 UTC m=+0.568239746 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 swift-object, description=Red Hat OpenStack Platform 17.1 swift-object, release=1766032510, com.redhat.component=openstack-swift-object-container, io.buildah.version=1.41.5, build-date=2026-01-12T22:50:56Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, managed_by=tripleo_ansible, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:50:56Z, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, name=rhosp-rhel9/openstack-swift-object, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, distribution-scope=public, tcib_managed=true, version=17.1.13, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_rsync) Feb 2 08:21:44 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:21:48 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:21:48 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:21:48 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:21:48 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:21:48 np0005604725 podman[164110]: 2026-02-02 08:21:48.36685322 +0000 UTC m=+0.095635831 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=healthy, com.redhat.component=openstack-swift-proxy-server-container, architecture=x86_64, vendor=Red Hat, Inc., build-date=2026-01-12T22:50:51Z, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=swift_proxy, tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, version=17.1.13, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, io.buildah.version=1.41.5, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:50:51Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1766032510, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-swift-proxy-server, managed_by=tripleo_ansible) Feb 2 08:21:48 np0005604725 podman[164108]: 2026-02-02 08:21:48.437185046 +0000 UTC m=+0.168134164 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.5, build-date=2026-01-12T23:31:50Z, config_id=tripleo_step4, tcib_managed=true, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., distribution-scope=public, architecture=x86_64, container_name=nova_metadata, vcs-type=git, release=1766032510, com.redhat.component=openstack-nova-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T23:31:50Z, version=17.1.13, url=https://www.redhat.com, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp-rhel9/openstack-nova-api, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:21:48 np0005604725 systemd[1]: tmp-crun.p3IPGL.mount: Deactivated successfully. Feb 2 08:21:48 np0005604725 podman[164109]: 2026-02-02 08:21:48.496727749 +0000 UTC m=+0.225446648 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=healthy, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.created=2026-01-12T23:31:50Z, vcs-type=git, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, distribution-scope=public, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, version=17.1.13, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, batch=17.1_20260112.1, container_name=nova_api, com.redhat.component=openstack-nova-api-container, config_id=tripleo_step4, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T23:31:50Z, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, release=1766032510) Feb 2 08:21:48 np0005604725 podman[164107]: 2026-02-02 08:21:48.523548019 +0000 UTC m=+0.255521658 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=healthy, url=https://www.redhat.com, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, architecture=x86_64, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, container_name=nova_api_cron, config_id=tripleo_step4, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:31:50Z, tcib_managed=true, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, build-date=2026-01-12T23:31:50Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, vcs-type=git, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team) Feb 2 08:21:48 np0005604725 podman[164107]: 2026-02-02 08:21:48.538823732 +0000 UTC m=+0.270797411 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, managed_by=tripleo_ansible, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-api-container, release=1766032510, build-date=2026-01-12T23:31:50Z, org.opencontainers.image.created=2026-01-12T23:31:50Z, batch=17.1_20260112.1, config_id=tripleo_step4, container_name=nova_api_cron, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., version=17.1.13, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-nova-api, maintainer=OpenStack TripleO Team, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, description=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vcs-type=git) Feb 2 08:21:48 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:21:48 np0005604725 podman[164109]: 2026-02-02 08:21:48.567965813 +0000 UTC m=+0.296684762 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, version=17.1.13, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, description=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.5, com.redhat.component=openstack-nova-api-container, container_name=nova_api, io.openshift.expose-services=, name=rhosp-rhel9/openstack-nova-api, distribution-scope=public, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T23:31:50Z, config_id=tripleo_step4, architecture=x86_64, url=https://www.redhat.com, vcs-type=git, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:21:48 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:21:48 np0005604725 podman[164108]: 2026-02-02 08:21:48.595106454 +0000 UTC m=+0.326055562 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, container_name=nova_metadata, name=rhosp-rhel9/openstack-nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, build-date=2026-01-12T23:31:50Z, com.redhat.component=openstack-nova-api-container, architecture=x86_64, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, maintainer=OpenStack TripleO Team, vcs-type=git, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, io.buildah.version=1.41.5, url=https://www.redhat.com, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.openshift.expose-services=, version=17.1.13, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-api) Feb 2 08:21:48 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:21:48 np0005604725 podman[164110]: 2026-02-02 08:21:48.613817942 +0000 UTC m=+0.342600553 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, container_name=swift_proxy, io.openshift.expose-services=, name=rhosp-rhel9/openstack-swift-proxy-server, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-proxy-server-container, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:51Z, io.buildah.version=1.41.5, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:50:51Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, vcs-type=git, version=17.1.13, distribution-scope=public, config_id=tripleo_step4, maintainer=OpenStack TripleO Team) Feb 2 08:21:48 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Deactivated successfully. Feb 2 08:21:55 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:21:55 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:21:55 np0005604725 podman[164530]: 2026-02-02 08:21:55.330136729 +0000 UTC m=+0.073997262 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, io.openshift.expose-services=, version=17.1.13, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, architecture=x86_64, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:10:15Z, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, description=Red Hat OpenStack Platform 17.1 collectd, config_id=tripleo_step3, com.redhat.component=openstack-collectd-container, batch=17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-collectd, container_name=collectd, distribution-scope=public, tcib_managed=true, vcs-type=git, build-date=2026-01-12T22:10:15Z) Feb 2 08:21:55 np0005604725 podman[164533]: 2026-02-02 08:21:55.400795755 +0000 UTC m=+0.138214148 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, summary=Red Hat OpenStack Platform 17.1 horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 horizon, vendor=Red Hat, Inc., architecture=x86_64, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-horizon, version=17.1.13, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, tcib_managed=true, release=1766032510, vcs-type=git, config_id=tripleo_step3, url=https://www.redhat.com, com.redhat.component=openstack-horizon-container, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, container_name=horizon, batch=17.1_20260112.1, build-date=2026-01-12T22:34:41Z, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.created=2026-01-12T22:34:41Z, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:21:55 np0005604725 podman[164530]: 2026-02-02 08:21:55.423013213 +0000 UTC m=+0.166873716 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:10:15Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:15Z, version=17.1.13, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step3, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-collectd-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, architecture=x86_64, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 collectd, managed_by=tripleo_ansible, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-collectd, container_name=collectd, maintainer=OpenStack TripleO Team) Feb 2 08:21:55 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:21:55 np0005604725 podman[164533]: 2026-02-02 08:21:55.456819369 +0000 UTC m=+0.194237782 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:34:41Z, build-date=2026-01-12T22:34:41Z, architecture=x86_64, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, url=https://www.redhat.com, config_id=tripleo_step3, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, version=17.1.13, vcs-ref=705339545363fec600102567c4e923938e0f43b3, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., release=1766032510, com.redhat.component=openstack-horizon-container, description=Red Hat OpenStack Platform 17.1 horizon, distribution-scope=public, name=rhosp-rhel9/openstack-horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, container_name=horizon, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, managed_by=tripleo_ansible) Feb 2 08:21:55 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:21:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:21:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:21:58 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:21:58 np0005604725 podman[164866]: 2026-02-02 08:21:58.335230801 +0000 UTC m=+0.073124824 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, summary=Red Hat OpenStack Platform 17.1 iscsid, vcs-type=git, batch=17.1_20260112.1, vendor=Red Hat, Inc., config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, container_name=iscsid, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, name=rhosp-rhel9/openstack-iscsid, description=Red Hat OpenStack Platform 17.1 iscsid, build-date=2026-01-12T22:34:43Z, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-iscsid-container, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, io.buildah.version=1.41.5, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:34:43Z, tcib_managed=true, maintainer=OpenStack TripleO Team, release=1766032510, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid) Feb 2 08:21:58 np0005604725 podman[164866]: 2026-02-02 08:21:58.377307033 +0000 UTC m=+0.115201046 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, maintainer=OpenStack TripleO Team, vcs-ref=705339545363fec600102567c4e923938e0f43b3, description=Red Hat OpenStack Platform 17.1 iscsid, release=1766032510, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-iscsid-container, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_step3, managed_by=tripleo_ansible, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-iscsid, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:34:43Z, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, io.openshift.expose-services=, architecture=x86_64, build-date=2026-01-12T22:34:43Z, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.13, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, distribution-scope=public, container_name=iscsid) Feb 2 08:21:58 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:21:58 np0005604725 podman[164861]: 2026-02-02 08:21:58.455587016 +0000 UTC m=+0.194483500 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, version=17.1.13, vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-keystone, com.redhat.component=openstack-keystone-container, url=https://www.redhat.com, managed_by=tripleo_ansible, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:33:53Z, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, build-date=2026-01-12T22:33:53Z, release=1766032510, distribution-scope=public, container_name=keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:21:58 np0005604725 systemd[1]: tmp-crun.Wxmgsa.mount: Deactivated successfully. Feb 2 08:21:58 np0005604725 podman[164862]: 2026-02-02 08:21:58.507461381 +0000 UTC m=+0.246590082 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, vcs-ref=705339545363fec600102567c4e923938e0f43b3, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:33:53Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, build-date=2026-01-12T22:33:53Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.buildah.version=1.41.5, container_name=keystone_cron, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, batch=17.1_20260112.1, config_id=tripleo_step3, version=17.1.13, release=1766032510, summary=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, com.redhat.component=openstack-keystone-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com) Feb 2 08:21:58 np0005604725 podman[164861]: 2026-02-02 08:21:58.529906285 +0000 UTC m=+0.268802679 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, name=rhosp-rhel9/openstack-keystone, distribution-scope=public, config_id=tripleo_step3, description=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, io.buildah.version=1.41.5, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 keystone, build-date=2026-01-12T22:33:53Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:33:53Z, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-keystone-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, container_name=keystone) Feb 2 08:21:58 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:21:58 np0005604725 podman[164862]: 2026-02-02 08:21:58.544098294 +0000 UTC m=+0.283226955 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step3, io.openshift.expose-services=, release=1766032510, vendor=Red Hat, Inc., io.buildah.version=1.41.5, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:33:53Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, description=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, container_name=keystone_cron, distribution-scope=public, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, tcib_managed=true, architecture=x86_64, name=rhosp-rhel9/openstack-keystone, build-date=2026-01-12T22:33:53Z) Feb 2 08:21:58 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:21:59 np0005604725 python3[165015]: ansible-ansible.legacy.dnf Invoked with name=['sos'] state=latest allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 2 08:22:03 np0005604725 systemd[1]: tmp-crun.rcyMzO.mount: Deactivated successfully. Feb 2 08:22:03 np0005604725 podman[165112]: 2026-02-02 08:22:03.334967378 +0000 UTC m=+0.116407643 container exec 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, com.redhat.component=openstack-mariadb-container, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:10:18Z, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 mariadb, release=1766032510, build-date=2026-01-12T22:10:18Z, name=rhosp-rhel9/openstack-mariadb, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, vcs-type=git) Feb 2 08:22:03 np0005604725 podman[165112]: 2026-02-02 08:22:03.3654053 +0000 UTC m=+0.146845545 container exec_died 760643e25db5fc54b11a796f4e75c8130e96d9934f7982d78ac566a846ff2c1f (image=cluster.common.tag/mariadb:pcmklatest, name=galera-bundle-podman-1, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.openshift.expose-services=, distribution-scope=public, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, url=https://www.redhat.com, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:18Z, release=1766032510, com.redhat.component=openstack-mariadb-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:10:18Z, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:22:03 np0005604725 podman[165157]: 2026-02-02 08:22:03.902834901 +0000 UTC m=+0.078138319 container exec 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-haproxy, io.buildah.version=1.41.5, vcs-type=git, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:10:12Z, tcib_managed=true, release=1766032510, distribution-scope=public, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, build-date=2026-01-12T22:10:12Z, architecture=x86_64, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 haproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy) Feb 2 08:22:03 np0005604725 podman[165157]: 2026-02-02 08:22:03.932980644 +0000 UTC m=+0.108284032 container exec_died 7fddff99952fb4ebf284f1eeaa9d19ab29a5bb08b382a32e3c6bbc41c1618d65 (image=cluster.common.tag/haproxy:pcmklatest, name=haproxy-bundle-podman-1, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 haproxy, batch=17.1_20260112.1, version=17.1.13, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, architecture=x86_64, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 haproxy, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:10:12Z, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, com.redhat.component=openstack-haproxy-container, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:10:12Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, distribution-scope=public, name=rhosp-rhel9/openstack-haproxy) Feb 2 08:22:04 np0005604725 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 2 08:22:04 np0005604725 systemd[1]: Starting man-db-cache-update.service... Feb 2 08:22:04 np0005604725 podman[165165]: 2026-02-02 08:22:04.029570723 +0000 UTC m=+0.191981762 container exec 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, tcib_managed=true, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.buildah.version=1.41.5, distribution-scope=public, com.redhat.component=openstack-redis-container, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 redis, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:10:16Z, build-date=2026-01-12T22:10:16Z, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, version=17.1.13, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, name=rhosp-rhel9/openstack-redis, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510) Feb 2 08:22:04 np0005604725 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 2 08:22:04 np0005604725 podman[165165]: 2026-02-02 08:22:04.057983462 +0000 UTC m=+0.220394491 container exec_died 8df70c2f5f2d084adc101d4f6af46e2f1e60d15d56112303846142db96d75689 (image=cluster.common.tag/redis:pcmklatest, name=redis-bundle-podman-1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, description=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, vcs-type=git, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, tcib_managed=true, io.buildah.version=1.41.5, io.openshift.expose-services=, url=https://www.redhat.com, batch=17.1_20260112.1, architecture=x86_64, name=rhosp-rhel9/openstack-redis, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:10:16Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:16Z, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, version=17.1.13) Feb 2 08:22:04 np0005604725 podman[165215]: 2026-02-02 08:22:04.210878293 +0000 UTC m=+0.204520450 container exec 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp-rhel9/openstack-rabbitmq, distribution-scope=public, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, version=17.1.13, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, architecture=x86_64, tcib_managed=true, io.buildah.version=1.41.5, url=https://www.redhat.com, build-date=2026-01-12T22:10:14Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.created=2026-01-12T22:10:14Z, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 rabbitmq) Feb 2 08:22:04 np0005604725 podman[165215]: 2026-02-02 08:22:04.238841089 +0000 UTC m=+0.232483156 container exec_died 0cc5cd8a30efc00a467aec8b2b9cfa84640154d0a486fe3951ee9ae3264ebbec (image=cluster.common.tag/rabbitmq:pcmklatest, name=rabbitmq-bundle-podman-1, tcib_managed=true, url=https://www.redhat.com, build-date=2026-01-12T22:10:14Z, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-rabbitmq, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, vendor=Red Hat, Inc., version=17.1.13, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:10:14Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, com.redhat.component=openstack-rabbitmq-container) Feb 2 08:22:04 np0005604725 systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 2 08:22:04 np0005604725 systemd[1]: Finished man-db-cache-update.service. Feb 2 08:22:04 np0005604725 systemd[1]: run-rc59fc0bd483b4d58ab92f13e36b796eb.service: Deactivated successfully. Feb 2 08:22:04 np0005604725 systemd[1]: run-r52f242951d554d0ca752ae7cfa72cc2a.service: Deactivated successfully. Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:22:05 np0005604725 systemd[1]: tmp-crun.1cegaR.mount: Deactivated successfully. Feb 2 08:22:05 np0005604725 podman[165516]: 2026-02-02 08:22:05.372451959 +0000 UTC m=+0.099452139 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, io.openshift.expose-services=, name=rhosp-rhel9/openstack-cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, architecture=x86_64, com.redhat.component=openstack-cinder-api-container, version=17.1.13, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vcs-type=git, build-date=2026-01-12T22:58:44Z, summary=Red Hat OpenStack Platform 17.1 cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., managed_by=tripleo_ansible, config_id=tripleo_step4, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, container_name=cinder_api_cron, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, url=https://www.redhat.com) Feb 2 08:22:05 np0005604725 podman[165498]: 2026-02-02 08:22:05.385402689 +0000 UTC m=+0.131480670 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=healthy, build-date=2026-01-12T22:58:47Z, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, tcib_managed=true, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, url=https://www.redhat.com, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-cinder-scheduler, distribution-scope=public, release=1766032510, version=17.1.13, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, container_name=cinder_scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, com.redhat.component=openstack-cinder-scheduler-container, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:58:47Z, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:22:05 np0005604725 podman[165501]: 2026-02-02 08:22:05.340832799 +0000 UTC m=+0.082276236 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=healthy, summary=Red Hat OpenStack Platform 17.1 heat-engine, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, config_id=tripleo_step4, name=rhosp-rhel9/openstack-heat-engine, container_name=heat_engine, url=https://www.redhat.com, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 heat-engine, io.buildah.version=1.41.5, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:53:38Z, release=1766032510, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, build-date=2026-01-12T22:53:38Z, distribution-scope=public, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, vcs-ref=755001522886c265e88561b4997cab642504a845, com.redhat.component=openstack-heat-engine-container) Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:22:05 np0005604725 podman[165501]: 2026-02-02 08:22:05.428362429 +0000 UTC m=+0.169805886 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 heat-engine, org.opencontainers.image.created=2026-01-12T22:53:38Z, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, distribution-scope=public, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, container_name=heat_engine, io.openshift.expose-services=, release=1766032510, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 heat-engine, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, version=17.1.13, name=rhosp-rhel9/openstack-heat-engine, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, build-date=2026-01-12T22:53:38Z, vendor=Red Hat, Inc., batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, tcib_managed=true, vcs-type=git, io.buildah.version=1.41.5, architecture=x86_64, vcs-ref=755001522886c265e88561b4997cab642504a845, com.redhat.component=openstack-heat-engine-container) Feb 2 08:22:05 np0005604725 podman[165498]: 2026-02-02 08:22:05.439990228 +0000 UTC m=+0.186068229 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, container_name=cinder_scheduler, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, architecture=x86_64, io.buildah.version=1.41.5, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:58:47Z, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.openshift.expose-services=, config_id=tripleo_step4, tcib_managed=true, build-date=2026-01-12T22:58:47Z, batch=17.1_20260112.1, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-cinder-scheduler, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, vcs-type=git, com.redhat.component=openstack-cinder-scheduler-container, maintainer=OpenStack TripleO Team) Feb 2 08:22:05 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:22:05 np0005604725 podman[165497]: 2026-02-02 08:22:05.449568084 +0000 UTC m=+0.198522614 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, description=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, tcib_managed=true, architecture=x86_64, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible, build-date=2026-01-12T22:53:19Z, io.openshift.expose-services=, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-heat-api, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, io.buildah.version=1.41.5, container_name=heat_api_cron, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:53:19Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:22:05 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:22:05 np0005604725 podman[165516]: 2026-02-02 08:22:05.459302496 +0000 UTC m=+0.186302686 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, com.redhat.component=openstack-cinder-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, release=1766032510, description=Red Hat OpenStack Platform 17.1 cinder-api, config_id=tripleo_step4, url=https://www.redhat.com, architecture=x86_64, build-date=2026-01-12T22:58:44Z, vendor=Red Hat, Inc., version=17.1.13, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:58:44Z, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vcs-type=git, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, summary=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, container_name=cinder_api_cron, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:22:05 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:22:05 np0005604725 podman[165601]: 2026-02-02 08:22:05.509904222 +0000 UTC m=+0.071308038 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=healthy, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, name=rhosp-rhel9/openstack-manila-api, url=https://www.redhat.com, distribution-scope=public, com.redhat.component=openstack-manila-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, vcs-type=git, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:52:22Z, config_id=tripleo_step4, container_name=manila_api_cron, org.opencontainers.image.created=2026-01-12T22:52:22Z, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, managed_by=tripleo_ansible, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, batch=17.1_20260112.1, version=17.1.13, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api) Feb 2 08:22:05 np0005604725 podman[165497]: 2026-02-02 08:22:05.51373346 +0000 UTC m=+0.262687990 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, distribution-scope=public, io.buildah.version=1.41.5, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 heat-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, container_name=heat_api_cron, release=1766032510, io.openshift.expose-services=, url=https://www.redhat.com, com.redhat.component=openstack-heat-api-container, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.created=2026-01-12T22:53:19Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, vendor=Red Hat, Inc., tcib_managed=true, config_id=tripleo_step4, vcs-ref=755001522886c265e88561b4997cab642504a845, vcs-type=git, name=rhosp-rhel9/openstack-heat-api, build-date=2026-01-12T22:53:19Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:22:05 np0005604725 podman[165601]: 2026-02-02 08:22:05.523711739 +0000 UTC m=+0.085115565 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, managed_by=tripleo_ansible, com.redhat.component=openstack-manila-api-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, org.opencontainers.image.created=2026-01-12T22:52:22Z, summary=Red Hat OpenStack Platform 17.1 manila-api, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, container_name=manila_api_cron, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, url=https://www.redhat.com, io.buildah.version=1.41.5, build-date=2026-01-12T22:52:22Z, tcib_managed=true, version=17.1.13, vendor=Red Hat, Inc., architecture=x86_64, name=rhosp-rhel9/openstack-manila-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, io.openshift.expose-services=, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, description=Red Hat OpenStack Platform 17.1 manila-api, distribution-scope=public) Feb 2 08:22:05 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:22:05 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:22:05 np0005604725 podman[165496]: 2026-02-02 08:22:05.595297114 +0000 UTC m=+0.345001217 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=healthy, io.buildah.version=1.41.5, io.openshift.expose-services=, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, managed_by=tripleo_ansible, distribution-scope=public, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-ceilometer-central, vendor=Red Hat, Inc., container_name=ceilometer_agent_central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, description=Red Hat OpenStack Platform 17.1 ceilometer-central, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T23:07:24Z, architecture=x86_64, build-date=2026-01-12T23:07:24Z, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, release=1766032510, com.redhat.component=openstack-ceilometer-central-container, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, maintainer=OpenStack TripleO Team, vcs-type=git) Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:22:05 np0005604725 podman[165522]: 2026-02-02 08:22:05.663555547 +0000 UTC m=+0.396678867 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=healthy, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, version=17.1.13, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, tcib_managed=true, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T23:07:25Z, name=rhosp-rhel9/openstack-ceilometer-notification, com.redhat.component=openstack-ceilometer-notification-container, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, build-date=2026-01-12T23:07:25Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, io.openshift.expose-services=, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=ceilometer_agent_notification, release=1766032510, config_id=tripleo_step4, architecture=x86_64, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:22:05 np0005604725 podman[165522]: 2026-02-02 08:22:05.685862296 +0000 UTC m=+0.418985616 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, release=1766032510, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=ceilometer_agent_notification, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, config_id=tripleo_step4, maintainer=OpenStack TripleO Team, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, tcib_managed=true, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, build-date=2026-01-12T23:07:25Z, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, url=https://www.redhat.com, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, version=17.1.13, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-ceilometer-notification-container, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T23:07:25Z, name=rhosp-rhel9/openstack-ceilometer-notification, vendor=Red Hat, Inc., io.buildah.version=1.41.5) Feb 2 08:22:05 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:22:05 np0005604725 podman[165496]: 2026-02-02 08:22:05.72993095 +0000 UTC m=+0.479635053 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, build-date=2026-01-12T23:07:24Z, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, tcib_managed=true, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 ceilometer-central, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, com.redhat.component=openstack-ceilometer-central-container, managed_by=tripleo_ansible, vcs-type=git, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T23:07:24Z, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=ceilometer_agent_central, version=17.1.13, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-ceilometer-central, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central) Feb 2 08:22:05 np0005604725 podman[165510]: 2026-02-02 08:22:05.759591368 +0000 UTC m=+0.495978119 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, config_id=tripleo_step2, distribution-scope=public, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp-rhel9/openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 mariadb, container_name=clustercheck, io.buildah.version=1.41.5, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-mariadb-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, version=17.1.13, release=1766032510, url=https://www.redhat.com, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:18Z, build-date=2026-01-12T22:10:18Z, managed_by=tripleo_ansible) Feb 2 08:22:05 np0005604725 podman[165664]: 2026-02-02 08:22:05.723677817 +0000 UTC m=+0.060193483 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=healthy, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, description=Red Hat OpenStack Platform 17.1 neutron-server, summary=Red Hat OpenStack Platform 17.1 neutron-server, version=17.1.13, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=neutron_api, org.opencontainers.image.created=2026-01-12T22:57:35Z, build-date=2026-01-12T22:57:35Z, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, release=1766032510, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.expose-services=, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, com.redhat.component=openstack-neutron-server-container, url=https://www.redhat.com, architecture=x86_64, config_id=tripleo_step4) Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:22:05 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:22:05 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:22:05 np0005604725 podman[165657]: 2026-02-02 08:22:05.757544085 +0000 UTC m=+0.097570751 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, vendor=Red Hat, Inc., container_name=nova_conductor, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 nova-conductor, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, name=rhosp-rhel9/openstack-nova-conductor, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-nova-conductor-container, maintainer=OpenStack TripleO Team, version=17.1.13, build-date=2026-01-12T23:32:18Z, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T23:32:18Z, tcib_managed=true, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 nova-conductor) Feb 2 08:22:05 np0005604725 podman[165658]: 2026-02-02 08:22:05.775129499 +0000 UTC m=+0.117534438 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, container_name=heat_api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-heat-api, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, tcib_managed=true, distribution-scope=public, vendor=Red Hat, Inc., url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, release=1766032510, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:53:19Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=755001522886c265e88561b4997cab642504a845, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, build-date=2026-01-12T22:53:19Z, com.redhat.component=openstack-heat-api-container) Feb 2 08:22:05 np0005604725 podman[165657]: 2026-02-02 08:22:05.845205737 +0000 UTC m=+0.185232403 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, batch=17.1_20260112.1, build-date=2026-01-12T23:32:18Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 nova-conductor, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, distribution-scope=public, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, tcib_managed=true, maintainer=OpenStack TripleO Team, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, description=Red Hat OpenStack Platform 17.1 nova-conductor, name=rhosp-rhel9/openstack-nova-conductor, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, com.redhat.component=openstack-nova-conductor-container, release=1766032510, vcs-type=git, org.opencontainers.image.created=2026-01-12T23:32:18Z, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=nova_conductor, io.openshift.expose-services=, architecture=x86_64, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4) Feb 2 08:22:05 np0005604725 podman[165653]: 2026-02-02 08:22:05.851553804 +0000 UTC m=+0.196811802 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, build-date=2026-01-12T22:58:44Z, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, container_name=cinder_api, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 cinder-api, vcs-type=git, managed_by=tripleo_ansible, version=17.1.13, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.created=2026-01-12T22:58:44Z, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, batch=17.1_20260112.1, com.redhat.component=openstack-cinder-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, vendor=Red Hat, Inc., config_id=tripleo_step4, name=rhosp-rhel9/openstack-cinder-api, tcib_managed=true, architecture=x86_64) Feb 2 08:22:05 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:22:05 np0005604725 podman[165510]: 2026-02-02 08:22:05.870710156 +0000 UTC m=+0.607096847 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, io.openshift.expose-services=, io.buildah.version=1.41.5, batch=17.1_20260112.1, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, tcib_managed=true, release=1766032510, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-mariadb-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step2, container_name=clustercheck, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2026-01-12T22:10:18Z, org.opencontainers.image.created=2026-01-12T22:10:18Z, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb) Feb 2 08:22:05 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:22:05 np0005604725 podman[165771]: 2026-02-02 08:22:05.929887958 +0000 UTC m=+0.124525475 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, architecture=x86_64, batch=17.1_20260112.1, release=1766032510, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, vendor=Red Hat, Inc., config_id=tripleo_step4, tcib_managed=true, vcs-ref=755001522886c265e88561b4997cab642504a845, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, maintainer=OpenStack TripleO Team, vcs-type=git, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:54:02Z, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, com.redhat.component=openstack-heat-api-cfn-container, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, url=https://www.redhat.com, name=rhosp-rhel9/openstack-heat-api-cfn, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, io.openshift.expose-services=, build-date=2026-01-12T22:54:02Z, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=heat_api_cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:22:05 np0005604725 podman[165653]: 2026-02-02 08:22:05.93384141 +0000 UTC m=+0.279099408 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, vcs-type=git, architecture=x86_64, config_id=tripleo_step4, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, name=rhosp-rhel9/openstack-cinder-api, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 cinder-api, build-date=2026-01-12T22:58:44Z, container_name=cinder_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.created=2026-01-12T22:58:44Z, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, maintainer=OpenStack TripleO Team) Feb 2 08:22:05 np0005604725 podman[165664]: 2026-02-02 08:22:05.940405643 +0000 UTC m=+0.276921339 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, managed_by=tripleo_ansible, vcs-type=git, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 neutron-server, name=rhosp-rhel9/openstack-neutron-server, release=1766032510, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, build-date=2026-01-12T22:57:35Z, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, io.buildah.version=1.41.5, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, url=https://www.redhat.com, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, architecture=x86_64, container_name=neutron_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:57:35Z) Feb 2 08:22:05 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:22:05 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:22:05 np0005604725 podman[165777]: 2026-02-02 08:22:05.916254626 +0000 UTC m=+0.117141466 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=healthy, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, distribution-scope=public, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-scheduler-container, name=rhosp-rhel9/openstack-nova-scheduler, build-date=2026-01-12T23:32:05Z, io.buildah.version=1.41.5, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, config_id=tripleo_step4, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 nova-scheduler, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vcs-type=git, release=1766032510, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, container_name=nova_scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T23:32:05Z) Feb 2 08:22:05 np0005604725 podman[165658]: 2026-02-02 08:22:05.983663512 +0000 UTC m=+0.326068431 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, version=17.1.13, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-heat-api, release=1766032510, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, tcib_managed=true, vcs-ref=755001522886c265e88561b4997cab642504a845, description=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, container_name=heat_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, managed_by=tripleo_ansible, architecture=x86_64, io.openshift.expose-services=, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, org.opencontainers.image.created=2026-01-12T22:53:19Z, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 heat-api) Feb 2 08:22:05 np0005604725 podman[165768]: 2026-02-02 08:22:05.8856757 +0000 UTC m=+0.092579776 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, build-date=2026-01-12T22:10:15Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:15Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, url=https://www.redhat.com, io.openshift.expose-services=, distribution-scope=public, architecture=x86_64, maintainer=OpenStack TripleO Team, container_name=logrotate_crond, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., release=1766032510, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, com.redhat.component=openstack-cron-container, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 cron, version=17.1.13, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cron, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-cron, batch=17.1_20260112.1, config_id=tripleo_step4) Feb 2 08:22:05 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:22:05 np0005604725 podman[165777]: 2026-02-02 08:22:05.997727347 +0000 UTC m=+0.198614197 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, org.opencontainers.image.created=2026-01-12T23:32:05Z, build-date=2026-01-12T23:32:05Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, batch=17.1_20260112.1, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, managed_by=tripleo_ansible, version=17.1.13, tcib_managed=true, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 nova-scheduler, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-scheduler-container, vendor=Red Hat, Inc., vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, name=rhosp-rhel9/openstack-nova-scheduler, vcs-type=git, io.openshift.expose-services=, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, container_name=nova_scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, maintainer=OpenStack TripleO Team) Feb 2 08:22:06 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:22:06 np0005604725 podman[165768]: 2026-02-02 08:22:06.02172842 +0000 UTC m=+0.228632486 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 cron, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cron, release=1766032510, org.opencontainers.image.created=2026-01-12T22:10:15Z, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, managed_by=tripleo_ansible, build-date=2026-01-12T22:10:15Z, architecture=x86_64, container_name=logrotate_crond, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, com.redhat.component=openstack-cron-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-cron, config_id=tripleo_step4, tcib_managed=true, vendor=Red Hat, Inc., version=17.1.13, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.buildah.version=1.41.5) Feb 2 08:22:06 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:22:06 np0005604725 podman[165708]: 2026-02-02 08:22:05.937431191 +0000 UTC m=+0.219811952 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=healthy, container_name=manila_scheduler, com.redhat.component=openstack-manila-scheduler-container, vcs-type=git, architecture=x86_64, io.buildah.version=1.41.5, release=1766032510, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:52:54Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, managed_by=tripleo_ansible, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, distribution-scope=public, build-date=2026-01-12T22:52:54Z, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, url=https://www.redhat.com, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 manila-scheduler, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-manila-scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team) Feb 2 08:22:06 np0005604725 podman[165708]: 2026-02-02 08:22:06.069282511 +0000 UTC m=+0.351663302 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, container_name=manila_scheduler, io.openshift.expose-services=, name=rhosp-rhel9/openstack-manila-scheduler, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 manila-scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:52:54Z, release=1766032510, io.buildah.version=1.41.5, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, vcs-type=git, batch=17.1_20260112.1, build-date=2026-01-12T22:52:54Z, vendor=Red Hat, Inc., com.redhat.component=openstack-manila-scheduler-container, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, url=https://www.redhat.com, architecture=x86_64, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4) Feb 2 08:22:06 np0005604725 podman[165771]: 2026-02-02 08:22:06.090187078 +0000 UTC m=+0.284824655 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, vcs-type=git, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_id=tripleo_step4, release=1766032510, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, org.opencontainers.image.created=2026-01-12T22:54:02Z, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, com.redhat.component=openstack-heat-api-cfn-container, managed_by=tripleo_ansible, tcib_managed=true, io.buildah.version=1.41.5, build-date=2026-01-12T22:54:02Z, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-heat-api-cfn, container_name=heat_api_cfn, version=17.1.13, distribution-scope=public, batch=17.1_20260112.1, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn) Feb 2 08:22:06 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:22:06 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:22:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad. Feb 2 08:22:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283. Feb 2 08:22:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730. Feb 2 08:22:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836. Feb 2 08:22:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722. Feb 2 08:22:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39. Feb 2 08:22:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750. Feb 2 08:22:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94. Feb 2 08:22:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc. Feb 2 08:22:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c. Feb 2 08:22:13 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4. Feb 2 08:22:13 np0005604725 podman[166346]: 2026-02-02 08:22:13.396645415 +0000 UTC m=+0.111680787 container health_status bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, health_status=healthy, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:50:56Z, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, name=rhosp-rhel9/openstack-swift-object, summary=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64, url=https://www.redhat.com, vendor=Red Hat, Inc., version=17.1.13, container_name=swift_object_replicator, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.expose-services=, release=1766032510, tcib_managed=true, com.redhat.component=openstack-swift-object-container, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, distribution-scope=public, build-date=2026-01-12T22:50:56Z, maintainer=OpenStack TripleO Team) Feb 2 08:22:13 np0005604725 systemd[1]: tmp-crun.tFc7ax.mount: Deactivated successfully. Feb 2 08:22:13 np0005604725 podman[166320]: 2026-02-02 08:22:13.4972731 +0000 UTC m=+0.233722635 container health_status 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, release=1766032510, url=https://www.redhat.com, container_name=memcached, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, build-date=2026-01-12T22:12:26Z, io.openshift.expose-services=, com.redhat.component=openstack-memcached-container, config_id=tripleo_step1, managed_by=tripleo_ansible, distribution-scope=public, vcs-type=git, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 memcached, name=rhosp-rhel9/openstack-memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5) Feb 2 08:22:13 np0005604725 podman[166321]: 2026-02-02 08:22:13.440544724 +0000 UTC m=+0.168134224 container health_status 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.component=openstack-swift-container-container, description=Red Hat OpenStack Platform 17.1 swift-container, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, config_id=tripleo_step4, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, build-date=2026-01-12T22:50:57Z, version=17.1.13, name=rhosp-rhel9/openstack-swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, io.openshift.expose-services=, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, managed_by=tripleo_ansible, vendor=Red Hat, Inc., container_name=swift_container_server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, maintainer=OpenStack TripleO Team, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:22:13 np0005604725 podman[166346]: 2026-02-02 08:22:13.511414717 +0000 UTC m=+0.226450079 container exec_died bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_replicator, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-object, version=17.1.13, name=rhosp-rhel9/openstack-swift-object, vcs-type=git, description=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:50:56Z, com.redhat.component=openstack-swift-object-container, tcib_managed=true, architecture=x86_64, build-date=2026-01-12T22:50:56Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, managed_by=tripleo_ansible, container_name=swift_object_replicator, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, io.buildah.version=1.41.5, batch=17.1_20260112.1) Feb 2 08:22:13 np0005604725 podman[166320]: 2026-02-02 08:22:13.511204611 +0000 UTC m=+0.247654156 container exec_died 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, release=1766032510, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-memcached-container, io.openshift.expose-services=, name=rhosp-rhel9/openstack-memcached, org.opencontainers.image.created=2026-01-12T22:12:26Z, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 memcached, build-date=2026-01-12T22:12:26Z, container_name=memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, tcib_managed=true, managed_by=tripleo_ansible, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, summary=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public, vendor=Red Hat, Inc., io.buildah.version=1.41.5, config_id=tripleo_step1, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, url=https://www.redhat.com) Feb 2 08:22:13 np0005604725 systemd[1]: bf650e98991182413c01243faac6402019f5d3c3ff016c4c9e148d12a4003a94.service: Deactivated successfully. Feb 2 08:22:13 np0005604725 podman[166319]: 2026-02-02 08:22:13.560644251 +0000 UTC m=+0.300393198 container health_status 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, health_status=healthy, org.opencontainers.image.created=2026-01-12T22:36:40Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T22:36:40Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, architecture=x86_64, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, name=rhosp-rhel9/openstack-ovn-controller, io.buildah.version=1.41.5, vendor=Red Hat, Inc., managed_by=tripleo_ansible, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, release=1766032510, maintainer=OpenStack TripleO Team, container_name=ovn_controller, vcs-type=git, description=Red Hat OpenStack Platform 17.1 ovn-controller, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 ovn-controller, url=https://www.redhat.com, com.redhat.component=openstack-ovn-controller-container) Feb 2 08:22:13 np0005604725 podman[166347]: 2026-02-02 08:22:13.567815692 +0000 UTC m=+0.274043251 container health_status e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, health_status=healthy, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, managed_by=tripleo_ansible, batch=17.1_20260112.1, com.redhat.component=openstack-swift-account-container, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:50:44Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, config_id=tripleo_step4, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-swift-account, vendor=Red Hat, Inc., release=1766032510, summary=Red Hat OpenStack Platform 17.1 swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 swift-account, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:50:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_account_server, distribution-scope=public, version=17.1.13, tcib_managed=true, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, architecture=x86_64) Feb 2 08:22:13 np0005604725 podman[166319]: 2026-02-02 08:22:13.596744947 +0000 UTC m=+0.336493904 container exec_died 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=ovn_controller, io.buildah.version=1.41.5, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-type=git, name=rhosp-rhel9/openstack-ovn-controller, tcib_managed=true, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, io.openshift.expose-services=, distribution-scope=public, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, org.opencontainers.image.created=2026-01-12T22:36:40Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, com.redhat.component=openstack-ovn-controller-container, build-date=2026-01-12T22:36:40Z, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'depends_on': ['openvswitch.service'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck 6642'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/ovn_controller.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/run:/run', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/pki/tls/certs/ovn_controller.crt:/etc/pki/tls/certs/ovn_controller.crt', '/etc/pki/tls/private/ovn_controller.key:/etc/pki/tls/private/ovn_controller.key']}, summary=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, architecture=x86_64, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, version=17.1.13, container_name=ovn_controller) Feb 2 08:22:13 np0005604725 podman[166333]: 2026-02-02 08:22:13.605193739 +0000 UTC m=+0.325799843 container health_status 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, health_status=healthy, container_name=swift_account_replicator, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 swift-account, tcib_managed=true, com.redhat.component=openstack-swift-account-container, managed_by=tripleo_ansible, version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, architecture=x86_64, vendor=Red Hat, Inc., url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, vcs-type=git, batch=17.1_20260112.1, release=1766032510, name=rhosp-rhel9/openstack-swift-account, org.opencontainers.image.created=2026-01-12T22:50:44Z, config_id=tripleo_step4, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-account, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.buildah.version=1.41.5, io.openshift.expose-services=, build-date=2026-01-12T22:50:44Z, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:22:13 np0005604725 systemd[1]: 270553323c913766f55788b30b5dc3943a661c9cd24ac9517069e5fd3c1b22ad.service: Deactivated successfully. Feb 2 08:22:13 np0005604725 systemd[1]: 2e3a90ea52b296a41ebac8cbeaf2115d3a99c97072842a0f98b5123fa9068283.service: Deactivated successfully. Feb 2 08:22:13 np0005604725 podman[166354]: 2026-02-02 08:22:13.476832307 +0000 UTC m=+0.181518528 container health_status f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, health_status=healthy, summary=Red Hat OpenStack Platform 17.1 placement-api, url=https://www.redhat.com, vcs-type=git, description=Red Hat OpenStack Platform 17.1 placement-api, batch=17.1_20260112.1, distribution-scope=public, tcib_managed=true, version=17.1.13, name=rhosp-rhel9/openstack-placement-api, org.opencontainers.image.created=2026-01-12T22:34:35Z, com.redhat.component=openstack-placement-api-container, vendor=Red Hat, Inc., vcs-ref=705339545363fec600102567c4e923938e0f43b3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, build-date=2026-01-12T22:34:35Z, managed_by=tripleo_ansible, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.5, release=1766032510, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, container_name=placement_api, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:22:13 np0005604725 podman[166321]: 2026-02-02 08:22:13.636750096 +0000 UTC m=+0.364339596 container exec_died 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_server, name=rhosp-rhel9/openstack-swift-container, summary=Red Hat OpenStack Platform 17.1 swift-container, io.buildah.version=1.41.5, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 swift-container, konflux.additional-tags=17.1.13 17.1_20260112.1, vcs-type=git, config_id=tripleo_step4, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, io.openshift.expose-services=, version=17.1.13, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-container-container, release=1766032510, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:50:57Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, tcib_managed=true, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, container_name=swift_container_server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, org.opencontainers.image.created=2026-01-12T22:50:57Z, cpe=cpe:/a:redhat:openstack:17.1::el9) Feb 2 08:22:13 np0005604725 systemd[1]: 3403a44ea419158f03ebc6bee7e85de78f82788d05c5ab223773f99501dd0730.service: Deactivated successfully. Feb 2 08:22:13 np0005604725 podman[166353]: 2026-02-02 08:22:13.654694241 +0000 UTC m=+0.363271273 container health_status e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, health_status=healthy, config_id=ovn_cluster_northd, description=Red Hat OpenStack Platform 17.1 ovn-northd, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:34:06Z, summary=Red Hat OpenStack Platform 17.1 ovn-northd, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, release=1766032510, vcs-type=git, name=rhosp-rhel9/openstack-ovn-northd, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, io.openshift.expose-services=, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, container_name=ovn_cluster_northd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.buildah.version=1.41.5, com.redhat.component=openstack-ovn-northd-container, architecture=x86_64, url=https://www.redhat.com, build-date=2026-01-12T22:34:06Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:22:13 np0005604725 podman[166354]: 2026-02-02 08:22:13.663828463 +0000 UTC m=+0.368514664 container exec_died f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=placement_api, build-date=2026-01-12T22:34:35Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, version=17.1.13, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-placement-api, container_name=placement_api, org.opencontainers.image.created=2026-01-12T22:34:35Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, release=1766032510, io.buildah.version=1.41.5, batch=17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, config_id=tripleo_step4, distribution-scope=public, tcib_managed=true, io.openshift.expose-services=, com.redhat.component=openstack-placement-api-container, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ae2de9ab0db0f109a0e66975aa28d256'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/placement:/var/log/placement:z', '/var/log/containers/httpd/placement:/var/log/httpd:z', '/var/lib/kolla/config_files/placement_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/placement:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 placement-api, vcs-ref=705339545363fec600102567c4e923938e0f43b3) Feb 2 08:22:13 np0005604725 podman[166330]: 2026-02-02 08:22:13.511268943 +0000 UTC m=+0.238474971 container health_status 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, tcib_managed=true, name=rhosp-rhel9/openstack-swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-container, version=17.1.13, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:57Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, com.redhat.component=openstack-swift-container-container, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vendor=Red Hat, Inc., config_id=tripleo_step4, io.openshift.expose-services=, release=1766032510, summary=Red Hat OpenStack Platform 17.1 swift-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, container_name=swift_container_replicator, distribution-scope=public, build-date=2026-01-12T22:50:57Z, vcs-type=git) Feb 2 08:22:13 np0005604725 podman[166353]: 2026-02-02 08:22:13.670027396 +0000 UTC m=+0.378604438 container exec_died e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1, name=ovn_cluster_northd, com.redhat.component=openstack-ovn-northd-container, summary=Red Hat OpenStack Platform 17.1 ovn-northd, vcs-ref=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, vcs-type=git, org.opencontainers.image.revision=ac1441bb241fd7ea83ec557f8c760d89937b0b0c, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, build-date=2026-01-12T22:34:06Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ovn_cluster_northd.json:/var/lib/kolla/config_files/config.json:ro', '/lib/modules:/lib/modules:ro', '/var/lib/openvswitch/ovn:/run/openvswitch:shared,z', '/var/log/containers/openvswitch:/var/log/openvswitch:z', '/var/lib/openvswitch/ovn:/run/ovn:shared,z', '/var/log/containers/openvswitch:/var/log/ovn:z', '/var/lib/config-data/ansible-generated/ovn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/private/ovn_dbs.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/ovn_dbs.key:ro', '/etc/pki/tls/certs/ovn_dbs.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/ovn_dbs.crt:ro']}, version=17.1.13, url=https://www.redhat.com, name=rhosp-rhel9/openstack-ovn-northd, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-northd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-northd, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:34:06Z, vendor=Red Hat, Inc., architecture=x86_64, config_id=ovn_cluster_northd, container_name=ovn_cluster_northd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-northd, description=Red Hat OpenStack Platform 17.1 ovn-northd, io.buildah.version=1.41.5) Feb 2 08:22:13 np0005604725 systemd[1]: e7479a4886a00924f9aa4c450d681c5aec4eed0cd5721534a1da01a8dfd9308c.service: Deactivated successfully. Feb 2 08:22:13 np0005604725 podman[166330]: 2026-02-02 08:22:13.695857245 +0000 UTC m=+0.423063293 container exec_died 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1, name=swift_container_replicator, io.buildah.version=1.41.5, com.redhat.component=openstack-swift-container-container, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, name=rhosp-rhel9/openstack-swift-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-container, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-container, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_container_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, org.opencontainers.image.created=2026-01-12T22:50:57Z, build-date=2026-01-12T22:50:57Z, release=1766032510, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, summary=Red Hat OpenStack Platform 17.1 swift-container, distribution-scope=public, tcib_managed=true, url=https://www.redhat.com, config_id=tripleo_step4, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-container, version=17.1.13, container_name=swift_container_replicator, description=Red Hat OpenStack Platform 17.1 swift-container) Feb 2 08:22:13 np0005604725 podman[166334]: 2026-02-02 08:22:13.705760151 +0000 UTC m=+0.411641040 container health_status 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, health_status=healthy, config_id=tripleo_step4, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, org.opencontainers.image.created=2026-01-12T22:50:56Z, description=Red Hat OpenStack Platform 17.1 swift-object, batch=17.1_20260112.1, release=1766032510, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-swift-object-container, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:50:56Z, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, version=17.1.13, name=rhosp-rhel9/openstack-swift-object, managed_by=tripleo_ansible, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, architecture=x86_64, container_name=swift_object_server, summary=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, vendor=Red Hat, Inc., tcib_managed=true, io.openshift.expose-services=) Feb 2 08:22:13 np0005604725 systemd[1]: 42a91008f34979a8645eccb1f960c59a976c0693102deef33e426bbed4e01836.service: Deactivated successfully. Feb 2 08:22:13 np0005604725 systemd[1]: f46851c8cbff0c6ba75b24e5f0698238d46e48d44d3ea553b1bf8b49d4d744a4.service: Deactivated successfully. Feb 2 08:22:13 np0005604725 podman[166344]: 2026-02-02 08:22:13.423574029 +0000 UTC m=+0.123676349 container health_status b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, health_status=healthy, org.opencontainers.image.created=2026-01-12T23:32:22Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, managed_by=tripleo_ansible, distribution-scope=public, release=1766032510, url=https://www.redhat.com, build-date=2026-01-12T23:32:22Z, config_id=tripleo_step4, container_name=nova_vnc_proxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, name=rhosp-rhel9/openstack-nova-novncproxy, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-nova-novncproxy-container, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, vendor=Red Hat, Inc., io.openshift.expose-services=, vcs-type=git, batch=17.1_20260112.1, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:22:13 np0005604725 podman[166333]: 2026-02-02 08:22:13.742838499 +0000 UTC m=+0.463444583 container exec_died 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_replicator, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_replicator.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, build-date=2026-01-12T22:50:44Z, tcib_managed=true, architecture=x86_64, container_name=swift_account_replicator, io.openshift.expose-services=, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 swift-account, description=Red Hat OpenStack Platform 17.1 swift-account, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, vcs-type=git, batch=17.1_20260112.1, release=1766032510, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:50:44Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-swift-account, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, managed_by=tripleo_ansible, url=https://www.redhat.com, com.redhat.component=openstack-swift-account-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:22:13 np0005604725 systemd[1]: 79c2000a90a21c8fe466961638418151ce716b34781d95066c3585d6bd229722.service: Deactivated successfully. Feb 2 08:22:13 np0005604725 podman[166344]: 2026-02-02 08:22:13.796070916 +0000 UTC m=+0.496173236 container exec_died b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1, name=nova_vnc_proxy, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, vcs-type=git, org.opencontainers.image.created=2026-01-12T23:32:22Z, maintainer=OpenStack TripleO Team, tcib_managed=true, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 nova-novncproxy, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.component=openstack-nova-novncproxy-container, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-novncproxy, container_name=nova_vnc_proxy, managed_by=tripleo_ansible, distribution-scope=public, build-date=2026-01-12T23:32:22Z, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, name=rhosp-rhel9/openstack-nova-novncproxy, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-novncproxy, vendor=Red Hat, Inc., config_id=tripleo_step4, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_vnc_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/ipa/ca.crt:/etc/pki/CA/certs/vnc.crt:ro', '/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/libvirt-vnc-client-cert.crt:ro', '/etc/pki/tls/private/libvirt-vnc-client-cert.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/libvirt-vnc-client-cert.key:ro', '/etc/pki/tls/certs/novnc-proxy.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/novnc-proxy.crt:ro', '/etc/pki/tls/private/novnc-proxy.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/novnc-proxy.key:ro']}, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-novncproxy, description=Red Hat OpenStack Platform 17.1 nova-novncproxy, version=17.1.13) Feb 2 08:22:13 np0005604725 systemd[1]: b9bf46b5964fd59fdc4223637416f393c1001e16714437bd4e232d9892b5d750.service: Deactivated successfully. Feb 2 08:22:13 np0005604725 podman[166347]: 2026-02-02 08:22:13.846638361 +0000 UTC m=+0.552865890 container exec_died e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc (image=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1, name=swift_account_server, description=Red Hat OpenStack Platform 17.1 swift-account, managed_by=tripleo_ansible, com.redhat.component=openstack-swift-account-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, distribution-scope=public, version=17.1.13, name=rhosp-rhel9/openstack-swift-account, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.created=2026-01-12T22:50:44Z, build-date=2026-01-12T22:50:44Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-account, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-account, summary=Red Hat OpenStack Platform 17.1 swift-account, url=https://www.redhat.com, io.buildah.version=1.41.5, architecture=x86_64, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-account, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_account_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, tcib_managed=true, container_name=swift_account_server, io.openshift.expose-services=) Feb 2 08:22:13 np0005604725 systemd[1]: e6f1c866ee3c1a849b115adfb013ebd9906fd41281f1ab24b6f5669f163c19dc.service: Deactivated successfully. Feb 2 08:22:13 np0005604725 podman[166334]: 2026-02-02 08:22:13.951859767 +0000 UTC m=+0.657740636 container exec_died 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_object_server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-swift-object, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:50:56Z, url=https://www.redhat.com, com.redhat.component=openstack-swift-object-container, build-date=2026-01-12T22:50:56Z, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, release=1766032510, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 swift-object, container_name=swift_object_server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vcs-type=git, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'restart': 'always', 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_object_server.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/cache/swift:/var/cache/swift', '/var/log/containers/swift:/var/log/swift:z']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 swift-object, architecture=x86_64, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, managed_by=tripleo_ansible) Feb 2 08:22:13 np0005604725 systemd[1]: 97ea006e1e77faa849748690cd2d2e386d17d0253f8e2840c961fb5867b6da39.service: Deactivated successfully. Feb 2 08:22:15 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2. Feb 2 08:22:15 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5. Feb 2 08:22:15 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb. Feb 2 08:22:15 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80. Feb 2 08:22:15 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569. Feb 2 08:22:15 np0005604725 podman[166659]: 2026-02-02 08:22:15.366575976 +0000 UTC m=+0.098881160 container health_status f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, health_status=healthy, container_name=swift_rsync, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, release=1766032510, com.redhat.component=openstack-swift-object-container, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, batch=17.1_20260112.1, architecture=x86_64, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 swift-object, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., version=17.1.13, managed_by=tripleo_ansible, name=rhosp-rhel9/openstack-swift-object, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, build-date=2026-01-12T22:50:56Z, summary=Red Hat OpenStack Platform 17.1 swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, config_id=tripleo_step4, org.opencontainers.image.created=2026-01-12T22:50:56Z, vcs-type=git) Feb 2 08:22:15 np0005604725 podman[166655]: 2026-02-02 08:22:15.335758912 +0000 UTC m=+0.083843605 container health_status 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, health_status=healthy, name=rhosp-rhel9/openstack-glance-api, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:34:42Z, version=17.1.13, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, config_id=tripleo_step4, build-date=2026-01-12T22:34:42Z, vendor=Red Hat, Inc., distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, tcib_managed=true, container_name=glance_api_internal, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, io.buildah.version=1.41.5, vcs-type=git, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}) Feb 2 08:22:15 np0005604725 podman[166657]: 2026-02-02 08:22:15.390192107 +0000 UTC m=+0.135771502 container health_status bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, health_status=healthy, tcib_managed=true, org.opencontainers.image.created=2026-01-12T22:34:42Z, vcs-ref=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, container_name=glance_api, build-date=2026-01-12T22:34:42Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-glance-api, vendor=Red Hat, Inc., vcs-type=git, managed_by=tripleo_ansible, url=https://www.redhat.com, com.redhat.component=openstack-glance-api-container, io.buildah.version=1.41.5, version=17.1.13, summary=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_step4) Feb 2 08:22:15 np0005604725 systemd[1]: tmp-crun.e4gCez.mount: Deactivated successfully. Feb 2 08:22:15 np0005604725 podman[166656]: 2026-02-02 08:22:15.450609717 +0000 UTC m=+0.197232784 container health_status b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, batch=17.1_20260112.1, release=1766032510, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, build-date=2026-01-12T22:10:14Z, name=rhosp-rhel9/openstack-qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, org.opencontainers.image.created=2026-01-12T22:10:14Z, konflux.additional-tags=17.1.13 17.1_20260112.1, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, com.redhat.component=openstack-qdrouterd-container, version=17.1.13, config_id=tripleo_step1, vcs-type=git, tcib_managed=true, io.openshift.expose-services=, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5) Feb 2 08:22:15 np0005604725 podman[166654]: 2026-02-02 08:22:15.506830376 +0000 UTC m=+0.251544705 container health_status 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, health_status=healthy, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_id=tripleo_step4, vendor=Red Hat, Inc., konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-glance-api-container, release=1766032510, summary=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, io.openshift.expose-services=, vcs-ref=705339545363fec600102567c4e923938e0f43b3, org.opencontainers.image.created=2026-01-12T22:34:42Z, url=https://www.redhat.com, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, container_name=glance_api_cron, version=17.1.13, batch=17.1_20260112.1, tcib_managed=true, maintainer=OpenStack TripleO Team, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, name=rhosp-rhel9/openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, build-date=2026-01-12T22:34:42Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, description=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:22:15 np0005604725 podman[166654]: 2026-02-02 08:22:15.514027149 +0000 UTC m=+0.258741488 container exec_died 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_cron, url=https://www.redhat.com, com.redhat.component=openstack-glance-api-container, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.5, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron glance'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api_cron.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/glance:/var/lib/glance:shared']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=glance_api_cron, architecture=x86_64, io.openshift.expose-services=, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, build-date=2026-01-12T22:34:42Z, org.opencontainers.image.created=2026-01-12T22:34:42Z, release=1766032510, tcib_managed=true, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-glance-api, config_id=tripleo_step4) Feb 2 08:22:15 np0005604725 systemd[1]: 3a2b3c74120c9a1f158633428a8595beaa80fc2cb75f51de65e26b2e5ac547f2.service: Deactivated successfully. Feb 2 08:22:15 np0005604725 podman[166655]: 2026-02-02 08:22:15.542439688 +0000 UTC m=+0.290524371 container exec_died 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api_internal, description=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, container_name=glance_api_internal, config_id=tripleo_step4, name=rhosp-rhel9/openstack-glance-api, konflux.additional-tags=17.1.13 17.1_20260112.1, version=17.1.13, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=705339545363fec600102567c4e923938e0f43b3, architecture=x86_64, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:34:42Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, vendor=Red Hat, Inc., io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '84c08a8ebc73eda47bfbdbf4963c031d-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api_internal:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, io.buildah.version=1.41.5, build-date=2026-01-12T22:34:42Z, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-glance-api-container, release=1766032510, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true) Feb 2 08:22:15 np0005604725 systemd[1]: 50520cfa0b892989c2202203efde61dd9eb1123d88e5aef82597d792c6b700f5.service: Deactivated successfully. Feb 2 08:22:15 np0005604725 podman[166657]: 2026-02-02 08:22:15.628404929 +0000 UTC m=+0.373984354 container exec_died bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=glance_api, build-date=2026-01-12T22:34:42Z, config_id=tripleo_step4, distribution-scope=public, vcs-ref=705339545363fec600102567c4e923938e0f43b3, vendor=Red Hat, Inc., version=17.1.13, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20260112.1, container_name=glance_api, com.redhat.component=openstack-glance-api-container, org.opencontainers.image.created=2026-01-12T22:34:42Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.openshift.expose-services=, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '06def20cab1144dca51887b587adc9f4-9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z', '/var/lib/kolla/config_files/glance_api.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/glance_api:/var/lib/kolla/config_files/src:ro', '/var/lib/tripleo-config/ceph:/var/lib/kolla/config_files/src-ceph:z', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/var/lib/glance:/var/lib/glance:shared']}, description=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, release=1766032510, name=rhosp-rhel9/openstack-glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, vcs-type=git, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api) Feb 2 08:22:15 np0005604725 systemd[1]: bb327e74750ceb92780dd52a0290ce4391d7a80ba0f6483933180e3cedbc3f80.service: Deactivated successfully. Feb 2 08:22:15 np0005604725 podman[166656]: 2026-02-02 08:22:15.64913899 +0000 UTC m=+0.395762017 container exec_died b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, version=17.1.13, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, architecture=x86_64, managed_by=tripleo_ansible, io.openshift.expose-services=, build-date=2026-01-12T22:10:14Z, maintainer=OpenStack TripleO Team, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, name=rhosp-rhel9/openstack-qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, batch=17.1_20260112.1, container_name=metrics_qdr, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ac03474490c6584f4d92c7446902c1e8'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, io.buildah.version=1.41.5, com.redhat.component=openstack-qdrouterd-container, summary=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_step1, distribution-scope=public, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:14Z) Feb 2 08:22:15 np0005604725 systemd[1]: b947e5600aeb4e52ddabfa21318882c46fe71816d702cf52dd913d01205d8feb.service: Deactivated successfully. Feb 2 08:22:15 np0005604725 podman[166659]: 2026-02-02 08:22:15.775146979 +0000 UTC m=+0.507452143 container exec_died f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1, name=swift_rsync, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-object, io.openshift.expose-services=, build-date=2026-01-12T22:50:56Z, io.buildah.version=1.41.5, name=rhosp-rhel9/openstack-swift-object, version=17.1.13, container_name=swift_rsync, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 swift-object, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-object, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:50:56Z, distribution-scope=public, batch=17.1_20260112.1, config_id=tripleo_step4, vcs-type=git, release=1766032510, vendor=Red Hat, Inc., architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-object, url=https://www.redhat.com, config_data={'cap_add': ['NET_BIND_SERVICE'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_rsync.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-object, com.redhat.component=openstack-swift-object-container, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999) Feb 2 08:22:15 np0005604725 systemd[1]: f2c580c484319c93c55695540d8d5242fc17c1a271680eb60f132abb25585569.service: Deactivated successfully. Feb 2 08:22:16 np0005604725 systemd[1]: tmp-crun.3ogwUh.mount: Deactivated successfully. Feb 2 08:22:19 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6. Feb 2 08:22:19 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1. Feb 2 08:22:19 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964. Feb 2 08:22:19 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e. Feb 2 08:22:19 np0005604725 systemd[154134]: Starting Mark boot as successful... Feb 2 08:22:19 np0005604725 systemd[154134]: Finished Mark boot as successful. Feb 2 08:22:19 np0005604725 podman[166959]: 2026-02-02 08:22:19.353779739 +0000 UTC m=+0.087438857 container health_status 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, health_status=healthy, org.opencontainers.image.created=2026-01-12T23:31:50Z, url=https://www.redhat.com, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, container_name=nova_api, release=1766032510, description=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vcs-type=git, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, version=17.1.13, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, build-date=2026-01-12T23:31:50Z, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp-rhel9/openstack-nova-api, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe) Feb 2 08:22:19 np0005604725 podman[166958]: 2026-02-02 08:22:19.324037429 +0000 UTC m=+0.067237642 container health_status 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, com.redhat.component=openstack-nova-api-container, vcs-type=git, tcib_managed=true, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T23:31:50Z, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, container_name=nova_metadata, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., release=1766032510, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-nova-api, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, config_id=tripleo_step4, managed_by=tripleo_ansible, version=17.1.13, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:22:19 np0005604725 podman[166957]: 2026-02-02 08:22:19.403843448 +0000 UTC m=+0.146887616 container health_status 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, health_status=healthy, maintainer=OpenStack TripleO Team, vcs-type=git, description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, config_id=tripleo_step4, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp-rhel9/openstack-nova-api, io.openshift.expose-services=, io.buildah.version=1.41.5, batch=17.1_20260112.1, release=1766032510, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, version=17.1.13, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, build-date=2026-01-12T23:31:50Z, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T23:31:50Z, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, container_name=nova_api_cron, tcib_managed=true) Feb 2 08:22:19 np0005604725 systemd[1]: tmp-crun.ayU6mH.mount: Deactivated successfully. Feb 2 08:22:19 np0005604725 podman[166957]: 2026-02-02 08:22:19.447157599 +0000 UTC m=+0.190201757 container exec_died 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api_cron, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, container_name=nova_api_cron, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.created=2026-01-12T23:31:50Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, description=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_step4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron nova'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, tcib_managed=true, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., architecture=x86_64, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, build-date=2026-01-12T23:31:50Z, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, name=rhosp-rhel9/openstack-nova-api, url=https://www.redhat.com, io.openshift.expose-services=, release=1766032510, version=17.1.13) Feb 2 08:22:19 np0005604725 systemd[1]: 19a38777e7b430b3f20d064d4d4fd4874234a20e671315c54e1a4e67ea14eae6.service: Deactivated successfully. Feb 2 08:22:19 np0005604725 podman[166959]: 2026-02-02 08:22:19.475969 +0000 UTC m=+0.209628158 container exec_died 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_api, io.openshift.expose-services=, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-api:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_api, org.opencontainers.image.created=2026-01-12T23:31:50Z, release=1766032510, version=17.1.13, name=rhosp-rhel9/openstack-nova-api, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, vcs-type=git, com.redhat.component=openstack-nova-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step4, managed_by=tripleo_ansible, url=https://www.redhat.com, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, distribution-scope=public, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, build-date=2026-01-12T23:31:50Z, architecture=x86_64) Feb 2 08:22:19 np0005604725 systemd[1]: 3a6783ba7d007fd7ecb621b18e93f3947d8c1a55e338eea3c364af577cfb0964.service: Deactivated successfully. Feb 2 08:22:19 np0005604725 podman[166958]: 2026-02-02 08:22:19.498311442 +0000 UTC m=+0.241511695 container exec_died 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=nova_metadata, url=https://www.redhat.com, version=17.1.13, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 nova-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '85ffc2ed75932f3a27d6e0188d1bb69e'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova:z', '/var/log/containers/httpd/nova-metadata:/var/log/httpd:z', '/var/lib/kolla/config_files/nova_metadata.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova_metadata:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 nova-api, container_name=nova_metadata, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, com.redhat.component=openstack-nova-api-container, build-date=2026-01-12T23:31:50Z, tcib_managed=true, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step4, managed_by=tripleo_ansible, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, architecture=x86_64, maintainer=OpenStack TripleO Team, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, org.opencontainers.image.created=2026-01-12T23:31:50Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-nova-api, vendor=Red Hat, Inc., io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20260112.1) Feb 2 08:22:19 np0005604725 systemd[1]: 2120846d9ae2ca41847bff3f8077b2974094f8f931231e4d896daaf2bb4d1fb1.service: Deactivated successfully. Feb 2 08:22:19 np0005604725 podman[166969]: 2026-02-02 08:22:19.45268941 +0000 UTC m=+0.184004575 container health_status 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, health_status=healthy, distribution-scope=public, com.redhat.component=openstack-swift-proxy-server-container, release=1766032510, name=rhosp-rhel9/openstack-swift-proxy-server, url=https://www.redhat.com, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-type=git, io.openshift.expose-services=, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, build-date=2026-01-12T22:50:51Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, io.buildah.version=1.41.5, managed_by=tripleo_ansible, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T22:50:51Z, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, container_name=swift_proxy, description=Red Hat OpenStack Platform 17.1 swift-proxy-server) Feb 2 08:22:19 np0005604725 podman[166969]: 2026-02-02 08:22:19.674108892 +0000 UTC m=+0.405424047 container exec_died 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=swift_proxy, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.created=2026-01-12T22:50:51Z, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.component=openstack-swift-proxy-server-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2b3e11d6dd07c45ddbe26d38ce1c0c72'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'net': 'host', 'restart': 'always', 'start_order': 2, 'user': 'swift', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/swift_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/swift:/var/lib/kolla/config_files/src:ro', '/srv/node:/srv/node', '/dev:/dev', '/var/log/containers/swift:/var/log/swift:z']}, url=https://www.redhat.com, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., vcs-type=git, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, architecture=x86_64, distribution-scope=public, build-date=2026-01-12T22:50:51Z, version=17.1.13, name=rhosp-rhel9/openstack-swift-proxy-server, org.opencontainers.image.revision=8885e59decedc78140401b8a9a6f73e140e43999, vcs-ref=8885e59decedc78140401b8a9a6f73e140e43999, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=swift_proxy, batch=17.1_20260112.1, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, managed_by=tripleo_ansible, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:22:19 np0005604725 systemd[1]: 9ff91995dbcbff9491576b004f5b6600bf57938499cdfdeb64360b1eae5a2a6e.service: Deactivated successfully. Feb 2 08:22:24 np0005604725 systemd[1]: session-22.scope: Deactivated successfully. Feb 2 08:22:24 np0005604725 systemd[1]: session-22.scope: Consumed 21.108s CPU time. Feb 2 08:22:24 np0005604725 systemd-logind[36465]: Session 22 logged out. Waiting for processes to exit. Feb 2 08:22:24 np0005604725 systemd-logind[36465]: Removed session 22. Feb 2 08:22:25 np0005604725 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:33:b6:81 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.200 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=40934 DF PROTO=TCP SPT=44744 DPT=19885 SEQ=409260919 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A74C8A6DC0000000001030307) Feb 2 08:22:25 np0005604725 sshd[167454]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:22:26 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f. Feb 2 08:22:26 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb. Feb 2 08:22:26 np0005604725 systemd-logind[36465]: New session 23 of user zuul. Feb 2 08:22:26 np0005604725 systemd[1]: Started Session 23 of User zuul. Feb 2 08:22:26 np0005604725 systemd[1]: tmp-crun.aYh9zg.mount: Deactivated successfully. Feb 2 08:22:26 np0005604725 podman[167497]: 2026-02-02 08:22:26.157916353 +0000 UTC m=+0.122043737 container health_status 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, health_status=healthy, container_name=collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, com.redhat.component=openstack-collectd-container, config_id=tripleo_step3, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 collectd, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., release=1766032510, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, distribution-scope=public, build-date=2026-01-12T22:10:15Z, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:15Z, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.expose-services=, vcs-type=git, io.buildah.version=1.41.5, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, architecture=x86_64, name=rhosp-rhel9/openstack-collectd, summary=Red Hat OpenStack Platform 17.1 collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd) Feb 2 08:22:26 np0005604725 podman[167497]: 2026-02-02 08:22:26.173214307 +0000 UTC m=+0.137341691 container exec_died 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=collectd, batch=17.1_20260112.1, io.openshift.expose-services=, release=1766032510, com.redhat.component=openstack-collectd-container, container_name=collectd, vcs-type=git, name=rhosp-rhel9/openstack-collectd, config_id=tripleo_step3, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:10:15Z, description=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, vendor=Red Hat, Inc., build-date=2026-01-12T22:10:15Z, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 collectd, version=17.1.13, config_data={'cap_add': ['IPC_LOCK'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0a0af6a6a39e15fddd775e0090d092bc'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'memory': '512m', 'net': 'host', 'pid': 'host', 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/collectd.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/containers/storage/overlay-containers:/var/lib/containers/storage/overlay-containers:ro', '/var/lib/config-data/puppet-generated/collectd:/var/lib/kolla/config_files/src:ro', '/var/log/containers/collectd:/var/log/collectd:rw,z', '/var/lib/container-config-scripts:/config-scripts:ro', '/var/lib/container-user-scripts:/scripts:z', '/run:/run:rw', '/sys/fs/cgroup:/sys/fs/cgroup:ro']}, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, cpe=cpe:/a:redhat:openstack:17.1::el9, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd) Feb 2 08:22:26 np0005604725 systemd[1]: 3b60df3e97f9b98b32ca873752006153634aa6c729a29ae8e415a1751a4b8f9f.service: Deactivated successfully. Feb 2 08:22:26 np0005604725 podman[167498]: 2026-02-02 08:22:26.159603836 +0000 UTC m=+0.124710351 container health_status ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:34:41Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, config_id=tripleo_step3, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, vcs-ref=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, io.openshift.expose-services=, build-date=2026-01-12T22:34:41Z, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, managed_by=tripleo_ansible, batch=17.1_20260112.1, com.redhat.component=openstack-horizon-container, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-horizon, vcs-type=git, io.buildah.version=1.41.5, version=17.1.13, maintainer=OpenStack TripleO Team, tcib_managed=true, architecture=x86_64, release=1766032510, summary=Red Hat OpenStack Platform 17.1 horizon, container_name=horizon, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 horizon) Feb 2 08:22:26 np0005604725 podman[167498]: 2026-02-02 08:22:26.246937568 +0000 UTC m=+0.212044123 container exec_died ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=horizon, build-date=2026-01-12T22:34:41Z, config_id=tripleo_step3, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T22:34:41Z, container_name=horizon, vcs-type=git, release=1766032510, description=Red Hat OpenStack Platform 17.1 horizon, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, distribution-scope=public, config_data={'environment': {'ENABLE_DESIGNATE': 'yes', 'ENABLE_HEAT': 'yes', 'ENABLE_IRONIC': 'yes', 'ENABLE_MANILA': 'yes', 'ENABLE_OCTAVIA': 'yes', 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a8e5b44090fb824658d0cdcc54fbcb7d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/horizon.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/horizon:/var/lib/kolla/config_files/src:ro', '/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/tmp/horizon:/var/tmp:z', '/var/www:/var/www:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, com.redhat.component=openstack-horizon-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, io.openshift.expose-services=, version=17.1.13, managed_by=tripleo_ansible, vcs-ref=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, name=rhosp-rhel9/openstack-horizon, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1) Feb 2 08:22:26 np0005604725 systemd[1]: ce3f1dde8dee5e1b301966e02000cc61ca62eb0234343f8cde879b335c12cdfb.service: Deactivated successfully. Feb 2 08:22:26 np0005604725 python3[167559]: ansible-ansible.legacy.command Invoked with _raw_params=subscription-manager unregister#012 _uses_shell=True zuul_log_id=fa163ef9-e89a-ee6e-48cc-00000000000c-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 2 08:22:26 np0005604725 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:33:b6:81 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.200 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=40935 DF PROTO=TCP SPT=44744 DPT=19885 SEQ=409260919 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A74C8AAF10000000001030307) Feb 2 08:22:27 np0005604725 systemd[1]: tmp-crun.E2rzh3.mount: Deactivated successfully. Feb 2 08:22:27 np0005604725 podman[167645]: 2026-02-02 08:22:27.318479218 +0000 UTC m=+0.117056194 container exec c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, com.redhat.component=openstack-cinder-volume-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, build-date=2026-01-12T22:58:35Z, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, batch=17.1_20260112.1, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, io.openshift.expose-services=, vendor=Red Hat, Inc., release=1766032510, architecture=x86_64, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:58:35Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 cinder-volume, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp-rhel9/openstack-cinder-volume, vcs-type=git, description=Red Hat OpenStack Platform 17.1 cinder-volume) Feb 2 08:22:27 np0005604725 podman[167645]: 2026-02-02 08:22:27.351321213 +0000 UTC m=+0.149898209 container exec_died c2b15f815dcf12e888dd759ed5a96dcb38f954072d507897f686e484b5f7766e (image=cluster.common.tag/cinder-volume:pcmklatest, name=openstack-cinder-volume-podman-0, release=1766032510, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-volume, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-cinder-volume, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, vendor=Red Hat, Inc., version=17.1.13, description=Red Hat OpenStack Platform 17.1 cinder-volume, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, tcib_managed=true, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, distribution-scope=public, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-cinder-volume-container, summary=Red Hat OpenStack Platform 17.1 cinder-volume, architecture=x86_64, build-date=2026-01-12T22:58:35Z, org.opencontainers.image.created=2026-01-12T22:58:35Z, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-volume, io.buildah.version=1.41.5, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 16.1 cinder-volume) Feb 2 08:22:28 np0005604725 subscription-manager[167567]: Unregistered machine with identity: abae7743-cd32-41a2-b3c6-414ab2836dab Feb 2 08:22:28 np0005604725 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:33:b6:81 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.200 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=40936 DF PROTO=TCP SPT=44744 DPT=19885 SEQ=409260919 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A74C8B2F10000000001030307) Feb 2 08:22:29 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b. Feb 2 08:22:29 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349. Feb 2 08:22:29 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e. Feb 2 08:22:29 np0005604725 podman[167776]: 2026-02-02 08:22:29.351576131 +0000 UTC m=+0.092248506 container health_status 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, build-date=2026-01-12T22:33:53Z, com.redhat.component=openstack-keystone-container, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, vcs-type=git, name=rhosp-rhel9/openstack-keystone, container_name=keystone_cron, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, tcib_managed=true, vendor=Red Hat, Inc., url=https://www.redhat.com, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, summary=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, config_id=tripleo_step3, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, managed_by=tripleo_ansible, architecture=x86_64) Feb 2 08:22:29 np0005604725 podman[167777]: 2026-02-02 08:22:29.367126263 +0000 UTC m=+0.100714878 container health_status 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, health_status=healthy, architecture=x86_64, org.opencontainers.image.created=2026-01-12T22:34:43Z, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, cpe=cpe:/a:redhat:openstack:17.1::el9, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, name=rhosp-rhel9/openstack-iscsid, distribution-scope=public, com.redhat.component=openstack-iscsid-container, managed_by=tripleo_ansible, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, container_name=iscsid, io.buildah.version=1.41.5, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 iscsid, build-date=2026-01-12T22:34:43Z, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_step3, release=1766032510, vcs-type=git, version=17.1.13, vcs-ref=705339545363fec600102567c4e923938e0f43b3, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1) Feb 2 08:22:29 np0005604725 podman[167776]: 2026-02-02 08:22:29.389874316 +0000 UTC m=+0.130546621 container exec_died 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone_cron, build-date=2026-01-12T22:33:53Z, vcs-type=git, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, config_data={'command': ['/bin/bash', '-c', '/usr/local/bin/kolla_set_configs && /usr/sbin/crond -n'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron keystone'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 4, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/var/lib/kolla/config_files/keystone_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, tcib_managed=true, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, summary=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone_cron, config_id=tripleo_step3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, managed_by=tripleo_ansible, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-keystone, release=1766032510, batch=17.1_20260112.1) Feb 2 08:22:29 np0005604725 systemd[1]: 40cb1dc05d1ff674d0c21999033a95cb070e40ce757b9ddeb641c15665bf9349.service: Deactivated successfully. Feb 2 08:22:29 np0005604725 podman[167775]: 2026-02-02 08:22:29.418044118 +0000 UTC m=+0.157232136 container health_status 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, health_status=healthy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, batch=17.1_20260112.1, managed_by=tripleo_ansible, release=1766032510, name=rhosp-rhel9/openstack-keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, konflux.additional-tags=17.1.13 17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, description=Red Hat OpenStack Platform 17.1 keystone, container_name=keystone, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, com.redhat.component=openstack-keystone-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, build-date=2026-01-12T22:33:53Z, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, distribution-scope=public, config_id=tripleo_step3, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., version=17.1.13, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.buildah.version=1.41.5, url=https://www.redhat.com, tcib_managed=true, vcs-type=git, vcs-ref=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 keystone) Feb 2 08:22:29 np0005604725 podman[167777]: 2026-02-02 08:22:29.440422261 +0000 UTC m=+0.174010896 container exec_died 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=iscsid, version=17.1.13, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, tcib_managed=true, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, com.redhat.component=openstack-iscsid-container, summary=Red Hat OpenStack Platform 17.1 iscsid, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9bab49ca47f1b48252b0430bf6d56c46'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'net': 'host', 'privileged': True, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/iscsid.json:/var/lib/kolla/config_files/config.json:ro', '/dev:/dev', '/run:/run', '/sys:/sys', '/lib/modules:/lib/modules:ro', '/var/lib/config-data/puppet-generated/iscsid/etc/iscsi:/var/lib/kolla/config_files/src-iscsid:ro', '/etc/target:/etc/target:z', '/var/lib/iscsi:/var/lib/iscsi:z']}, release=1766032510, build-date=2026-01-12T22:34:43Z, distribution-scope=public, managed_by=tripleo_ansible, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:34:43Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, vendor=Red Hat, Inc., architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, cpe=cpe:/a:redhat:openstack:17.1::el9, name=rhosp-rhel9/openstack-iscsid, vcs-ref=705339545363fec600102567c4e923938e0f43b3, url=https://www.redhat.com, container_name=iscsid, description=Red Hat OpenStack Platform 17.1 iscsid) Feb 2 08:22:29 np0005604725 systemd[1]: 758ad9c09abb5f539e875f82445a9d122ff6b075c22bfe839816c3ffe7c9eb7e.service: Deactivated successfully. Feb 2 08:22:29 np0005604725 podman[167775]: 2026-02-02 08:22:29.487954522 +0000 UTC m=+0.227142540 container exec_died 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=keystone, vendor=Red Hat, Inc., com.redhat.component=openstack-keystone-container, maintainer=OpenStack TripleO Team, container_name=keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step3, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vcs-ref=705339545363fec600102567c4e923938e0f43b3, batch=17.1_20260112.1, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, build-date=2026-01-12T22:33:53Z, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.created=2026-01-12T22:33:53Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, name=rhosp-rhel9/openstack-keystone, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'dff5bf4ccd6d0a40575dff90620f5e0d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 2, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z', '/etc/openldap:/etc/openldap:ro', '/var/lib/kolla/config_files/keystone.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/keystone:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, org.opencontainers.image.revision=705339545363fec600102567c4e923938e0f43b3, distribution-scope=public, io.openshift.expose-services=, io.buildah.version=1.41.5) Feb 2 08:22:29 np0005604725 systemd[1]: 408bf0ab78f7aa15e54e6a826e60ed5129b9a4ac086faf55f51f12d71a3bcd0b.service: Deactivated successfully. Feb 2 08:22:32 np0005604725 systemd[1]: session-23.scope: Deactivated successfully. Feb 2 08:22:32 np0005604725 systemd-logind[36465]: Session 23 logged out. Waiting for processes to exit. Feb 2 08:22:32 np0005604725 systemd-logind[36465]: Removed session 23. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1. Feb 2 08:22:36 np0005604725 systemd[1]: Started /usr/bin/podman healthcheck run ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb. Feb 2 08:22:36 np0005604725 podman[168110]: 2026-02-02 08:22:36.482713715 +0000 UTC m=+0.208452082 container health_status 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, health_status=healthy, version=17.1.13, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, tcib_managed=true, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:53:19Z, build-date=2026-01-12T22:53:19Z, vcs-type=git, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, distribution-scope=public, io.openshift.expose-services=, name=rhosp-rhel9/openstack-heat-api, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, config_id=tripleo_step4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, container_name=heat_api_cron, summary=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, batch=17.1_20260112.1, com.redhat.component=openstack-heat-api-container, io.buildah.version=1.41.5, vcs-ref=755001522886c265e88561b4997cab642504a845, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, managed_by=tripleo_ansible) Feb 2 08:22:36 np0005604725 podman[168141]: 2026-02-02 08:22:36.438205098 +0000 UTC m=+0.122844123 container health_status 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, health_status=healthy, release=1766032510, distribution-scope=public, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, com.redhat.component=openstack-heat-api-cfn-container, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, vendor=Red Hat, Inc., architecture=x86_64, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_id=tripleo_step4, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2026-01-12T22:54:02Z, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-ref=755001522886c265e88561b4997cab642504a845, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-heat-api-cfn, io.buildah.version=1.41.5, version=17.1.13, container_name=heat_api_cfn, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, org.opencontainers.image.created=2026-01-12T22:54:02Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:22:36 np0005604725 podman[168155]: 2026-02-02 08:22:36.493599822 +0000 UTC m=+0.179442624 container health_status 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, health_status=healthy, org.opencontainers.image.created=2026-01-12T22:53:38Z, com.redhat.component=openstack-heat-engine-container, container_name=heat_engine, summary=Red Hat OpenStack Platform 17.1 heat-engine, konflux.additional-tags=17.1.13 17.1_20260112.1, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.expose-services=, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, tcib_managed=true, vcs-type=git, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, config_id=tripleo_step4, release=1766032510, vcs-ref=755001522886c265e88561b4997cab642504a845, build-date=2026-01-12T22:53:38Z, batch=17.1_20260112.1, name=rhosp-rhel9/openstack-heat-engine, vendor=Red Hat, Inc., distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 heat-engine) Feb 2 08:22:36 np0005604725 podman[168136]: 2026-02-02 08:22:36.523371683 +0000 UTC m=+0.223354002 container health_status 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, health_status=healthy, build-date=2026-01-12T22:52:22Z, release=1766032510, description=Red Hat OpenStack Platform 17.1 manila-api, tcib_managed=true, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:52:22Z, summary=Red Hat OpenStack Platform 17.1 manila-api, version=17.1.13, io.buildah.version=1.41.5, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.openshift.expose-services=, name=rhosp-rhel9/openstack-manila-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, vendor=Red Hat, Inc., architecture=x86_64, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, distribution-scope=public, container_name=manila_api_cron, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.component=openstack-manila-api-container, vcs-type=git) Feb 2 08:22:36 np0005604725 podman[168141]: 2026-02-02 08:22:36.526729048 +0000 UTC m=+0.211368053 container exec_died 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=heat_api_cfn, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, com.redhat.component=openstack-heat-api-cfn-container, version=17.1.13, batch=17.1_20260112.1, architecture=x86_64, build-date=2026-01-12T22:54:02Z, io.openshift.expose-services=, container_name=heat_api_cfn, distribution-scope=public, config_id=tripleo_step4, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.created=2026-01-12T22:54:02Z, tcib_managed=true, managed_by=tripleo_ansible, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, name=rhosp-rhel9/openstack-heat-api-cfn, release=1766032510, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'c34de4047376a18922c4fddbe99616f0'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api-cfn:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cfn.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api_cfn:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, vcs-ref=755001522886c265e88561b4997cab642504a845, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.buildah.version=1.41.5, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:22:36 np0005604725 systemd[1]: 4e7aba1c29c84c782048987e6a2a0792334647a013b0d3d9dc29e59bbf04f755.service: Deactivated successfully. Feb 2 08:22:36 np0005604725 podman[168165]: 2026-02-02 08:22:36.538336957 +0000 UTC m=+0.219754142 container health_status bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, health_status=healthy, summary=Red Hat OpenStack Platform 17.1 cinder-api, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, io.openshift.expose-services=, tcib_managed=true, name=rhosp-rhel9/openstack-cinder-api, com.redhat.component=openstack-cinder-api-container, build-date=2026-01-12T22:58:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, release=1766032510, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, container_name=cinder_api_cron, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:58:44Z, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, version=17.1.13, architecture=x86_64, config_id=tripleo_step4, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 cinder-api) Feb 2 08:22:36 np0005604725 podman[168155]: 2026-02-02 08:22:36.547771618 +0000 UTC m=+0.233614430 container exec_died 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1, name=heat_engine, maintainer=OpenStack TripleO Team, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-engine, version=17.1.13, url=https://www.redhat.com, vendor=Red Hat, Inc., vcs-ref=755001522886c265e88561b4997cab642504a845, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3b9828291d650a0cb3f28eaed8d5f04d'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'stop_grace_period': 60, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/lib/kolla/config_files/heat_engine.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat:/var/lib/kolla/config_files/src:ro']}, description=Red Hat OpenStack Platform 17.1 heat-engine, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, cpe=cpe:/a:redhat:openstack:17.1::el9, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-engine, build-date=2026-01-12T22:53:38Z, io.buildah.version=1.41.5, com.redhat.component=openstack-heat-engine-container, io.openshift.expose-services=, architecture=x86_64, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, tcib_managed=true, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-engine, managed_by=tripleo_ansible, config_id=tripleo_step4, summary=Red Hat OpenStack Platform 17.1 heat-engine, name=rhosp-rhel9/openstack-heat-engine, container_name=heat_engine, distribution-scope=public, org.opencontainers.image.created=2026-01-12T22:53:38Z) Feb 2 08:22:36 np0005604725 systemd[1]: 8bb7c43e903d4ea63f550fbb89debb0a05da1c6000a1cace1d2b2173a8c91da2.service: Deactivated successfully. Feb 2 08:22:36 np0005604725 podman[168110]: 2026-02-02 08:22:36.622305115 +0000 UTC m=+0.348043512 container exec_died 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api_cron, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, url=https://www.redhat.com, distribution-scope=public, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, build-date=2026-01-12T22:53:19Z, vcs-ref=755001522886c265e88561b4997cab642504a845, version=17.1.13, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron heat'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro']}, io.openshift.expose-services=, container_name=heat_api_cron, io.buildah.version=1.41.5, managed_by=tripleo_ansible, vcs-type=git, config_id=tripleo_step4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, release=1766032510, description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.created=2026-01-12T22:53:19Z, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, vendor=Red Hat, Inc., name=rhosp-rhel9/openstack-heat-api) Feb 2 08:22:36 np0005604725 podman[168136]: 2026-02-02 08:22:36.633239093 +0000 UTC m=+0.333221412 container exec_died 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=manila_api_cron, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, tcib_managed=true, io.openshift.expose-services=, container_name=manila_api_cron, cpe=cpe:/a:redhat:openstack:17.1::el9, architecture=x86_64, name=rhosp-rhel9/openstack-manila-api, org.opencontainers.image.created=2026-01-12T22:52:22Z, url=https://www.redhat.com, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, io.buildah.version=1.41.5, build-date=2026-01-12T22:52:22Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron manila'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, com.redhat.component=openstack-manila-api-container, vcs-type=git, batch=17.1_20260112.1, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, config_id=tripleo_step4, managed_by=tripleo_ansible, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, release=1766032510, version=17.1.13, maintainer=OpenStack TripleO Team) Feb 2 08:22:36 np0005604725 podman[168111]: 2026-02-02 08:22:36.643367786 +0000 UTC m=+0.352113386 container health_status 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, health_status=healthy, version=17.1.13, com.redhat.component=openstack-cinder-api-container, description=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp-rhel9/openstack-cinder-api, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.openshift.expose-services=, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, org.opencontainers.image.created=2026-01-12T22:58:44Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, managed_by=tripleo_ansible, build-date=2026-01-12T22:58:44Z, container_name=cinder_api, config_id=tripleo_step4, release=1766032510, cpe=cpe:/a:redhat:openstack:17.1::el9, io.buildah.version=1.41.5, konflux.additional-tags=17.1.13 17.1_20260112.1, tcib_managed=true, architecture=x86_64) Feb 2 08:22:36 np0005604725 systemd[1]: 408d9425d41776adc12116016ecc3aea8615f9ce95cb346640fb4b166ab02268.service: Deactivated successfully. Feb 2 08:22:36 np0005604725 podman[168109]: 2026-02-02 08:22:36.606726303 +0000 UTC m=+0.336164644 container health_status 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, health_status=healthy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, url=https://www.redhat.com, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, name=rhosp-rhel9/openstack-ceilometer-central, vcs-type=git, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:07:24Z, cpe=cpe:/a:redhat:openstack:17.1::el9, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=ceilometer_agent_central, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, release=1766032510, tcib_managed=true, managed_by=tripleo_ansible, config_id=tripleo_step4, description=Red Hat OpenStack Platform 17.1 ceilometer-central, build-date=2026-01-12T23:07:24Z, maintainer=OpenStack TripleO Team, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, architecture=x86_64, com.redhat.component=openstack-ceilometer-central-container, distribution-scope=public, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, io.openshift.expose-services=) Feb 2 08:22:36 np0005604725 podman[168165]: 2026-02-02 08:22:36.670779025 +0000 UTC m=+0.352196190 container exec_died bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api_cron, tcib_managed=true, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=cinder_api_cron, io.buildah.version=1.41.5, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, io.openshift.expose-services=, org.opencontainers.image.created=2026-01-12T22:58:44Z, distribution-scope=public, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, name=rhosp-rhel9/openstack-cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., batch=17.1_20260112.1, release=1766032510, vcs-type=git, com.redhat.component=openstack-cinder-api-container, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.13, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron cinder'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api_cron.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, description=Red Hat OpenStack Platform 17.1 cinder-api, config_id=tripleo_step4, build-date=2026-01-12T22:58:44Z) Feb 2 08:22:36 np0005604725 podman[168112]: 2026-02-02 08:22:36.572319018 +0000 UTC m=+0.290228502 container health_status 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, health_status=healthy, io.openshift.expose-services=, architecture=x86_64, build-date=2026-01-12T23:32:18Z, config_id=tripleo_step4, container_name=nova_conductor, batch=17.1_20260112.1, com.redhat.component=openstack-nova-conductor-container, name=rhosp-rhel9/openstack-nova-conductor, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.13, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:openstack:17.1::el9, description=Red Hat OpenStack Platform 17.1 nova-conductor, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, io.buildah.version=1.41.5, vendor=Red Hat, Inc., org.opencontainers.image.created=2026-01-12T23:32:18Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, konflux.additional-tags=17.1.13 17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 nova-conductor, url=https://www.redhat.com, tcib_managed=true, release=1766032510, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, distribution-scope=public) Feb 2 08:22:36 np0005604725 systemd[1]: bb100fcf84bd5081d42d9abf44f02b64b69ada96f2564bf34569b0fac557000f.service: Deactivated successfully. Feb 2 08:22:36 np0005604725 podman[168129]: 2026-02-02 08:22:36.587938741 +0000 UTC m=+0.276654292 container health_status 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, health_status=healthy, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, release=1766032510, summary=Red Hat OpenStack Platform 17.1 cron, tcib_managed=true, com.redhat.component=openstack-cron-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, description=Red Hat OpenStack Platform 17.1 cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, vendor=Red Hat, Inc., container_name=logrotate_crond, io.openshift.expose-services=, name=rhosp-rhel9/openstack-cron, url=https://www.redhat.com, io.buildah.version=1.41.5, vcs-type=git, architecture=x86_64, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, config_id=tripleo_step4, build-date=2026-01-12T22:10:15Z, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, org.opencontainers.image.created=2026-01-12T22:10:15Z, version=17.1.13, managed_by=tripleo_ansible) Feb 2 08:22:36 np0005604725 podman[168111]: 2026-02-02 08:22:36.715931592 +0000 UTC m=+0.424677192 container exec_died 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=cinder_api, name=rhosp-rhel9/openstack-cinder-api, com.redhat.component=openstack-cinder-api-container, summary=Red Hat OpenStack Platform 17.1 cinder-api, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:58:44Z, version=17.1.13, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 cinder-api, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, build-date=2026-01-12T22:58:44Z, container_name=cinder_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/cinder_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, distribution-scope=public, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, url=https://www.redhat.com, cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, config_id=tripleo_step4, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api) Feb 2 08:22:36 np0005604725 podman[168129]: 2026-02-02 08:22:36.72295762 +0000 UTC m=+0.411673211 container exec_died 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=logrotate_crond, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:15Z, vendor=Red Hat, Inc., org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, konflux.additional-tags=17.1.13 17.1_20260112.1, release=1766032510, version=17.1.13, config_id=tripleo_step4, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 cron, summary=Red Hat OpenStack Platform 17.1 cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, build-date=2026-01-12T22:10:15Z, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, vcs-type=git, io.buildah.version=1.41.5, distribution-scope=public, url=https://www.redhat.com, com.redhat.component=openstack-cron-container, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '53ed83bb0cae779ff95edb2002262c6f'}, 'healthcheck': {'test': '/usr/share/openstack-tripleo-common/healthcheck/cron'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'net': 'none', 'pid': 'host', 'privileged': True, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/logrotate-crond.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/crond:/var/lib/kolla/config_files/src:ro', '/var/log/containers:/var/log/containers:z']}, name=rhosp-rhel9/openstack-cron, cpe=cpe:/a:redhat:openstack:17.1::el9, container_name=logrotate_crond, io.openshift.expose-services=, architecture=x86_64, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:22:36 np0005604725 systemd[1]: 0f87518672f96f78ab7675d21b04298ec19d6220aaefab1f68c6174d1321ae8b.service: Deactivated successfully. Feb 2 08:22:36 np0005604725 systemd[1]: 2d6b80bf45e529893bc67c46fc94244b369f4f6c2835462bf656356b13d2f406.service: Deactivated successfully. Feb 2 08:22:36 np0005604725 podman[168145]: 2026-02-02 08:22:36.73719466 +0000 UTC m=+0.408201173 container health_status 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, health_status=healthy, managed_by=tripleo_ansible, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, vendor=Red Hat, Inc., io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:57:35Z, com.redhat.component=openstack-neutron-server-container, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, summary=Red Hat OpenStack Platform 17.1 neutron-server, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, build-date=2026-01-12T22:57:35Z, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=neutron_api, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, name=rhosp-rhel9/openstack-neutron-server, tcib_managed=true, architecture=x86_64, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_step4, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, distribution-scope=public) Feb 2 08:22:36 np0005604725 podman[168109]: 2026-02-02 08:22:36.743122334 +0000 UTC m=+0.472560725 container exec_died 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=ceilometer_agent_central, container_name=ceilometer_agent_central, tcib_managed=true, config_id=tripleo_step4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_central.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, description=Red Hat OpenStack Platform 17.1 ceilometer-central, name=rhosp-rhel9/openstack-ceilometer-central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, build-date=2026-01-12T23:07:24Z, version=17.1.13, konflux.additional-tags=17.1.13 17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:07:24Z, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, io.buildah.version=1.41.5, url=https://www.redhat.com, batch=17.1_20260112.1, com.redhat.component=openstack-ceilometer-central-container, release=1766032510, architecture=x86_64, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, managed_by=tripleo_ansible, vcs-type=git) Feb 2 08:22:36 np0005604725 systemd[1]: 064607d1869bac106e31ada14a33404208107c8429e1910a6cbb762266e314b6.service: Deactivated successfully. Feb 2 08:22:36 np0005604725 podman[168127]: 2026-02-02 08:22:36.710841604 +0000 UTC m=+0.412222407 container health_status 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, health_status=healthy, version=17.1.13, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, distribution-scope=public, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, release=1766032510, vcs-ref=755001522886c265e88561b4997cab642504a845, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20260112.1, build-date=2026-01-12T22:53:19Z, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, architecture=x86_64, tcib_managed=true, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, io.buildah.version=1.41.5, org.opencontainers.image.created=2026-01-12T22:53:19Z, summary=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp-rhel9/openstack-heat-api, com.redhat.component=openstack-heat-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=heat_api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.openshift.expose-services=) Feb 2 08:22:36 np0005604725 podman[168118]: 2026-02-02 08:22:36.636448653 +0000 UTC m=+0.350516408 container health_status 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, health_status=healthy, maintainer=OpenStack TripleO Team, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, cpe=cpe:/a:redhat:openstack:17.1::el9, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, config_id=tripleo_step4, io.buildah.version=1.41.5, release=1766032510, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler, build-date=2026-01-12T22:58:47Z, io.openshift.expose-services=, distribution-scope=public, version=17.1.13, tcib_managed=true, url=https://www.redhat.com, vcs-type=git, org.opencontainers.image.created=2026-01-12T22:58:47Z, name=rhosp-rhel9/openstack-cinder-scheduler, container_name=cinder_scheduler, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, com.redhat.component=openstack-cinder-scheduler-container, konflux.additional-tags=17.1.13 17.1_20260112.1, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler) Feb 2 08:22:36 np0005604725 podman[168127]: 2026-02-02 08:22:36.807784034 +0000 UTC m=+0.509164927 container exec_died 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=heat_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, url=https://www.redhat.com, build-date=2026-01-12T22:53:19Z, org.opencontainers.image.created=2026-01-12T22:53:19Z, batch=17.1_20260112.1, distribution-scope=public, tcib_managed=true, container_name=heat_api, config_id=tripleo_step4, name=rhosp-rhel9/openstack-heat-api, release=1766032510, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., com.redhat.component=openstack-heat-api-container, org.opencontainers.image.revision=755001522886c265e88561b4997cab642504a845, vcs-ref=755001522886c265e88561b4997cab642504a845, version=17.1.13, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-type=git, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, summary=Red Hat OpenStack Platform 17.1 heat-api, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '9fe8b459c1d20e59bcd177e00032de6d'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/heat:/var/log/heat:z', '/var/log/containers/httpd/heat-api:/var/log/httpd:z', '/var/lib/kolla/config_files/heat_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/heat_api:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/httpd:/etc/pki/tls/certs/httpd:ro', '/etc/pki/tls/private/httpd:/etc/pki/tls/private/httpd:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.5, architecture=x86_64, konflux.additional-tags=17.1.13 17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Feb 2 08:22:36 np0005604725 podman[168166]: 2026-02-02 08:22:36.81796972 +0000 UTC m=+0.496500006 container health_status ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, health_status=healthy, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, container_name=nova_scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, maintainer=OpenStack TripleO Team, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T23:32:05Z, release=1766032510, url=https://www.redhat.com, version=17.1.13, tcib_managed=true, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, build-date=2026-01-12T23:32:05Z, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, vcs-type=git, managed_by=tripleo_ansible, com.redhat.component=openstack-nova-scheduler-container, name=rhosp-rhel9/openstack-nova-scheduler, architecture=x86_64, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, io.buildah.version=1.41.5, vendor=Red Hat, Inc., org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-scheduler, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler) Feb 2 08:22:36 np0005604725 systemd[1]: 229d3b78b51865d64f23fc66865395d2f24c96842ceb27455f6ed6470c2d481a.service: Deactivated successfully. Feb 2 08:22:36 np0005604725 podman[168118]: 2026-02-02 08:22:36.823822071 +0000 UTC m=+0.537889806 container exec_died 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1, name=cinder_scheduler, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, org.opencontainers.image.revision=b6119e5ed06980da0dc87d2452f81c9f2987f08e, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public, io.buildah.version=1.41.5, managed_by=tripleo_ansible, config_id=tripleo_step4, konflux.additional-tags=17.1.13 17.1_20260112.1, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'bb6b8a5d9470c5e09d1e4beb6638faa7'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/config-data/puppet-generated/cinder:/var/lib/kolla/config_files/src:ro', '/var/log/containers/cinder:/var/log/cinder:z', '/var/lib/kolla/config_files/cinder_scheduler.json:/var/lib/kolla/config_files/config.json:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-scheduler, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-scheduler, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 cinder-scheduler, version=17.1.13, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 cinder-scheduler, maintainer=OpenStack TripleO Team, vcs-ref=b6119e5ed06980da0dc87d2452f81c9f2987f08e, build-date=2026-01-12T22:58:47Z, cpe=cpe:/a:redhat:openstack:17.1::el9, batch=17.1_20260112.1, org.opencontainers.image.created=2026-01-12T22:58:47Z, container_name=cinder_scheduler, name=rhosp-rhel9/openstack-cinder-scheduler, com.redhat.component=openstack-cinder-scheduler-container, vendor=Red Hat, Inc., release=1766032510, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-scheduler) Feb 2 08:22:36 np0005604725 systemd[1]: 1d1cf69cb66b355a475aa4268e84c436773e32e4452ef1f17c7012b34a7bcf69.service: Deactivated successfully. Feb 2 08:22:36 np0005604725 podman[168166]: 2026-02-02 08:22:36.841872349 +0000 UTC m=+0.520402695 container exec_died ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1, name=nova_scheduler, name=rhosp-rhel9/openstack-nova-scheduler, vendor=Red Hat, Inc., architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-scheduler, batch=17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, build-date=2026-01-12T23:32:05Z, konflux.additional-tags=17.1.13 17.1_20260112.1, distribution-scope=public, io.openshift.expose-services=, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-scheduler, container_name=nova_scheduler, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-scheduler, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, description=Red Hat OpenStack Platform 17.1 nova-scheduler, com.redhat.component=openstack-nova-scheduler-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, maintainer=OpenStack TripleO Team, release=1766032510, version=17.1.13, config_id=tripleo_step4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 nova-scheduler, org.opencontainers.image.created=2026-01-12T23:32:05Z, org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, url=https://www.redhat.com, vcs-type=git, io.buildah.version=1.41.5) Feb 2 08:22:36 np0005604725 systemd[1]: ce4f68c64d0faa7987ce98a9208e18f06ed723bc1362605e028b4e49f555e0c1.service: Deactivated successfully. Feb 2 08:22:36 np0005604725 podman[168112]: 2026-02-02 08:22:36.86453571 +0000 UTC m=+0.582445224 container exec_died 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1, name=nova_conductor, release=1766032510, container_name=nova_conductor, com.redhat.component=openstack-nova-conductor-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, config_id=tripleo_step4, name=rhosp-rhel9/openstack-nova-conductor, tcib_managed=true, io.buildah.version=1.41.5, batch=17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-conductor, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., org.opencontainers.image.revision=fb12bb7868525ee01e6b8233454fd15b039a7ffe, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0f33bf354435ad6e844c942ca95c792b'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/nova:/var/log/nova', '/var/lib/kolla/config_files/nova_conductor.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/nova:/var/lib/kolla/config_files/src:ro']}, description=Red Hat OpenStack Platform 17.1 nova-conductor, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-conductor, summary=Red Hat OpenStack Platform 17.1 nova-conductor, konflux.additional-tags=17.1.13 17.1_20260112.1, cpe=cpe:/a:redhat:openstack:17.1::el9, managed_by=tripleo_ansible, vcs-type=git, build-date=2026-01-12T23:32:18Z, distribution-scope=public, org.opencontainers.image.created=2026-01-12T23:32:18Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-conductor, version=17.1.13, vcs-ref=fb12bb7868525ee01e6b8233454fd15b039a7ffe, architecture=x86_64, io.openshift.expose-services=) Feb 2 08:22:36 np0005604725 systemd[1]: 14c39f718ef8fb4c6789ea43fd1997fcac110bf78559448d86fc477f43cb3a81.service: Deactivated successfully. Feb 2 08:22:36 np0005604725 systemd[1]: 0d89691dc8c08f2ee066a8362f02cb7dd31ffbd1999f4a9a90d590d5646f407c.service: Deactivated successfully. Feb 2 08:22:36 np0005604725 podman[168145]: 2026-02-02 08:22:36.922335799 +0000 UTC m=+0.593342402 container exec_died 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=neutron_api, org.opencontainers.image.revision=b1428c69debc6a325367957538a456c4ca8d9a0f, version=17.1.13, org.opencontainers.image.created=2026-01-12T22:57:35Z, url=https://www.redhat.com, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ed61d1adcabe12fe3dffa08621622e77'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/log/containers/neutron:/var/log/neutron:z', '/var/log/containers/httpd/neutron-api:/var/log/httpd:z', '/var/lib/kolla/config_files/neutron_api.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/neutron:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/neutron_ovn.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/neutron_ovn.crt:ro', '/etc/pki/tls/private/neutron_ovn.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/neutron_ovn.key:ro']}, io.buildah.version=1.41.5, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, batch=17.1_20260112.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=b1428c69debc6a325367957538a456c4ca8d9a0f, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_step4, architecture=x86_64, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 neutron-server, vcs-type=git, build-date=2026-01-12T22:57:35Z, description=Red Hat OpenStack Platform 17.1 neutron-server, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-neutron-server, cpe=cpe:/a:redhat:openstack:17.1::el9, io.openshift.expose-services=, container_name=neutron_api, tcib_managed=true, managed_by=tripleo_ansible, release=1766032510, com.redhat.component=openstack-neutron-server-container) Feb 2 08:22:36 np0005604725 podman[168160]: 2026-02-02 08:22:36.461314363 +0000 UTC m=+0.142280244 container health_status ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, health_status=healthy, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.13, architecture=x86_64, cpe=cpe:/a:redhat:openstack:17.1::el9, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, container_name=clustercheck, build-date=2026-01-12T22:10:18Z, batch=17.1_20260112.1, description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, vcs-type=git, io.buildah.version=1.41.5, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, org.opencontainers.image.created=2026-01-12T22:10:18Z, release=1766032510, com.redhat.component=openstack-mariadb-container, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step2, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, name=rhosp-rhel9/openstack-mariadb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, konflux.additional-tags=17.1.13 17.1_20260112.1, url=https://www.redhat.com, tcib_managed=true) Feb 2 08:22:36 np0005604725 systemd[1]: 5e1bd6910fd3eede7fb654020d94ab44a1420e656e7299433d2302ff4fcc1b6b.service: Deactivated successfully. Feb 2 08:22:36 np0005604725 podman[168160]: 2026-02-02 08:22:36.964828304 +0000 UTC m=+0.645794155 container exec_died ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=clustercheck, vendor=Red Hat, Inc., com.redhat.component=openstack-mariadb-container, name=rhosp-rhel9/openstack-mariadb, url=https://www.redhat.com, io.buildah.version=1.41.5, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=4ce33df42b67d01daba32be86cee6dc0ad95cdee, cpe=cpe:/a:redhat:openstack:17.1::el9, config_id=tripleo_step2, distribution-scope=public, vcs-ref=4ce33df42b67d01daba32be86cee6dc0ad95cdee, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, org.opencontainers.image.created=2026-01-12T22:10:18Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, release=1766032510, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, konflux.additional-tags=17.1.13 17.1_20260112.1, build-date=2026-01-12T22:10:18Z, io.openshift.expose-services=, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '194706b4cbbff1d0d528056ff0c9c800'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, version=17.1.13, container_name=clustercheck, maintainer=OpenStack TripleO Team, vcs-type=git) Feb 2 08:22:36 np0005604725 systemd[1]: ba9511f0888e11514cf620e5252ac905dd0e8d0dadeae3a15c3fe4ae12959303.service: Deactivated successfully. Feb 2 08:22:37 np0005604725 podman[168150]: 2026-02-02 08:22:37.001057735 +0000 UTC m=+0.672922924 container health_status 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, health_status=healthy, com.redhat.component=openstack-manila-scheduler-container, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, io.buildah.version=1.41.5, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, name=rhosp-rhel9/openstack-manila-scheduler, org.opencontainers.image.created=2026-01-12T22:52:54Z, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, release=1766032510, url=https://www.redhat.com, build-date=2026-01-12T22:52:54Z, vcs-type=git, managed_by=tripleo_ansible, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:openstack:17.1::el9, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, architecture=x86_64, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, description=Red Hat OpenStack Platform 17.1 manila-scheduler, container_name=manila_scheduler, distribution-scope=public, maintainer=OpenStack TripleO Team, version=17.1.13, batch=17.1_20260112.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0) Feb 2 08:22:37 np0005604725 podman[168150]: 2026-02-02 08:22:37.019710363 +0000 UTC m=+0.691575552 container exec_died 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c (image=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1, name=manila_scheduler, konflux.additional-tags=17.1.13 17.1_20260112.1, name=rhosp-rhel9/openstack-manila-scheduler, build-date=2026-01-12T22:52:54Z, release=1766032510, description=Red Hat OpenStack Platform 17.1 manila-scheduler, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-scheduler, url=https://www.redhat.com, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd8e2b9fe37394fa4702f0b4840e2be72'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1', 'net': 'host', 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/manila_scheduler.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/manila:/var/lib/kolla/config_files/src:ro', '/var/log/containers/manila:/var/log/manila:z']}, cpe=cpe:/a:redhat:openstack:17.1::el9, org.opencontainers.image.created=2026-01-12T22:52:54Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, managed_by=tripleo_ansible, version=17.1.13, architecture=x86_64, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-scheduler, vcs-ref=15073b86385e1cc15e834ed7dd921945014e62eb, org.opencontainers.image.revision=15073b86385e1cc15e834ed7dd921945014e62eb, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 manila-scheduler, batch=17.1_20260112.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, config_id=tripleo_step4, distribution-scope=public, container_name=manila_scheduler, vcs-type=git, io.buildah.version=1.41.5, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-scheduler, com.redhat.component=openstack-manila-scheduler-container) Feb 2 08:22:37 np0005604725 systemd[1]: 8a976523ca8924c05cce86cc57debef8a7f321e67876ba54337f39a19e19414c.service: Deactivated successfully. Feb 2 08:22:37 np0005604725 podman[168167]: 2026-02-02 08:22:37.059914147 +0000 UTC m=+0.736775361 container health_status ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, health_status=healthy, build-date=2026-01-12T23:07:25Z, batch=17.1_20260112.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.buildah.version=1.41.5, io.openshift.expose-services=, konflux.additional-tags=17.1.13 17.1_20260112.1, config_id=tripleo_step4, container_name=ceilometer_agent_notification, managed_by=tripleo_ansible, version=17.1.13, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, architecture=x86_64, vendor=Red Hat, Inc., org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, com.redhat.component=openstack-ceilometer-notification-container, release=1766032510, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, maintainer=OpenStack TripleO Team, org.opencontainers.image.created=2026-01-12T23:07:25Z, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, cpe=cpe:/a:redhat:openstack:17.1::el9, url=https://www.redhat.com, name=rhosp-rhel9/openstack-ceilometer-notification, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification) Feb 2 08:22:37 np0005604725 podman[168167]: 2026-02-02 08:22:37.092079501 +0000 UTC m=+0.768940785 container exec_died ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1, name=ceilometer_agent_notification, container_name=ceilometer_agent_notification, com.redhat.component=openstack-ceilometer-notification-container, tcib_managed=true, vendor=Red Hat, Inc., build-date=2026-01-12T23:07:25Z, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.5, description=Red Hat OpenStack Platform 17.1 ceilometer-notification, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-notification, summary=Red Hat OpenStack Platform 17.1 ceilometer-notification, org.opencontainers.image.created=2026-01-12T23:07:25Z, managed_by=tripleo_ansible, vcs-type=git, name=rhosp-rhel9/openstack-ceilometer-notification, konflux.additional-tags=17.1.13 17.1_20260112.1, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-notification, release=1766032510, vcs-ref=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, cpe=cpe:/a:redhat:openstack:17.1::el9, version=17.1.13, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-notification, url=https://www.redhat.com, batch=17.1_20260112.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '8edb2eeeece67be8549d65057558ff12'}, 'healthcheck': {'test': '/openstack/healthcheck 5672'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/ceilometer_agent_notification.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/ceilometer:/var/lib/kolla/config_files/src:ro', '/var/log/containers/ceilometer:/var/log/ceilometer:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, config_id=tripleo_step4, org.opencontainers.image.revision=4f6dafcdcf2b41e56d843f4a43eac1db1e9fee06, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:746ff7bb175b780f02d72aa0177aa6d6ba4ebbee4456d01e05d465c1515e02b0, distribution-scope=public) Feb 2 08:22:37 np0005604725 systemd[1]: ea2e39c728a68971b3e88ced1516ddb9d6c20bb75ecef024f66d5a45c5e499eb.service: Deactivated successfully. Feb 2 08:22:42 np0005604725 sshd[168980]: main: sshd: ssh-rsa algorithm is disabled Feb 2 08:22:42 np0005604725 systemd-logind[36465]: New session 24 of user zuul. Feb 2 08:22:42 np0005604725 systemd[1]: Started Session 24 of User zuul.